Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao
{"title":"Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding","authors":"Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao","doi":"arxiv-2409.08221","DOIUrl":null,"url":null,"abstract":"Twitter is recognized as a crucial platform for the dissemination and\ngathering of Cyber Threat Intelligence (CTI). Its capability to provide\nreal-time, actionable intelligence makes it an indispensable tool for detecting\nsecurity events, helping security professionals cope with ever-growing threats.\nHowever, the large volume of tweets and inherent noises of human-crafted tweets\npose significant challenges in accurately identifying security events. While\nmany studies tried to filter out event-related tweets based on keywords, they\nare not effective due to their limitation in understanding the semantics of\ntweets. Another challenge in security event detection from Twitter is the\ncomprehensive coverage of security events. Previous studies emphasized the\nimportance of early detection of security events, but they overlooked the\nimportance of event coverage. To cope with these challenges, in our study, we\nintroduce a novel event attribution-centric tweet embedding method to enable\nthe high precision and coverage of events. Our experiment result shows that the\nproposed method outperforms existing text and graph-based tweet embedding\nmethods in identifying security events. Leveraging this novel embedding\napproach, we have developed and implemented a framework, Tweezers, that is\napplicable to security event detection from Twitter for CTI gathering. This\nframework has demonstrated its effectiveness, detecting twice as many events\ncompared to established baselines. Additionally, we have showcased two\napplications, built on Tweezers for the integration and inspection of security\nevents, i.e., security event trend analysis and informative security user\nidentification.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"19 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.08221","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Twitter is recognized as a crucial platform for the dissemination and
gathering of Cyber Threat Intelligence (CTI). Its capability to provide
real-time, actionable intelligence makes it an indispensable tool for detecting
security events, helping security professionals cope with ever-growing threats.
However, the large volume of tweets and inherent noises of human-crafted tweets
pose significant challenges in accurately identifying security events. While
many studies tried to filter out event-related tweets based on keywords, they
are not effective due to their limitation in understanding the semantics of
tweets. Another challenge in security event detection from Twitter is the
comprehensive coverage of security events. Previous studies emphasized the
importance of early detection of security events, but they overlooked the
importance of event coverage. To cope with these challenges, in our study, we
introduce a novel event attribution-centric tweet embedding method to enable
the high precision and coverage of events. Our experiment result shows that the
proposed method outperforms existing text and graph-based tweet embedding
methods in identifying security events. Leveraging this novel embedding
approach, we have developed and implemented a framework, Tweezers, that is
applicable to security event detection from Twitter for CTI gathering. This
framework has demonstrated its effectiveness, detecting twice as many events
compared to established baselines. Additionally, we have showcased two
applications, built on Tweezers for the integration and inspection of security
events, i.e., security event trend analysis and informative security user
identification.