3,684
views
0
recommends
+1 Recommend
1 collections
    5
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A Social Network Analysis Tool for Uncovering Cybersecurity Threats

      proceedings-article
      1 , 2 , 1 , 2 , 1 , 2 , 1 , 2 ,
      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)
      Cyber Security Research
      10th-12th September 2019
      Cybercrime, Social Network Analysis, Computer Security
      Bookmark

            Abstract

            The paper presents the design and implementation of the Cybersecurity Social Network Analyser ( CSNA ) platform. The CSNA is a software system for real time automated analysis of cybersecurity-related information available on Social Networks, with a focus on Twitter. Its aim is to uncover cybersecurity breach related discussions and posts, identify emerging cybersecurity incidents and provide, in a timely fashion, early warning alerts. The CSNA platform presents the results from the analysis of the gathered information in a variety of graphical formats for easy visualisation of potential threats within user-specified time windows of interest. We complement our description with a demonstration of the real time information provided by the platform during its operation on the Twitter social network.

            Content

            Author and article information

            Contributors
            Conference
            September 2019
            September 2019
            : 97-106
            Affiliations
            [1 ]Computer Technology Institute & Press -– ”DIOPHANTUS”,

            Nikou Kazantzaki str.,

            University of Patras Campus, GR-256504,

            Rio, Patras, Greece
            [2 ]University of Thessaly, General Department,

            Larissa – Trikala Ring Road, GR-41110

            Larissa, Greece
            [2 ]Business Administration Department,

            University of Patras, GR-26504,

            Rio, Patras, Greece
            [2 ]Computer Engineering and Informatics Department

            University of Patras GR-26504

            Rio, Patras, Greece
            [0005]University of Thessaly,

            Larissa – Trikala Ring Road, GR-41110

            Larissa, Greece
            Article
            10.14236/ewic/icscsr19.13
            fb4f3cc9-f700-43cc-9fcd-c377546efdbe
            © Vasileios Vlachos et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/icscsr19.13
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Cybercrime,Computer Security,Social Network Analysis

            REFERENCES

            1. 2015 Twitter and 2013 Pakistan general election: The case of David 2.0 against goliaths 139 161 Springer International Publishing

            2. 2013 Measuring the Cost of Cybercrime 265 300 Berlin, Heidelberg: Springer Berlin Heidelberg

            3. 2015 0-day vulnerabilities and cybercrime Proceedings of the 2015 10th International Conference on Availability, Reliability and Security, ARES ’15, Washington, DC, USA 711 718 IEEE Computer Society

            4. 2014 Crime mapping through geo-spatial social media activity See [4]

            5. 2016 Predicting election trends with twitter: Hillary clinton versus donald trump CoRR

            6. 2015 140 characters to victory?: Using twitter to predict the UK 2015 general election CoRR abs/1505.01511

            7. 2011 A sentiment analysis of singapore presidential election 2011 using twitter data with census correction CoRR

            8. 2012 Us presidential election 2012 prediction using census corrected twitter model CoRR

            9. 2013 Markets for zero-day exploits: Ethics and implications Proceedings of the 2013 New Security Paradigms Workshop, NSPW ’13 New York, NY, USA 41 46 ACM

            10. 2012 “i wanted to predict elections with twitter and all i got was this lousy paper” - a balanced survey on election prediction using twitter data CoRR abs/1204.6441

            11. 2013 Forecasting the pulse: How deviations from regular patterns in online data can identify offline phenomena Internet Research 23 5 589 607

            12. 2015 Using twitter sentiment to forecast the 2013 pakistani election and the 2014 indian election IEEE Intelligent Systems 30 1 2 5

            13. 2011 Adapting econometric models, technical analysis and correlation data to computer security data 2011 First SysSec Workshop 59 62

            14. 2012 Correlating s&p 500 stocks with twitter data Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research, HotSocial ’12 New York, NY, USA 69 72 ACM

            15. 2007 The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales In Sixth Workshop on the Economics of Information Security

            16. 2014 Oct A case study of the new york city 2012-2013 influenza season with daily geocoded twitter data from temporal and spatiotemporal perspectives J Med Internet Res 16 10 e236

            17. 2013 On the predictability of stock market behavior using stocktwits sentiment and posting volume EPIA

            18. 2017 Measuring global disease with wikipedia: Success, failure, and a research agenda Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW ’17 New York, NY, USA 1812 1834 ACM

            19. 2012 Analyzing stock market movements using twitter sentiment analysis Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), ASONAM ’12 Washington, DC, USA 119 123 IEEE Computer Society

            20. 2009 Using prediction markets and twitter to predict a swine flu pandemic In Proceedings of the 1st International Workshop on Mining Social

            21. 2015 Combining search, social media, and traditional data sources to improve influenza surveillance PLoS Computational Biology

            22. 2005 Towards econometric models of the security risk from remote attacks IEEE Security & Privacy 3 1 40 44

            23. 2011 The Use of Twitter to Track Levels of Disease Activity and Public Concern in the U.S. during the Influenza A H1N1 Pandemic PLoS ONE 6 e19467

            24. 2007 An empirical analysis of the impact of software vulnerability announcements on firm stock price IEEE Transactions on Software Engineering 33 544 557

            25. 2010 Predicting elections with twitter: What 140 characters reveal about political sentiment Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media 178 185

            26. 2018 Improving crime count forecasts using twitter and taxi data Decision Support Systems 113 73 85

            27. 2012 Automatic crime prediction using events extracted from twitter posts Social Computing, Behavioral - Cultural Modeling and Prediction Berlin, Heidelberg 231 238 Springer Berlin Heidelberg

            28. 2009 The real cost of software errors IEEE Security & Privacy 7 2 87 90

            29. 2017 Ddos event forecasting using twitter data Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI-17) Melbourne, Australia 4151 4157

            Comments

            Comment on this article