Abstract
In recent years, the number of cyber-attacks increased affecting different application types and targets. Many studies tried to focus on proposing solutions to detect imminent and current attacks. Besides that, they tried to extract useful information expecting these attacks in different ways. This study considered surveying recognizing the popular social online network Twitter data to detect and predict security attacks possibility. In this paper, we review and compare the relevant existing works that make use of Twitter streaming data to extract knowledge about current and imminent security cyber-attacks. The survey comparison is based on different effectiveness factors that are essential in the cyber domain for obtaining useful results. The work considered prediction factors investigating the detection scope, feature extraction technique, algorithm complexity, information summarization level, scalability over time, and performance measurements, all analysed to gain its prediction contribution. The comparison results are utilized for arranging previous work by a suggested unified (figure of merit) degree of achieving the factors. Thus, many improvements are proposed to enhance the top two models, SYNAPSE and DataFreq, to take a further step toward accurate predictions. This survey work is focussing on linking unrelated viewed studies aiming common prediction of cyber-security attacks in an attractive way, opening the door for more precise predictions of cyber-attacks research to come.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
AlKhodaidi T, Gutub A (2020a) Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09720-w ((in press))
AlKhodaidi T, Gutub A (2020b) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng 45:3403–3423. https://doi.org/10.1007/s13369-020-04422-9
Almutairi S, Gutub A, Al-Ghamdi M (2019) Image steganography to facilitate online students account system. Rev Bus Technol Res 16(2):43–49
Almutairi S, Gutub A, Al-Juaid N (2020) Motivating Teachers to use information technology in educational process within Saudi Arabia. Int J Technol Enhanc Learn 12(2):200–217. https://doi.org/10.1504/IJTEL.2020.10027118
Al-Qurashi A, Gutub A (2018) Reliable Secret Key Generation For Counting-Based Secret Sharing. J Comput Sci Comput Math 8(4):87–101. https://doi.org/10.20967/jcscm.2018.04.006
Al-Qurishi M, Hossain MS, Alrubaian M, Rahman SMM, Alamri A (2018) Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Trans Industr Inf 14(2):799–813
Alves F, Bettini A, Ferreira P, Bessani A (2019) Processing Tweets for Cybersecurity Threat Awareness. arXiv preprint arXiv:1904.02072.
Bin-Hureib E, Gutub A (2020) Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int J Comput Sci Netw Secur 20(8):1–8. https://doi.org/10.22937/IJCSNS.2020.20.08.1
Campana MG, Delmastro F (2017) Recommender systems for online and mobile social networks: a survey. Online Soc Netw Media 3:75–97
Campiolo R, Santos LAF, Batista DM, Gerosa MA (2013) Evaluating the utilization of Twitter messages as a source of security alerts. In: 28th Annual ACM Symposium on Applied Computing, pp 942–943.
Chang C, Teng Z, Zhang Y (2016) Expectation-regulated neural model for event mention extraction. In: Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp 400–410.
Dionísio N, Alves F, Ferreira P, Bessani A (2019) Cyberthreat detection from twitter using deep neural networks. arXiv preprint arXiv:1904.01127
Farooqi N, Gutub A, Khozium MO (2019) Smart community challenges: enabling IoT/M2M technology case study. Life Sci J 16(7):11–17. https://doi.org/10.7537/marslsj160719.03
Giachanou A, Crestani F (2016) Like it or not: s survey of twitter sentiment analysis methods. ACM Comput Surv 49(2):28
Gutub A (2015) Social Media & its Impact on e-governance. In: ME Smart Cities 2015–4th Middle East Smart Cities Summit, Dubai, UAE
Gutub A (2019) Utilizing Information Security Techniques as Digital Evidence for Cybercrime Activities. In: Keynote panel discussion in area: Cybercrimes and Digital Forensics: Updates and Solutions, presented at: Cybercrimes and Digital Forensics Forum 2019, Organized by Naif Arab University for Security Sciences (NAUSS), http://doi.org/https://doi.org/10.13140/RG.2.2.14885.45281
Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl 79:7951–7985. https://doi.org/10.1007/s11042-019-08427-x
Gutub A, Alkhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08695-y
