Abstract:We propose a software architectural model, which uses reactive programming for collecting and filtering live tweets and interpreting their potential correlation to software vulnerabilities and exploits. We aim to investigate if we could discover the existence of exploits for disclosed vulnerabilities in Twitter data streams. Reactive programming is used for performing filtering and querying of tweets to find potential exploits. The result of processing Twitter data streams with reactive programming could be br… Show more
“…(a) we work in cybersecurity and all anomalies must be detected, even if they are not considered dangerous, (b) these situations might trigger user intervention, which could be welcome in cybersecurity [29]. It would challenge perceptions that automated computations can resolve problems associated with these anomalies; (c) ALARMs are exit points from running the algorithm, which is needed to leave no stone unturned when implementing computations.…”
Section: The Evaluationmentioning
confidence: 99%
“…Considering that the focus in the algorithm is on decision making (and not on encryption) when managing keys, then this software application generated from the algorithms would be easily deployable within either Android/iOS operating environments, server-cloud computing, or even on cloud edges. A software architectural model could be generated from the formal conceptual model of the proposal as in [29,30,8], potentially opening doors for using many different software technologies. One would be to replace the traditional role of the provisioner in WSN with the reasoning mechanism available through Semantic Web Technologies and thus enable, for example, reasoning upon how to create a family of nodes according to the definitions from the proposal and define and maintain the Family Key Paradigm when circumstances change.…”
This paper proposes an algorithmic solution to Group Key Management (GKM) in Wireless Sensor Networks (WSN), which could address a single point of failure in cybersecurity. The paper moves away from the traditional (de)centralized and distributed solution in GKM and focuses on GKM decision making based on a) the context in which WSN and their nodes communicate, and b) the semantic which describes the environment where WSN and their nodes reside. The proposed algorithm defines which node, within the WSN, could start a re-keying process by generating a group key, and why/how this decision on the re-keying has been made. The algorithm is computable and thus it would be feasible to implement it in software applications built upon a set of WSN nodes in constantly changeable and dynamic mobile computing environments.
“…(a) we work in cybersecurity and all anomalies must be detected, even if they are not considered dangerous, (b) these situations might trigger user intervention, which could be welcome in cybersecurity [29]. It would challenge perceptions that automated computations can resolve problems associated with these anomalies; (c) ALARMs are exit points from running the algorithm, which is needed to leave no stone unturned when implementing computations.…”
Section: The Evaluationmentioning
confidence: 99%
“…Considering that the focus in the algorithm is on decision making (and not on encryption) when managing keys, then this software application generated from the algorithms would be easily deployable within either Android/iOS operating environments, server-cloud computing, or even on cloud edges. A software architectural model could be generated from the formal conceptual model of the proposal as in [29,30,8], potentially opening doors for using many different software technologies. One would be to replace the traditional role of the provisioner in WSN with the reasoning mechanism available through Semantic Web Technologies and thus enable, for example, reasoning upon how to create a family of nodes according to the definitions from the proposal and define and maintain the Family Key Paradigm when circumstances change.…”
This paper proposes an algorithmic solution to Group Key Management (GKM) in Wireless Sensor Networks (WSN), which could address a single point of failure in cybersecurity. The paper moves away from the traditional (de)centralized and distributed solution in GKM and focuses on GKM decision making based on a) the context in which WSN and their nodes communicate, and b) the semantic which describes the environment where WSN and their nodes reside. The proposed algorithm defines which node, within the WSN, could start a re-keying process by generating a group key, and why/how this decision on the re-keying has been made. The algorithm is computable and thus it would be feasible to implement it in software applications built upon a set of WSN nodes in constantly changeable and dynamic mobile computing environments.
“…[88] has worked on an Al-based Penetration system using the RL, on interest toward learning repeat regular and hard Penetrationhappenings. [89], [90], [91], [92], [93], [94], [95], [ 96], [97], [89], [99], [100], [101], [102]…”
Section: Machine Learning and Data Mining Technologymentioning
Today’s age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both techniques play a significant role in measuring vulnerability prediction accuracy. In the field of computer security, vulnerability is a fault that might be exploited as a risk artist that performs unlawful activities inside computer security. The attackers have several different fitting tools and they are taking advantage to operate software illegally and are using it for getting self-profit. Additionally, that helps to expose and identify the violence external. Weakness management remains a repeating exercise to identify, remediating, and justifying weaknesses. These exercises normally send software faults in computing security. The meaning of using weakness with the same risk might go to misperception. It is possible to have a major effect because of possible stability and the window of weakness presented a risk hole in the software and required to fruitfully finish and smoothly operate. A security room has to be set up (zero-day invaders). Software Security Faults stand serious among unavoidable complications in the realm of computer risk. In this study, we have provided a comprehensive review of three book chapters, more than a hundred research articles papers, and several associated papers of different work that have been studied within the capacity of SVA and discovery applying ML and data-mining techniques. The earlier work has been thoroughly read and an adequately comprehensive summary has been provided in table-1. ML techniques that can professionally handle these attacks and we expect the net result of this survey article to help indesigning the new detection model for identifying the above-mentioned attacks
“…There is some research work providing evidence that relevant and timely cybersecurity data is available on Twitter [32,41,44], specifically that some vulnerabilities were published on Twitter before their inclusion on vulnerability databases. However, these are case studies concerning a single vulnerability, and compare the tweets referring them solely with the NVD.…”
Open Source Intelligence (OSINT) has taken the interest of cybersecurity practitioners due to its completeness and timeliness. In particular, Twitter has proven to be a discussion hub regarding the latest vulnerabilities and exploits. In this paper, we present a study comparing vulnerability databases between themselves and against Twitter. Although there is evidence of OSINT advantages, no methodological studies have addressed the quality and benefits of the sources available. We compare the publishing dates of more than nine-thousand vulnerabilities in the sources considered. We show that NVD is not the most timely or the most complete vulnerability database, that Twitter provides timely and impactful security alerts, that using diverse OSINT sources provides better completeness and timeliness of vulnerabilities, and provide insights on how to capture cybersecurity-relevant tweets.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.