2019
DOI: 10.24251/hicss.2019.864
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Cyber Security Vulnerabilities through Reactive Programming

Abstract: We propose a software architectural model, which uses reactive programming for collecting and filtering live tweets and interpreting their potential correlation to software vulnerabilities and exploits. We aim to investigate if we could discover the existence of exploits for disclosed vulnerabilities in Twitter data streams. Reactive programming is used for performing filtering and querying of tweets to find potential exploits. The result of processing Twitter data streams with reactive programming could be br… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…(a) we work in cybersecurity and all anomalies must be detected, even if they are not considered dangerous, (b) these situations might trigger user intervention, which could be welcome in cybersecurity [29]. It would challenge perceptions that automated computations can resolve problems associated with these anomalies; (c) ALARMs are exit points from running the algorithm, which is needed to leave no stone unturned when implementing computations.…”
Section: The Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…(a) we work in cybersecurity and all anomalies must be detected, even if they are not considered dangerous, (b) these situations might trigger user intervention, which could be welcome in cybersecurity [29]. It would challenge perceptions that automated computations can resolve problems associated with these anomalies; (c) ALARMs are exit points from running the algorithm, which is needed to leave no stone unturned when implementing computations.…”
Section: The Evaluationmentioning
confidence: 99%
“…Considering that the focus in the algorithm is on decision making (and not on encryption) when managing keys, then this software application generated from the algorithms would be easily deployable within either Android/iOS operating environments, server-cloud computing, or even on cloud edges. A software architectural model could be generated from the formal conceptual model of the proposal as in [29,30,8], potentially opening doors for using many different software technologies. One would be to replace the traditional role of the provisioner in WSN with the reasoning mechanism available through Semantic Web Technologies and thus enable, for example, reasoning upon how to create a family of nodes according to the definitions from the proposal and define and maintain the Family Key Paradigm when circumstances change.…”
Section: The Evaluationmentioning
confidence: 99%
“…[88] has worked on an Al-based Penetration system using the RL, on interest toward learning repeat regular and hard Penetrationhappenings. [89], [90], [91], [92], [93], [94], [95], [ 96], [97], [89], [99], [100], [101], [102]…”
Section: Machine Learning and Data Mining Technologymentioning
confidence: 99%
“…There is some research work providing evidence that relevant and timely cybersecurity data is available on Twitter [32,41,44], specifically that some vulnerabilities were published on Twitter before their inclusion on vulnerability databases. However, these are case studies concerning a single vulnerability, and compare the tweets referring them solely with the NVD.…”
Section: Cybersecurity-related Osint Studiesmentioning
confidence: 99%