CyberTwitter: Using Twitter to Generate Alerts for Cybersecurity Threats and Vulnerabilities

  • Citation: Mittal, Sudip, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, and Tim Finin. “CyberTwitter: Using Twitter to Generate Alerts for Cybersecurity Threats and Vulnerabilities.” Institute of Electrical and Electronics Engineers, 2016.
    • Topics:
    • Conflict and Security
    • Keywords:
    • cybersecurity intelligence
    • threats
    • CERT alerts
    • CyberTwitter

In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe CyberTwitter, a system to discover and analyze cybersecurity intelligence on Twitter and serve as a OSINT (Open–source intelligence) source. We analyze real time information updates, in form of tweets, to extract intelligence about various possible threats. We use the Semantic Web RDF to represent the intelligence gathered and SWRL rules to reason over extracted intelligence to issue alerts for security analysts.

Related Resources

  • Criminal Justice, Artificial Intelligence Systems, and Human Rights

    Završnik, Aleš. “Criminal Justice, Artificial Intelligence Systems, and Human Rights.” ERA Forum 20, no. 4 (March 1, 2020): 567–83.

    • Authors with Diverse Backgrounds
    Keywords: Criminal Justice, Human Rights, Automation, Algorithms, Artificial Intelligence, Fair Trial
  • Racial, Skin Tone, and Sex Disparities in Automated Proctoring Software

    Yoder-Himes, Deborah R., Alina Asif, Kaelin Kinney, Tiffany J. Brandt, Rhiannon E. Cecil, Paul R. Himes, Cara Cashon, Rachel M. P. Hopp, and Edna Ross. “Racial, Skin Tone, and Sex Disparities in Automated Proctoring Software.” Frontiers in Education 7 (September 20, 2022).

    • Authors with Diverse Backgrounds