Proceedings of the 2018 Conference of the North American Chapter Of the Association for Computational Linguistics: Hu 2018
DOI: 10.18653/v1/n18-1147
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security

Abstract: This paper describes a novel application of NLP models to detect denial of service attacks using only social media as evidence. Individual networks are often slow in reporting attacks, so a detection system from public data could better assist a response to a broad attack across multiple services. We explore NLP methods to use social media as an indirect measure of network service status. We describe two learning frameworks for this task: a feed-forward neural network and a partially labeled LDA model. Both mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(26 citation statements)
references
References 15 publications
0
26
0
Order By: Relevance
“…• Neural networks classifier is used to (1) early detect and recognize DDoS attack of a traditional IDS as in [66] work that proposes rationale of time delay neural network for this purpose; (2) detect and defense against DDoS attack by a lightweight trainable method as in [67] and (3) automatically detect and classify DDoS attack and measure network service condition of social media servers as in [69].…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Neural networks classifier is used to (1) early detect and recognize DDoS attack of a traditional IDS as in [66] work that proposes rationale of time delay neural network for this purpose; (2) detect and defense against DDoS attack by a lightweight trainable method as in [67] and (3) automatically detect and classify DDoS attack and measure network service condition of social media servers as in [69].…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…Chambers et al [69], propose an innovative NLP neural network model application to detect DDoS attacks by only using social media as support. Private networks are generally slow in reporting attacks.…”
Section: ) Neural Networkmentioning
confidence: 99%
“…For the weakly supervised learning, they have annotated tweets containing the keyword "DDoS" out of the tweets written on the dates when the DDos attacks occurred as cybersecurity intelligence (CSI)-positive tweet data. Chambers et al have proposed a framework to analyze the DDoS attack using tweets according to the following steps: (1) collection of tweets written on the day when the DDoS attack occurred, (2) training them using the basic neural network, (3) detection of attack events from the trained model, and (4) extraction of the attack topics by analyzing the user's response to the attack using an LDA-based model [12]. Zong et al have collected tweets containing a keyword, "vulnerability", and have applied logistic regression to detect the existence of threats.…”
Section: Classification By the Cybersecurity Intelligencementioning
confidence: 99%
“…They have trained two anomaly detectors using centroid and one-class Support Vector Machine (SVM) [11]. Chambers et al have collected tweets containing the name of Distributed Denial of Service (DDoS) attacked organization and have performed time series analysis based on the frequency of tweets to forecast cyber threats [12]. Dionísio et al have collected the tweets containing cyber threat intelligence and have labeled them manually.…”
Section: Introductionmentioning
confidence: 99%
“…In [244] aims at the prediction of the likelihood of DDoS attacks by monitoring relevant text streams in social media, so that the level of security can be dynamic aimed at cost effectiveness. [245] aims at creating a novel application of NLP models to detect denial of service attacks using only social media as a source. It evaluates two learning algorithms for this task, both of which outperform the previous state-of-the-art techniquesa FFN and a partially labelled LDA model.…”
Section: K Social Media Data For Cyber Securitymentioning
confidence: 99%