Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2019
DOI: 10.1145/3341161.3344379
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach for detection and ranking of trendy and emerging cyber threat events in Twitter streams

Abstract: We present a new machine learning and text information extraction approach to detection of cyber threat events in Twitter that are novel (previously non-extant) and developing (marked by significance with respect to similarity with a previously detected event). While some existing approaches to event detection measure novelty and trendiness, typically as independent criteria and occasionally as a holistic measure, this work focuses on detecting both novel and developing events using an unsupervised machine lea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…This study has focused on developing and evaluating an ontology model for analyzing cyber influence campaigns in conflicts conducted in social media networks. Social media networks can also give indications of emerging cyber security threats [119]- [123]. One interesting future work direction is to adapt our ontology model to uncover the sources and agents behind emerging cyber threats.…”
Section: F Limitations and Future Researchmentioning
confidence: 99%
“…This study has focused on developing and evaluating an ontology model for analyzing cyber influence campaigns in conflicts conducted in social media networks. Social media networks can also give indications of emerging cyber security threats [119]- [123]. One interesting future work direction is to adapt our ontology model to uncover the sources and agents behind emerging cyber threats.…”
Section: F Limitations and Future Researchmentioning
confidence: 99%
“…Dataset for Auto-Correction Since our auto-correct model is implemented based on SymSpell [21], we utilize the standard corpus from SymSpell for auto-correction lookup. The corpus itself is a frequency dictionary created by combining the Google Books Ngram data and Spell Checker Oriented Word Lists (SCOWL).…”
Section: Non-class Sequencesmentioning
confidence: 99%
“…The last puzzle piece of our word reconstruction system pipeline is to summarize the top K predictions from the trajectory search and combine the corresponding information from the auto-correction model to finalize the prediction for the word. Our auto-correction model is based upon Sym-Spell, which is proven [21] to be an effective non deep learning approach for correcting misspelled word.…”
Section: Algorithm 2: Trajectorysearchmentioning
confidence: 99%
“…Once a trending topic is identified, topic ranking is needed, to avoid overwhelming a user. This is used to highlight current important topics, including Bose et al (2019) who use this to detect and flag known serious threats.…”
Section: Cybercrime Trending Topicsmentioning
confidence: 99%