In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe CyberTwitter, a system to discover and analyze cybersecurity intelligence on Twitter and serve as a OSINT (Open–source intelligence) source. We analyze real time information updates, in form of tweets, to extract intelligence about various possible threats. We use the Semantic Web RDF to represent the intelligence gathered and SWRL rules to reason over extracted intelligence to issue alerts for security analysts.
Related Resources
-
Foreign Aid and Soft Power: Great Power Competition in Africa in the Early Twenty-First Century
Blair, Robert A., Robert Marty, and Philip Roessler. “Foreign Aid and Soft Power: Great Power Competition in Africa in the Early Twenty-First Century.” British Journal of Political Science 52, no. 3 (July 2022): 1355–76.
-
Geographical Blessing versus Geopolitical Curse: Great Power Security Agendas for the Black Sea Region and a Turkish Alternative
Aydın, Mustafa. “Geographical Blessing versus Geopolitical Curse: Great Power Security Agendas for the Black Sea Region and a Turkish Alternative.” Southeast European and Black Sea Studies 9, no. 3 (September 1, 2009): 271–85.
- Authors with Diverse Backgrounds