49
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Preventing organizations from Cyber exploits needs timely intelligence about Cyber vulnerabilities and attacks, referred as threats. Cyber threat intelligence can be extracted from various sources including social media platforms where users publish the threat information in real time. Gathering Cyber threat intelligence from social media sites is a time consuming task for security analysts that can delay timely response to emerging Cyber threats. We propose a framework for automatically gathering Cyber threat intelligence from Twitter by using a novelty detection model. Our model learns the features of Cyber threat intelligence from the threat descriptions published in public repositories such as Common Vulnerabilities and Exposures (CVE) and classifies a new unseen tweet as either normal or anomalous to Cyber threat intelligence. We evaluate our framework using a purpose-built data set of tweets from 50 influential Cyber security related accounts over twelve months (in 2018). Our classifier achieves the F1-score of 0.643 for classifying Cyber threat tweets and outperforms several baselines including binary classification models. Our analysis of the classification results suggests that Cyber threat relevant tweets on Twitter do not often include the CVE identifier of the related threats. Hence, it would be valuable to collect these tweets and associate them with the related CVE identifier for cyber security applications.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Article: not found

          Term-weighting approaches in automatic text retrieval

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              A class-feature-centroid classifier for text categorization

                Bookmark

                Author and article information

                Journal
                03 July 2019
                Article
                1907.01755
                cb4ec23f-df1e-487d-9121-6bb4b70c0e3e

                http://creativecommons.org/licenses/by-nc-sa/4.0/

                History
                Custom metadata
                ACCEPTED by the 2019 International Conference on Cyberworlds (CW2019)
                cs.CR cs.LG stat.ML

                Security & Cryptology,Machine learning,Artificial intelligence
                Security & Cryptology, Machine learning, Artificial intelligence

                Comments

                Comment on this article