Gutub A, Al-Qurashi A (2020) Secure shares generation via M-blocks partitioning for counting-based secret sharing. J Eng Res 8(3):91–117. https://doi.org/10.36909/jer.v8i3.8079
Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45:2631–2644. https://doi.org/10.1007/s13369-020-04413-w
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78:5591–5619. https://doi.org/10.1007/s11042-017-5293-6
Hassan F, Gutub A (2020) Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed Tools Appl 79(39):30087–30109. https://doi.org/10.1007/s11042-020-09513-1
Horrocks I, Patel-Schneider P, Boley H, Tabet S, Grosof B, Dean M (2004) SWRL: a semantic web rule language combining owl and RuleML. W3C Member Submission 21(79):1–31
Kergl D, Roedler R, Rodosek GD (2016) Detection of zero day exploits using real-time social media streams. Advances in Nature and Biologically Inspired Computing. Springer, New York, pp 405–416
Kheshaifaty N, Gutub A (2020) Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions. Int J Comput Sci Netw Secur 20(9):16–28. https://doi.org/10.22937/IJCSNS.2020.20.09.3
Le Sceller Q, Karbab E, Debbabi M, Iqbal F (2017) SONAR: automatic detection of cyber security events over the twitter stream. In: ACM international conference on availability, reliability and security, pp 23
Le B, Wang G, Nasim M, Babar M (2019) Gathering cyber threat intelligence from Twitter using novelty classification. In: IEEE international conference on cyberworlds (CW), pp 316–323
Mittal S, Das P, Mulwad V, Joshi A, Finin T (2016) Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp 860–867
Nunes E, Diab A, Gunn A, Marin E, Mishra V, Paliath V, Robertson J, Shakarian J, Thart A, Shakarian P (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: IEEE Conference on Intelligence and Security Informatics (ISI), pp 7–12. https://doi.org/10.1109/ISI.2016.7745435
Queiroz A, Keegan B, Mtenzi F (2017) Predicting Software Vulnerability Using Security Discussion in Social Media. In: European Conference on Cyber Warfare and Security (ECCWS), pp 628–634
Ritter A, Wright E, Casey W, Mitchell T (2015) Weakly supervised extraction of computer security events from twitter. In: International Conference on World Wide Web, pp 896–905
Rodriguez A, Okamura K (2019) Generating real time cyber situational awareness information through social media data mining. In: IEEE 43rd annual computer software and applications conference (COMPSAC) 2:502–507
Ruohonen J, Hyrynsalmi S, Leppänen V (2020) A mixed methods probe into the direct disclosure of software vulnerabilities. Comput Hum Behav 103:161–173. https://doi.org/10.1016/j.chb.2019.09.028
Sabottke C, Suciu O, Dumitras T (2015) Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits. In: USENIX security symposium, pp 1041–1056.
Samkari H, Gutub A (2019) Protecting medical records against cybercrimes within hajj period by 3-layer security. Recent Trends Inf Technol Appl 2(3):1–21. https://doi.org/10.5281/zenodo.3543455
Samtani S, Chinn R, Chen H, Nunamaker JF Jr (2017) Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. J Manag Inf Syst 34(4):1023–1053
Sapienza A, Bessi A, Damodaran S, Shakarian P, Lerman K, Ferrara E (2017) Early warnings of cyber threats in online discussions. In: IEEE International Conference on Data Mining Workshops (ICDMW), pp 667–674
Trabelsi S, Plate H, Abida A, Ben Aoun K, Zouaoui A, Missaoui C, Gharbi S, Ayari A (2015) Mining social networks for software vulnerabilities monitoring. In: IEEE International Conference on New Technologies, Mobility and Security (NTMS), pp 1–7. https://doi.org/10.1109/NTMS.2015.7266506
Trabelsi S, Mahmoud S, Zouaoui A (2016) Predictive Model for Exploit Kit based Attacks. In: International Conference on Security and Cryptography (SECRYPT), pp 477–482
Acknowledgements
Thanks to Taif University (TU) and Umm Al-Qura University (UQU) for motivating and supporting this research work and its collaboration. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: (20UQU0060DSR).
Funding
The work is supported by Deanship of Scientific Research at Umm Al-Qura University via Grant Code: (20UQU0060DSR).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Sahar Altalhi: Lecturer MS and Adnan Gutub: Professor of Cyber Security PhD.
Rights and permissions
About this article
Cite this article
Altalhi, S., Gutub, A. A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J Ambient Intell Human Comput 12, 10209–10221 (2021). https://doi.org/10.1007/s12652-020-02789-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02789-z