Processing Tweets for Cybersecurity Threat Awareness

@article{Alves2019ProcessingTF,
  title={Processing Tweets for Cybersecurity Threat Awareness},
  author={Fernando Alves and A. Bettini and P. Ferreira and A. Bessani},
  journal={ArXiv},
  year={2019},
  volume={abs/1904.02072}
}
  • Fernando Alves, A. Bettini, +1 author A. Bessani
  • Published 2019
  • Computer Science
  • ArXiv
  • Receiving timely and relevant security information is crucial for maintaining a high-security level on an IT infrastructure. [...] Key Method Its tweet-processing pipeline is composed of filtering, feature extraction, binary classification, an innovative clustering strategy, and generation of Indicators of Compromise (IoCs). A quantitative evaluation considering all tweets from 80 accounts over more than 8 months (over 195.000 tweets), shows that our approach timely and successfully finds the majority of…Expand Abstract
    Design of a Classification Model for a Twitter-Based Streaming Threat Monitor
    1
    Follow the Blue Bird: A Study on Threat Data Published on Twitter
    Cyberthreat discovery in open source intelligence using deep learning techniques
    2
    Lazarus: Automatic Management of Diversity in BFT Systems

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 36 REFERENCES
    Cyberthreat Detection from Twitter using Deep Neural Networks
    9
    DISCOVER: Mining Online Chatter for Emerging Cyber Threats
    20
    Weakly Supervised Extraction of Computer Security Events from Twitter
    83
    Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
    78
    Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits
    134
    Mining social networks for software vulnerabilities monitoring
    12