Proceedings of the Web Conference 2021 2021
DOI: 10.1145/3442381.3449797
|View full text |Cite
|
Sign up to set email alerts
|

#Twiti: Social Listening for Threat Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…We selected the 20 security keywords in Table 1 for the following experiments. Based on previous researches [54,55] and our preliminary study, we selected keywords most likely to be shared on Twitter for information about phishing sites. We also selected the same number of Security Keywords in Japanese as those translated from English.…”
Section: Collecting Tweetsmentioning
confidence: 99%
See 1 more Smart Citation
“…We selected the 20 security keywords in Table 1 for the following experiments. Based on previous researches [54,55] and our preliminary study, we selected keywords most likely to be shared on Twitter for information about phishing sites. We also selected the same number of Security Keywords in Japanese as those translated from English.…”
Section: Collecting Tweetsmentioning
confidence: 99%
“…In this study, we propose an approach that uses Twitter as a new observation point to immediately collect actual phishing situations encountered by users that have bypassed existing countermeasures and to understand the characteristics of such phishing. Some previous studies have also used Twitter as a source to extract nonphishing cyberattack information (e.g., vulnerability information and malware behavior information) [16,51,54,55] and limited phishing cyberattack information (e.g., search by fixed keywords or monitor only specific users) [52,55,58]. Specifically, these previous studies used Twitter posts of the cyberattack information by security experts, which allowed them to identify vulnerability information and indicator of compromises (IOCs) before they were published on the National Vulnerability Database [42] and Virus-Total [10].…”
Section: Introductionmentioning
confidence: 99%
“…As displayed in Table I, we propose a new DFIR approach combining threat intelligence and hunting steps to recategorize the actions in a specific way for fileless cryptojacking. It can also be applied to fileless ransomware threats accordance with the techniques that proposed in the literature [88], [6], [89], [90], [13], [44], [66].…”
Section: A Common Fileless Cryptojacking Malware In the Wildmentioning
confidence: 99%
“…It is very useful to merge threat hunting and DFIR with threat intelligence. Especially, Twitter is appearing as a more dynamic and prompt interactive platform for it [88]. Especially individual threat hunters feed the threat intelligence research with invaluable information.…”
Section: A Common Fileless Cryptojacking Malware In the Wildmentioning
confidence: 99%
“…Twitter is a tool for quickly obtaining information related to security incidents, such as IoCs and malware distribution sites, and [66] reported that Twitter captures ongoing malware threats better than public threat intelligence. Based on Twitter data, this section presents shared information about previous smishing attacks.…”
Section: Twitter Analysismentioning
confidence: 99%