Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

作者: Rupinder Paul Khandpur , Taoran Ji , Steve Jan , Gang Wang , Chang-Tien Lu

DOI: 10.1145/3132847.3132866

关键词:

摘要: Social media is often viewed as a sensor into various societal events such disease outbreaks, protests, and elections. We describe the use of social crowdsourced to gain insight ongoing cyber-attacks. Our approach detects broad range cyber-attacks (e.g., distributed denial service (DDoS) attacks, data breaches, account hijacking) in weakly supervised manner using just small set seed event triggers requires no training or labeled samples. A new query expansion strategy based on convolution kernels dependency parses helps model semantic structure aids identifying key characteristics. Through large-scale analysis over Twitter, we demonstrate that our consistently identifies encodes events, outperforming existing methods.

参考文章(39)
Xiaofeng Wang, Matthew S. Gerber, Donald E. Brown, Automatic Crime Prediction Using Events Extracted from Twitter Posts Social Computing, Behavioral - Cultural Modeling and Prediction. pp. 231- 238 ,(2012) , 10.1007/978-3-642-29047-3_28
Radim Řehůřek, Petr Sojka, Software Framework for Topic Modelling with Large Corpora University of Malta. ,(2010)
Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey, Mingyan Liu, None, Cloudy with a chance of breach: forecasting cyber security incidents usenix security symposium. pp. 1009- 1024 ,(2015)
Kyle Soska, Nicolas Christin, Automatically detecting vulnerable websites before they turn malicious usenix security symposium. pp. 625- 640 ,(2014)
Mor Naaman, Hila Becker, Luis Gravano, Beyond Trending Topics: Real-World Event Identification on Twitter international conference on weblogs and social media. ,(2011) , 10.7916/D81V5NVX
Flora S. Tsai, Kap Luk Chan, Detecting cyber security threats in weblogs using probabilistic models pacific asia workshop on intelligence and security informatics. pp. 46- 57 ,(2007) , 10.1007/978-3-540-71549-8_4
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Tudor Dumitras, Carl Sabottke, Octavian Suciu, Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits usenix security symposium. pp. 1041- 1056 ,(2015)
Farzindar Atefeh, Wael Khreich, A Survey of Techniques for Event Detection in Twitter Computational Intelligence. ,vol. 31, pp. 132- 164 ,(2015) , 10.1111/COIN.12017
Gerard Salton, Michael J. McGill, Introduction to Modern Information Retrieval ,(1983)