Analysis of trending topics and text-based channels of information delivery in cybersecurity

T Wu, W Ma, S Wen, X Xia, C Paris, S Nepal… - ACM Transactions on …, 2021 - dl.acm.org
ACM Transactions on Internet Technology (TOIT), 2021dl.acm.org
Computer users are generally faced with difficulties in making correct security decisions.
While an increasingly fewer number of people are trying or willing to take formal security
training, online sources including news, security blogs, and websites are continuously
making security knowledge more accessible. Analysis of cybersecurity texts from this grey
literature can provide insights into the trending topics and identify current security issues as
well as how cyber attacks evolve over time. These in turn can support researchers and …
Computer users are generally faced with difficulties in making correct security decisions. While an increasingly fewer number of people are trying or willing to take formal security training, online sources including news, security blogs, and websites are continuously making security knowledge more accessible. Analysis of cybersecurity texts from this grey literature can provide insights into the trending topics and identify current security issues as well as how cyber attacks evolve over time. These in turn can support researchers and practitioners in predicting and preparing for these attacks. Comparing different sources may facilitate the learning process for normal users by creating the patterns of the security knowledge gained from different sources. Prior studies neither systematically analysed the wide range of digital sources nor provided any standardisation in analysing the trending topics from recent security texts. Moreover, existing topic modelling methods are not capable of identifying the cybersecurity concepts completely and the generated topics considerably overlap. To address this issue, we propose a semi-automated classification method to generate comprehensive security categories to analyse trending topics. We further compare the identified 16 security categories across different sources based on their popularity and impact. We have revealed several surprising findings as follows: (1) The impact reflected from cybersecurity texts strongly correlates with the monetary loss caused by cybercrimes, (2) security blogs have produced the context of cybersecurity most intensively, and (3) websites deliver security information without caring about timeliness much.
ACM Digital Library