CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities
Links to Fileshttps://ieeexplore.ieee.org/document/7752338
MetadataShow full item record
Type of Work8 pages
conference papers and proceedings pre-print
Citation of Original PublicationSudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, and Tim Finin, CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) , DOI: 10.1109/ASONAM.2016.7752338
RightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
© 2016 IEEE
database management systems
security of data
social networking (online)
UMBC Ebiquity Research Group
In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe CyberTwitter, a system to discover and analyze cybersecurity intelligence on Twitter and serve as a OSINT (Open–source intelligence) source. We analyze real time information updates, in form of tweets, to extract intelligence about various possible threats. We use the Semantic Web RDF to represent the intelligence gathered and SWRL rules to reason over extracted intelligence to issue alerts for security analysts.