Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020
DOI: 10.1145/3320269.3384721
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Event Detection with New and Re-emerging Words

Abstract: There is plenty of threat-related information in open data sources. Early identification of emerging security threats from such information is an important part of security for deployed software and systems. While several cybersecurity event detection methods have been proposed to extract security events from unstructured text in open data sources, most of the existing methods focus on detecting events that have a large volume of mentions. On the contrary, to respond faster than attackers, security analysts an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…We selected the 20 security keywords in Table 1 for the following experiments. Based on previous researches [54,55] and our preliminary study, we selected keywords most likely to be shared on Twitter for information about phishing sites. We also selected the same number of Security Keywords in Japanese as those translated from English.…”
Section: Collecting Tweetsmentioning
confidence: 99%
See 2 more Smart Citations
“…We selected the 20 security keywords in Table 1 for the following experiments. Based on previous researches [54,55] and our preliminary study, we selected keywords most likely to be shared on Twitter for information about phishing sites. We also selected the same number of Security Keywords in Japanese as those translated from English.…”
Section: Collecting Tweetsmentioning
confidence: 99%
“…Threat Intelligence Extraction from Twitter. Research on threat intelligence generation using Twitter information has been conducted from various perspectives [16,30,51,54,55]. Shin et al proposed a system to extract four types of information from a text on Twitter and external blogs: URLs, domain names, IP addresses, and hash values related to cyberattacks [55].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, two Dense layers and the Softmax function are designed for detection and classification. [16], [31], [32], [14] apply CNN and BiLSTM neural networks as the basic framework to extract features of the domain information for NER in CTI. The differences among them are just attention mechanisms such as selfattention or multi-head attention allocating the corresponding weight of the extracted token feature, and tag decoders such as softmax or CRF obtaining association information among tags.…”
Section: Related Workmentioning
confidence: 99%
“…They also address Twitter's role in significant cyber events, such as the publication of multiple zero-day Denial-of-service (DDoS) vulnerabilities in Microsoft Windows, user reports on various DDoS attacks, the publication of sensitive data, and the origins of ransomware operations [7,8]. Shin et al [9] discussed that open data sources are a great place to find information about threats. Their work highlight the crucial aspect of the security of installed software and systems is the early detection of developing security threats from such information.…”
Section: Introductionmentioning
confidence: 99%