CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities

dc.contributor.authorMittal, Sudip
dc.contributor.authorDas, Prajit Kumar
dc.contributor.authorMulwad, Varish
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.date.accessioned2018-10-30T16:42:50Z
dc.date.available2018-10-30T16:42:50Z
dc.date.issued2016-11-24
dc.descriptionInternational Symposium on Foundations of Open Source Intelligence and Security Informaticsen_US
dc.description.abstractIn order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe CyberTwitter, a system to discover and analyze cybersecurity intelligence on Twitter and serve as a OSINT (Open–source intelligence) source. We analyze real time information updates, in form of tweets, to extract intelligence about various possible threats. We use the Semantic Web RDF to represent the intelligence gathered and SWRL rules to reason over extracted intelligence to issue alerts for security analysts.en_US
dc.description.sponsorshipSupport for this work was provided by NSF grants 0910838 and 1228198, a Supplement from United States Department of Defense to NSF award 1439663, and funds from the Oros Family Professorship.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/7752338en_US
dc.format.extent8 pagesen_US
dc.genreconference papers and proceedings pre-printen_US
dc.identifierdoi:10.13016/M2JM23K7T
dc.identifier.citationSudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, and Tim Finin, CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) , DOI: 10.1109/ASONAM.2016.7752338en_US
dc.identifier.uri10.1109/ASONAM.2016.7752338
dc.identifier.urihttp://hdl.handle.net/11603/11790
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Student Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2016 IEEE
dc.subjectComputer securityen_US
dc.subjecttwitteren_US
dc.subjectsocial mediaen_US
dc.subjectopen-source intelligenceen_US
dc.subjectdatabase management systemsen_US
dc.subjectsecurity of dataen_US
dc.subjectsemantic Weben_US
dc.subjectsocial networking (online)en_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleCyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilitiesen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
816.pd.pdf
Size:
784.49 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: