Social Media Monitoring for IoT Cyber-Threats

09/09/2021
by   Sofia Alevizopoulou, et al.
5

The rapid development of IoT applications and their use in various fields of everyday life has resulted in an escalated number of different possible cyber-threats, and has consequently raised the need of securing IoT devices. Collecting Cyber-Threat Intelligence (e.g., zero-day vulnerabilities or trending exploits) from various online sources and utilizing it to proactively secure IoT systems or prepare mitigation scenarios has proven to be a promising direction. In this work, we focus on social media monitoring and investigate real-time Cyber-Threat Intelligence detection from the Twitter stream. Initially, we compare and extensively evaluate six different machine-learning based classification alternatives trained with vulnerability descriptions and tested with real-world data from the Twitter stream to identify the best-fitting solution. Subsequently, based on our findings, we propose a novel social media monitoring system tailored to the IoT domain; the system allows users to identify recent/trending vulnerabilities and exploits on IoT devices. Finally, to aid research on the field and support the reproducibility of our results we publicly release all annotated datasets created during this process.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 6

research
07/03/2019

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

Preventing organizations from Cyber exploits needs timely intelligence a...
research
01/06/2021

A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case

Despite the surging development and utilization of IoT devices, the secu...
research
09/12/2020

A Review on Cyber Crimes on the Internet of Things

Internet of Things (IoT) devices are rapidly becoming universal. The suc...
research
04/23/2021

A Framework for Unsupervised Classificiation and Data Mining of Tweets about Cyber Vulnerabilities

Many cyber network defense tools rely on the National Vulnerability Data...
research
11/05/2020

Evaluating the Performance of Twitter-based Exploit Detectors

Patch prioritization is a crucial aspect of information systems security...
research
03/31/2020

Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream

In recent days, the amount of Cyber Security text data shared via social...
research
01/14/2020

IoT Network Behavioral Fingerprint Inference with Limited Network Trace for Cyber Investigation: A Meta Learning Approach

The development and adoption of Internet of Things (IoT) devices will gr...

Please sign up or login with your details

Forgot password? Click here to reset