2019 International Joint Conference on Neural Networks (IJCNN) 2019
DOI: 10.1109/ijcnn.2019.8852475
|View full text |Cite
|
Sign up to set email alerts
|

Cyberthreat Detection from Twitter using Deep Neural Networks

Abstract: To be prepared against cyberattacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds. Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 77 publications
(44 citation statements)
references
References 16 publications
0
44
0
Order By: Relevance
“…In the last few years, research on using Cyber threat-relevant information available on Twitter for security purposes has gained significant attention. To automatically collect Cyber threat intelligence from Twitter, several methods have been used [7], [8], [10]- [14].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In the last few years, research on using Cyber threat-relevant information available on Twitter for security purposes has gained significant attention. To automatically collect Cyber threat intelligence from Twitter, several methods have been used [7], [8], [10]- [14].…”
Section: Related Workmentioning
confidence: 99%
“…al. [10] use word embeddings such as GloVE [15] and Word2Vec [16] for feature extraction and use the binary classification model Convolutional Neural Network (CNN) [17] for classifying Cyber threat tweets. The collection method for Cyber threat tweets based on binary classification requires the classifiers to be trained with both positive and negative samples, or Cyber threat-relevant and Cyber threat-irrelevant tweets.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations