Skip to main content
Log in

A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In recent years, the number of cyber-attacks increased affecting different application types and targets. Many studies tried to focus on proposing solutions to detect imminent and current attacks. Besides that, they tried to extract useful information expecting these attacks in different ways. This study considered surveying recognizing the popular social online network Twitter data to detect and predict security attacks possibility. In this paper, we review and compare the relevant existing works that make use of Twitter streaming data to extract knowledge about current and imminent security cyber-attacks. The survey comparison is based on different effectiveness factors that are essential in the cyber domain for obtaining useful results. The work considered prediction factors investigating the detection scope, feature extraction technique, algorithm complexity, information summarization level, scalability over time, and performance measurements, all analysed to gain its prediction contribution. The comparison results are utilized for arranging previous work by a suggested unified (figure of merit) degree of achieving the factors. Thus, many improvements are proposed to enhance the top two models, SYNAPSE and DataFreq, to take a further step toward accurate predictions. This survey work is focussing on linking unrelated viewed studies aiming common prediction of cyber-security attacks in an attractive way, opening the door for more precise predictions of cyber-attacks research to come.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • AlKhodaidi T, Gutub A (2020a) Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09720-w ((in press))

    Article  Google Scholar 

  • AlKhodaidi T, Gutub A (2020b) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng 45:3403–3423. https://doi.org/10.1007/s13369-020-04422-9

    Article  Google Scholar 

  • Almutairi S, Gutub A, Al-Ghamdi M (2019) Image steganography to facilitate online students account system. Rev Bus Technol Res 16(2):43–49

    Google Scholar 

  • Almutairi S, Gutub A, Al-Juaid N (2020) Motivating Teachers to use information technology in educational process within Saudi Arabia. Int J Technol Enhanc Learn 12(2):200–217. https://doi.org/10.1504/IJTEL.2020.10027118

    Article  Google Scholar 

  • Al-Qurashi A, Gutub A (2018) Reliable Secret Key Generation For Counting-Based Secret Sharing. J Comput Sci Comput Math 8(4):87–101. https://doi.org/10.20967/jcscm.2018.04.006

    Article  Google Scholar 

  • Al-Qurishi M, Hossain MS, Alrubaian M, Rahman SMM, Alamri A (2018) Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Trans Industr Inf 14(2):799–813

    Article  Google Scholar 

  • Alves F, Bettini A, Ferreira P, Bessani A (2019) Processing Tweets for Cybersecurity Threat Awareness. arXiv preprint arXiv:1904.02072.

  • Bin-Hureib E, Gutub A (2020) Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int J Comput Sci Netw Secur 20(8):1–8. https://doi.org/10.22937/IJCSNS.2020.20.08.1

    Article  Google Scholar 

  • Campana MG, Delmastro F (2017) Recommender systems for online and mobile social networks: a survey. Online Soc Netw Media 3:75–97

    Article  Google Scholar 

  • Campiolo R, Santos LAF, Batista DM, Gerosa MA (2013) Evaluating the utilization of Twitter messages as a source of security alerts. In: 28th Annual ACM Symposium on Applied Computing, pp 942–943.

  • Chang C, Teng Z, Zhang Y (2016) Expectation-regulated neural model for event mention extraction. In: Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp 400–410.

  • Dionísio N, Alves F, Ferreira P, Bessani A (2019) Cyberthreat detection from twitter using deep neural networks. arXiv preprint arXiv:1904.01127

  • Farooqi N, Gutub A, Khozium MO (2019) Smart community challenges: enabling IoT/M2M technology case study. Life Sci J 16(7):11–17. https://doi.org/10.7537/marslsj160719.03

    Article  Google Scholar 

  • Giachanou A, Crestani F (2016) Like it or not: s survey of twitter sentiment analysis methods. ACM Comput Surv 49(2):28

    Article  Google Scholar 

  • Gutub A (2015) Social Media & its Impact on e-governance. In: ME Smart Cities 2015–4th Middle East Smart Cities Summit, Dubai, UAE

  • Gutub A (2019) Utilizing Information Security Techniques as Digital Evidence for Cybercrime Activities. In: Keynote panel discussion in area: Cybercrimes and Digital Forensics: Updates and Solutions, presented at: Cybercrimes and Digital Forensics Forum 2019, Organized by Naif Arab University for Security Sciences (NAUSS), http://doi.org/https://doi.org/10.13140/RG.2.2.14885.45281

  • Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl 79:7951–7985. https://doi.org/10.1007/s11042-019-08427-x

    Article  Google Scholar 

  • Gutub A, Alkhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08695-y

    Article  Google Scholar 

  • Gutub A, Al-Qurashi A (2020) Secure shares generation via M-blocks partitioning for counting-based secret sharing. J Eng Res 8(3):91–117. https://doi.org/10.36909/jer.v8i3.8079

    Article  Google Scholar 

  • Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45:2631–2644. https://doi.org/10.1007/s13369-020-04413-w

    Article  Google Scholar 

  • Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78:5591–5619. https://doi.org/10.1007/s11042-017-5293-6

    Article  Google Scholar 

  • Hassan F, Gutub A (2020) Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed Tools Appl 79(39):30087–30109. https://doi.org/10.1007/s11042-020-09513-1

    Article  Google Scholar 

  • Horrocks I, Patel-Schneider P, Boley H, Tabet S, Grosof B, Dean M (2004) SWRL: a semantic web rule language combining owl and RuleML. W3C Member Submission 21(79):1–31

  • Kergl D, Roedler R, Rodosek GD (2016) Detection of zero day exploits using real-time social media streams. Advances in Nature and Biologically Inspired Computing. Springer, New York, pp 405–416

    Chapter  Google Scholar 

  • Kheshaifaty N, Gutub A (2020) Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions. Int J Comput Sci Netw Secur 20(9):16–28. https://doi.org/10.22937/IJCSNS.2020.20.09.3

    Article  Google Scholar 

  • Le Sceller Q, Karbab E, Debbabi M, Iqbal F (2017) SONAR: automatic detection of cyber security events over the twitter stream. In: ACM international conference on availability, reliability and security, pp 23

  • Le B, Wang G, Nasim M, Babar M (2019) Gathering cyber threat intelligence from Twitter using novelty classification. In: IEEE international conference on cyberworlds (CW), pp 316–323

  • Mittal S, Das P, Mulwad V, Joshi A, Finin T (2016) Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp 860–867

  • Nunes E, Diab A, Gunn A, Marin E, Mishra V, Paliath V, Robertson J, Shakarian J, Thart A, Shakarian P (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: IEEE Conference on Intelligence and Security Informatics (ISI), pp 7–12. https://doi.org/10.1109/ISI.2016.7745435

  • Queiroz A, Keegan B, Mtenzi F (2017) Predicting Software Vulnerability Using Security Discussion in Social Media. In: European Conference on Cyber Warfare and Security (ECCWS), pp 628–634

  • Ritter A, Wright E, Casey W, Mitchell T (2015) Weakly supervised extraction of computer security events from twitter. In: International Conference on World Wide Web, pp 896–905

  • Rodriguez A, Okamura K (2019) Generating real time cyber situational awareness information through social media data mining. In: IEEE 43rd annual computer software and applications conference (COMPSAC) 2:502–507

  • Ruohonen J, Hyrynsalmi S, Leppänen V (2020) A mixed methods probe into the direct disclosure of software vulnerabilities. Comput Hum Behav 103:161–173. https://doi.org/10.1016/j.chb.2019.09.028

    Article  Google Scholar 

  • Sabottke C, Suciu O, Dumitras T (2015) Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits. In: USENIX security symposium, pp 1041–1056.

  • Samkari H, Gutub A (2019) Protecting medical records against cybercrimes within hajj period by 3-layer security. Recent Trends Inf Technol Appl 2(3):1–21. https://doi.org/10.5281/zenodo.3543455

    Article  Google Scholar 

  • Samtani S, Chinn R, Chen H, Nunamaker JF Jr (2017) Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. J Manag Inf Syst 34(4):1023–1053

    Article  Google Scholar 

  • Sapienza A, Bessi A, Damodaran S, Shakarian P, Lerman K, Ferrara E (2017) Early warnings of cyber threats in online discussions. In: IEEE International Conference on Data Mining Workshops (ICDMW), pp 667–674

  • Trabelsi S, Plate H, Abida A, Ben Aoun K, Zouaoui A, Missaoui C, Gharbi S, Ayari A (2015) Mining social networks for software vulnerabilities monitoring. In: IEEE International Conference on New Technologies, Mobility and Security (NTMS), pp 1–7. https://doi.org/10.1109/NTMS.2015.7266506

  • Trabelsi S, Mahmoud S, Zouaoui A (2016) Predictive Model for Exploit Kit based Attacks. In: International Conference on Security and Cryptography (SECRYPT), pp 477–482

Download references

Acknowledgements

Thanks to Taif University (TU) and Umm Al-Qura University (UQU) for motivating and supporting this research work and its collaboration. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: (20UQU0060DSR).

Funding

The work is supported by Deanship of Scientific Research at Umm Al-Qura University via Grant Code: (20UQU0060DSR).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Gutub.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Sahar Altalhi: Lecturer MS and Adnan Gutub: Professor of Cyber Security PhD.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Altalhi, S., Gutub, A. A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J Ambient Intell Human Comput 12, 10209–10221 (2021). https://doi.org/10.1007/s12652-020-02789-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02789-z

Keywords

Navigation