Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM

In the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security. As one of the world’s most popular social media sites, users post all kinds of messages on Twitter, from d...

Full description

Bibliographic Details
Main Authors: Yong Fang, Jian Gao, Zhonglin Liu, Cheng Huang
Format: Article
Language:English
Published: MDPI AG 2020-08-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/17/5922
id doaj-5823b8eef4654b2586f1afce38bb7958
record_format Article
spelling doaj-5823b8eef4654b2586f1afce38bb79582020-11-25T03:40:07ZengMDPI AGApplied Sciences2076-34172020-08-01105922592210.3390/app10175922Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTMYong Fang0Jian Gao1Zhonglin Liu2Cheng Huang3College of Cybersecurity, Sichuan University, Chengdu 610065, ChinaCollege of Cybersecurity, Sichuan University, Chengdu 610065, ChinaInformation Security Institute, Sichuan University, Chengdu 610065, ChinaCollege of Cybersecurity, Sichuan University, Chengdu 610065, ChinaIn the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security. As one of the world’s most popular social media sites, users post all kinds of messages on Twitter, from daily life to global news and political strategy. It can aggregate a large number of network security-related events promptly and provide a source of information flow about cyber threats. In this paper, for detecting cyber threat events on Twitter, we present a multi-task learning approach based on the natural language processing technology and machine learning algorithm of the Iterated Dilated Convolutional Neural Network (IDCNN) and Bidirectional Long Short-Term Memory (BiLSTM) to establish a highly accurate network model. Furthermore, we collect a network threat-related Twitter database from the public datasets to verify our model’s performance. The results show that the proposed model works well to detect cyber threat events from tweets and significantly outperform several baselines.https://www.mdpi.com/2076-3417/10/17/5922event detectioncyber threatTwitter datamachine learning
collection DOAJ
language English
format Article
sources DOAJ
author Yong Fang
Jian Gao
Zhonglin Liu
Cheng Huang
spellingShingle Yong Fang
Jian Gao
Zhonglin Liu
Cheng Huang
Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
Applied Sciences
event detection
cyber threat
Twitter data
machine learning
author_facet Yong Fang
Jian Gao
Zhonglin Liu
Cheng Huang
author_sort Yong Fang
title Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
title_short Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
title_full Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
title_fullStr Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
title_full_unstemmed Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
title_sort detecting cyber threat event from twitter using idcnn and bilstm
publisher MDPI AG
series Applied Sciences
issn 2076-3417
publishDate 2020-08-01
description In the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security. As one of the world’s most popular social media sites, users post all kinds of messages on Twitter, from daily life to global news and political strategy. It can aggregate a large number of network security-related events promptly and provide a source of information flow about cyber threats. In this paper, for detecting cyber threat events on Twitter, we present a multi-task learning approach based on the natural language processing technology and machine learning algorithm of the Iterated Dilated Convolutional Neural Network (IDCNN) and Bidirectional Long Short-Term Memory (BiLSTM) to establish a highly accurate network model. Furthermore, we collect a network threat-related Twitter database from the public datasets to verify our model’s performance. The results show that the proposed model works well to detect cyber threat events from tweets and significantly outperform several baselines.
topic event detection
cyber threat
Twitter data
machine learning
url https://www.mdpi.com/2076-3417/10/17/5922
work_keys_str_mv AT yongfang detectingcyberthreateventfromtwitterusingidcnnandbilstm
AT jiangao detectingcyberthreateventfromtwitterusingidcnnandbilstm
AT zhonglinliu detectingcyberthreateventfromtwitterusingidcnnandbilstm
AT chenghuang detectingcyberthreateventfromtwitterusingidcnnandbilstm
_version_ 1724536297002893312