2019 International Conference on Cyberworlds (CW) 2019
DOI: 10.1109/cw.2019.00058
|View full text |Cite
|
Sign up to set email alerts
|

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

Abstract: Preventing organizations from Cyber exploits needs timely intelligence about Cyber vulnerabilities and attacks, referred to as threats. Cyber threat intelligence can be extracted from various sources including social media platforms where users publish the threat information in real-time. Gathering Cyber threat intelligence from social media sites is a timeconsuming task for security analysts that can delay timely response to emerging Cyber threats. We propose a framework for automatically gathering Cyber thre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 15 publications
(34 reference statements)
0
18
0
Order By: Relevance
“…This implies that our framework can be easily extended to support the other deep learning or machine learning methods including this method by incorporating a new baseline learning model into the framework. As presented in Section 4, the F1-score of the proposed model is observed 0.932∼0.934 at maximum, which indicates quite high accuracy compared to the method proposed by Le et al [11] where F1-score has been only 0.643, even considering different data sets. Table 1 summarizes the comparison of previous studies on the classification by the CSI.…”
Section: Classification By the Cybersecurity Intelligencementioning
confidence: 65%
See 3 more Smart Citations
“…This implies that our framework can be easily extended to support the other deep learning or machine learning methods including this method by incorporating a new baseline learning model into the framework. As presented in Section 4, the F1-score of the proposed model is observed 0.932∼0.934 at maximum, which indicates quite high accuracy compared to the method proposed by Le et al [11] where F1-score has been only 0.643, even considering different data sets. Table 1 summarizes the comparison of previous studies on the classification by the CSI.…”
Section: Classification By the Cybersecurity Intelligencementioning
confidence: 65%
“…Le et al have proposed a new machine learning-based method for detecting CSI [11]. They have used CVE data set as the background knowledge and have adopted two novelty classifiers (i.e., centroid, one-class SVM) to detect tweets related to CSI.…”
Section: Classification By the Cybersecurity Intelligencementioning
confidence: 99%
See 2 more Smart Citations
“…Also, the fact that the information shared on Twitter usually appears earlier than any official announcement, can improve the organizations' reaction to newly discovered vulnerabilities [62,63]. Gathered cyber-threat intelligence data from Twitter suggest that cyber-threat relevant tweets do not often include a CVE [64] identifier [65].…”
Section: Usage Typologymentioning
confidence: 99%