2018
DOI: 10.1007/978-3-319-99828-2_15
|View full text |Cite
|
Sign up to set email alerts
|

The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter

Abstract: In the last couple of years, the number of software vulnerabilities and corresponding incidents increased significantly. In order to stay up-to-date about these new emerging threats, organizations have demonstrated an increased willingness to exchange information and knowledge about vulnerabilities, threats, incidents and countermeasures. Apart from dedicated sharing platforms or databases, information on vulnerabilities is frequently shared on Twitter and other social media platforms. So far, little is known … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 28 publications
0
9
0
Order By: Relevance
“…To the best of our knowledge, Sauerwein et al performed the most similar study to the one present on this paper [55]. For two years, the authors collected all tweets with a CVE-ID in its text.…”
Section: Cybersecurity-related Osint Studiesmentioning
confidence: 96%
See 1 more Smart Citation
“…To the best of our knowledge, Sauerwein et al performed the most similar study to the one present on this paper [55]. For two years, the authors collected all tweets with a CVE-ID in its text.…”
Section: Cybersecurity-related Osint Studiesmentioning
confidence: 96%
“…As the NVD is considered a standard for consulting vulnerability data, many research works use only the NVD as their vulnerability database (e.g., [42,47,50,55]). This is a natural choice since the NVD includes multiple resources for further understanding of the issue at hand.…”
Section: Vulnerability Database Comparisonmentioning
confidence: 99%
“…3 visualizes the second-level (2LD) and top-level (TLD) domain names extracted from the uniform resource locators (URLs) present in the hyperlinks, using the so-called public suffix list for the comparisons [16]. Although social media has been suspected to play an increasingly important role [31,44], the illustration clearly indicates that plugin vulnerabilities are commonly disseminated through very traditional channels for communicating security issues in the OSS context. In fact, social media is hardly even present.…”
Section: Overviewmentioning
confidence: 99%
“…The identification of characteristics of cyber-attacks is devoted to work [4,5,6]. The denial of service (DoS) cyber-attacks [7], the study of worms and botnet activity [8], the analysis of data on the number of cyber-attacks collected in a black hole [9] and in one-way motion [10] are investigated in the scientific literature. Studies [11,12] are devoted to classifying data into classes.…”
Section: Introductionmentioning
confidence: 99%