Processing Tweets for Cybersecurity Threat Awareness

04/03/2019
by   Fernando Alves, et al.
0

Receiving timely and relevant security information is crucial for maintaining a high-security level on an IT infrastructure. This information can be extracted from Open Source Intelligence published daily by users, security organisations, and researchers. In particular, Twitter has become an information hub for obtaining cutting-edge information about many subjects, including cybersecurity. This work proposes SYNAPSE, a Twitter-based streaming threat monitor that generates a continuously updated summary of the threat landscape related to a monitored infrastructure. Its tweet-processing pipeline is composed of filtering, feature extraction, binary classification, an innovative clustering strategy, and generation of Indicators of Compromise (IoCs). A quantitative evaluation considering all tweets from 80 accounts over more than 8 months (over 195.000 tweets), shows that our approach timely and successfully finds the majority of security-related tweets concerning an example IT infrastructure (true positive rate above 90 small number of tweets as relevant (false positive rate under 10 summarises the results to very few IoCs per day. A qualitative evaluation of the IoCs generated by SYNAPSE demonstrates their relevance (based on the CVSS score and the availability of patches or exploits), and timeliness (based on threat disclosure dates from NVD).

READ FULL TEXT

page 3

page 4

research
07/03/2019

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

Preventing organizations from Cyber exploits needs timely intelligence a...
research
06/28/2023

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

Time-relevant and accurate threat information from public domains are es...
research
04/01/2019

Cyberthreat Detection from Twitter using Deep Neural Networks

To be prepared against cyberattacks, most organizations resort to securi...
research
01/27/2023

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Open source intelligence is a powerful tool for cybersecurity analysts t...
research
08/24/2022

"Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine

The Russian Invasion of Ukraine in early 2022 resulted in a rapidly chan...
research
04/23/2021

A Framework for Unsupervised Classificiation and Data Mining of Tweets about Cyber Vulnerabilities

Many cyber network defense tools rely on the National Vulnerability Data...
research
04/28/2023

QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing

When a threat is observed, one of the most important challenges is to ch...

Please sign up or login with your details

Forgot password? Click here to reset