Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper Data

被引:1
|
作者
Ural, Ozgur [1 ]
Acarturk, Cengiz [1 ,2 ]
机构
[1] Middle East Tech Univ, Informat Inst, Cyber Secur Grad Program, Ankara, Turkey
[2] Middle East Tech Univ, Informat Inst, Cognit Sci Grad Program, Ankara, Turkey
关键词
Cyber Security; Event Detection; Turkish; Twitter; Hurriyet Newspaper;
D O I
10.5220/0010201600660076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity experts scan the internet and face security events that influence user and institutions. An information security analyst regularly examines sources to stay up to date on security events in the domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) attack on a government agency website. The earlier they detect and understand the threats, the longer the time remaining to alleviate the obstacle and to investigate the event. Therefore, information security analysts need to establish and keep situational awareness active about the security events and their likely effects. However, due to the large volume of information flow, it may be difficult for security analysts and researchers to detect and analyze security events timely. It is important to detect security events timely. This study aims at developing tools that are able to provide timely reports of security incidents. A recent challenge is that the internet community use different languages to share information. For instance, information about security events in Turkey is mostly shared on the internet in Turkish. The present study investigates automatic detection of security incidents in Turkish by processing data from Twitter and news media. It proposes an automatic prototype, Turkish-specific software system that can detect cybersecurity events in real time.
引用
收藏
页码:66 / 76
页数:11
相关论文
共 50 条
  • [1] SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream
    Le Sceller, Quentin
    Karbab, ElMouatez Billah
    Debbabi, Mourad
    Iqbal, Farkhund
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [2] Automatic Unsupervised Polarity Detection on a Twitter Data Stream
    Terrana, Diego
    Augello, Agnese
    Pilato, Giovanni
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2014, : 128 - 134
  • [3] Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example
    Aslan, Cagri B.
    Saglam, Rahime Belen
    Li, Shujun
    [J]. SMSOCIETY'18: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL MEDIA AND SOCIETY, 2018, : 236 - 240
  • [4] Alert Generation Framework from Twitter Data Stream During Disaster Events
    Hasla, M.
    Swaraj, K. P.
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 534 - 541
  • [5] Separating the Wheat from the Chaff : Events Detection in Twitter Data
    Ferracani, Andrea
    Pezzatini, Daniele
    Landucci, Lea
    Becchi, Giuseppe
    Del Bimbo, Alberto
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL WORKSHOP ON CONTENT-BASED MULTIMEDIA INDEXING (CBMI), 2017,
  • [6] Twitter spammer detection using data stream clustering
    Miller, Zachary
    Dickinson, Brian
    Deitrick, William
    Hu, Wei
    Wang, Alex Hai
    [J]. INFORMATION SCIENCES, 2014, 260 : 64 - 73
  • [7] A survey on real-time event detection from the Twitter data stream
    Hasan, Mahmud
    Orgun, Mehmet A.
    Schwitter, Rolf
    [J]. JOURNAL OF INFORMATION SCIENCE, 2018, 44 (04) : 443 - 463
  • [8] Topical Anomaly Detection From Twitter Stream
    Anantharam, Pramod
    Thirunarayan, Krishnaprasad
    Sheth, Amit
    [J]. PROCEEDINGS OF THE 3RD ANNUAL ACM WEB SCIENCE CONFERENCE, 2012, 2012, : 11 - 14
  • [9] Automatic Detection of Jet Stream on Numerical Data
    Wang, Pingping
    Wang, Ping
    Wang, Cong
    [J]. PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 5172 - 5176
  • [10] Collaborative Detection of Cyber Security Threats in Big Data
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 186 - 193