Proceedings of the 2019 Conference of the North 2019
DOI: 10.18653/v1/n19-1138
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Cybersecurity Events from Noisy Short Text

Abstract: It is very critical to analyze messages shared over social networks for cyber threat intelligence and cyber-crime prevention. In this study, we propose a method that leverages both domain-specific word embeddings and task-specific features to detect cyber security events from tweets. Our model employs a convolutional neural network (CNN) and a long short-term memory (LSTM) recurrent neural network which takes word level metaembeddings as inputs and incorporates contextual embeddings to classify noisy short tex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…They modeled the problem as a binary classification task and used a neural network approach. [38] also detected references to cybersecurity events from the Twitter data stream, but did not determine a specific type of cybersecurity attack. [11] proposed an analysis that annotated documents in a collection of "advanced persistent threat" (APT) reports with attribute labels from the Malware Attribute Enumeration (MAEC) vocabularies.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They modeled the problem as a binary classification task and used a neural network approach. [38] also detected references to cybersecurity events from the Twitter data stream, but did not determine a specific type of cybersecurity attack. [11] proposed an analysis that annotated documents in a collection of "advanced persistent threat" (APT) reports with attribute labels from the Malware Attribute Enumeration (MAEC) vocabularies.…”
Section: Related Workmentioning
confidence: 99%
“…While [29] and [26] describe a schema and dataset similar to what we use here, their underlying schemas are not as semantically rich or detailed. [1], [6], [21], [30], [33], [38] used keyword searching on Twitter data stream to detect or predict cybersecurity events. They differ from our work, which focuses on extracting the comprehensive information about cybersecurity events.…”
Section: Related Workmentioning
confidence: 99%
“…People also share cyber threat events in their tweets, such as zero-day exploits, ransomware, data leaks, security breaches, DDoS, vulnerabilities, etc. [4]. Twitter can thus help researchers measure the interest raised by specific topics and automatically detect some unexpected cyber threat events in real-time [5].…”
Section: Introductionmentioning
confidence: 99%