pith. sign in

arxiv: 1702.07745 · v1 · pith:VK2IFUJKnew · submitted 2017-02-24 · 💻 cs.CR · cs.HC· cs.IR· cs.SI

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

classification 💻 cs.CR cs.HCcs.IRcs.SI
keywords mediasocialapproachcyber-attackseventeventssensoraccount
0
0 comments X p. Extension
pith:VK2IFUJK Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{VK2IFUJK}

Prints a linked pith:VK2IFUJK badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks. Our approach detects a broad range of cyber-attacks (e.g., distributed denial of service (DDOS) attacks, data breaches, and account hijacking) in an unsupervised manner using just a limited fixed set of seed event triggers. A new query expansion strategy based on convolutional kernels and dependency parses helps model reporting structure and aids in identifying key event characteristics. Through a large-scale analysis over Twitter, we demonstrate that our approach consistently identifies and encodes events, outperforming existing methods.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.