skip to main content
10.1145/3132847.3132866acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article
Public Access

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

Published: 06 November 2017 Publication History

Abstract

Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks. Our approach detects a broad range of cyber-attacks (e.g., distributed denial of service (DDoS) attacks, data breaches, and account hijacking) in a weakly supervised manner using just a small set of seed event triggers and requires no training or labeled samples. A new query expansion strategy based on convolution kernels and dependency parses helps model semantic structure and aids in identifying key event characteristics. Through a large-scale analysis over Twitter, we demonstrate that our approach consistently identifies and encodes events, outperforming existing methods.

References

[1]
Farzindar Atefeh and Wael Khreich. 2015. A Survey of Techniques for Event Detection in Twitter. Comput. Intell. 31, 1 (2015), 132--164.
[2]
Hila Becker, Dan Iter, Mor Naaman, and Luis Gravano. 2012. Identifying Content for Planned Events Across Social Media Sites. In Proc. WSDM'12.
[3]
Hila Becker, Mor Naaman, and Luis Gravano. 2012. Beyond Trending Topics: Real-World Event Identification on Twitter. In Proc. ICWSM'14.
[4]
Michael Davis, Weiru Liu, Paul Miller, and George Redpath. 2011. Detecting Anomalies in Graphs with Numeric Labels. In Proc. CIKM'11.
[5]
Qi Ding, Natallia Katenka, Paul Barford, Eric Kolaczyk, and Mark Crovella. 2012. Intrusion As (Anti)Social Communication: Characterization and Detection. In Proc. KDD'12.
[6]
W. Eberle and L. Holder. 2007. Discovering Structural Anomalies in Graph-Based Data. In Proc. ICDMW'07.
[7]
Brendan J Frey and Delbert Dueck. 2007. Clustering by passing messages between data points. Science 315, 5814 (2007), 972--976.
[8]
Heng Ji, Ralph Grishman, et al. 2008. Refining Event Extraction through Cross- Document Inference. In Proc. ACL'08.
[9]
Rohit J Kate. 2008. A dependency-based word subsequence kernel. In Proc. EMNLP'08.
[10]
Rupinder P. Khandpur, Taoran Ji, Yue Ning, Liang Zhao, Chang-Tien Lu, Erik R. Smith, Christopher Adams, and Naren Ramakrishnan. 2016. Determining Relative Airport Threats from News and Social Media. In Proc. AAAI'16.
[11]
Jon Kleinberg. 2002. Bursty and Hierarchical Structure in Streams. In Proc. KDD'02.
[12]
Bum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, and Tudor Dumitras. 2015. The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics. In Proc. CCS'15.
[13]
Wenke Lee and Salvatore J. Stolfo. 1998. Data Mining Approaches for Intrusion Detection. In Proc. USENIX Sec'98.
[14]
Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, and Vern Paxson. 2016. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. In Proc. USENIX Sec'16.
[15]
Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, and Raheem Beyah. 2016. Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence. In Proc. CCS'16.
[16]
Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey, and Mingyan Liu. 2015. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In Proc. USENIX Sec'15.
[17]
Yang Liu, Jing Zhang, Armin Sarabi, Mingyan Liu, Manish Karir, and Michael Bailey. 2015. Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities. In Proc. IWSPA'15.
[18]
Qiaozhu Mei and ChengXiang Zhai. 2005. Discovering evolutionary theme patterns from text: an exploration of temporal text mining. In Proc. KDD'05.
[19]
A. Modi, Z. Sun, A. Panwar, T. Khairnar, Z. Zhao, A. Doup, G. J. Ahn, and P. Black. 2016. Towards Automated Threat Intelligence Fusion. In Proc. IEEE CIC'16.
[20]
Sathappan Muthiah, Bert Huang, Jaime Arredondo, David Mares, Lise Getoor, Graham Katz, and Naren Ramakrishnan. 2015. Planned Protest Modeling in News and Social Media. In Proc. AAAI'15.
[21]
Caleb C. Noble and Diane J. Cook. 2003. Graph-based Anomaly Detection. In Proc. KDD'03.
[22]
Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash, V. S. Subrahmanian, and Benjamin Wang. 2016. Understanding the Relationship between Human Behavior and Susceptibility to Cyber-Attacks: A Data-Driven Approach. In Proc. TIST'16.
[23]
J. Piskorski, H. Tanev, and A. Balahur. 2013. Exploiting Twitter for Border Security-Related Intelligence Gathering. In Proc. EISIC'13.
[24]
Naren Ramakrishnan et al. 2014. "Beating the News" with EMBERS: Forecasting Civil Unrest Using Open Source Indicators. In Proc. KDD'14.
[25]
Radim Rehurek and Petr Sojka. 2010. Software framework for topic modelling with large corpora. In Proc. LREC Workshop of NLP Frameworks.
[26]
Alan Ritter, Mausam, Oren Etzioni, and Sam Clark. 2012. Open Domain Event Extraction from Twitter. In Proc. KDD'12.
[27]
Alan Ritter, Evan Wright, William Casey, and Tom Mitchell. 2015. Weakly Supervised Extraction of Computer Security Events from Twitter. In Proc. WWW'15.
[28]
Carl Sabottke, Octavian Suciu, and Tudor Dumitras. 2015. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. In Proc. USENIX Sec'15.
[29]
Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: real-time event detection by social sensors. In Proc. WWW'10.
[30]
Gerard Salton and Michael J McGill. 1986. Introduction to modern information retrieval. (1986).
[31]
Alessio Signorini, Alberto Maria Segre, and Philip M Polgreen. 2011. The use of Twitter to track levels of disease activity and public concern in the US during the influenza A H1N1 pandemic. PloS one 6, 5 (2011), e19467.
[32]
Kyle Soska and Nicolas Christin. 2014. Automatically Detecting Vulnerable Websites Before They Turn Malicious. In Proc. USENIX Sec'14.
[33]
Hristo Tanev, Maud Ehrmann, Jakub Piskorski, and Vanni Zavarella. 2012. Enhancing Event Descriptions through Twitter Mining. In Proc. ICWSM'14.
[34]
Flora S. Tsai and Kap Luk Chan. 2007. Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. In Proc. PAISI'07.
[35]
Xiaofeng Wang, Matthew S. Gerber, and Donald E. Brown. 2012. Automatic Crime Prediction Using Events Extracted from Twitter Posts. In Proc. SBP'12.
[36]
David J. Weller-Fahy. 2017. Towards Finding Malicious Cyber Discussions in Social Media. In Proc. AICS'17.
[37]
Liang Zhao, Feng Chen, Jing Dai, Ting Hua, Chang-Tien Lu, and Naren Ramakrishnan. 2014. Unsupervised spatial event detection in targeted domains with applications to civil unrest modeling. PloS one 9, 10 (2014), e110206.
[38]
Xiangmin Zhou and Lei Chen. 2014. Event detection over twitter social media streams. The VLDB Journal 23, 3 (2014), 381--400.
[39]
Ziyun Zhu and Tudor Dumitras. 2016. FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature. In Proc. CCS'16.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '17: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management
November 2017
2604 pages
ISBN:9781450349185
DOI:10.1145/3132847
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyber attacks
  2. cyber security
  3. dynamic query expansion
  4. event detection
  5. social media
  6. twitter

Qualifiers

  • Research-article

Funding Sources

Conference

CIKM '17
Sponsor:

Acceptance Rates

CIKM '17 Paper Acceptance Rate 171 of 855 submissions, 20%;
Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)683
  • Downloads (Last 6 weeks)82
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media