Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
In the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security. As one of the world’s most popular social media sites, users post all kinds of messages on Twitter, from d...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-08-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/17/5922 |
id |
doaj-5823b8eef4654b2586f1afce38bb7958 |
---|---|
record_format |
Article |
spelling |
doaj-5823b8eef4654b2586f1afce38bb79582020-11-25T03:40:07ZengMDPI AGApplied Sciences2076-34172020-08-01105922592210.3390/app10175922Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTMYong Fang0Jian Gao1Zhonglin Liu2Cheng Huang3College of Cybersecurity, Sichuan University, Chengdu 610065, ChinaCollege of Cybersecurity, Sichuan University, Chengdu 610065, ChinaInformation Security Institute, Sichuan University, Chengdu 610065, ChinaCollege of Cybersecurity, Sichuan University, Chengdu 610065, ChinaIn the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security. As one of the world’s most popular social media sites, users post all kinds of messages on Twitter, from daily life to global news and political strategy. It can aggregate a large number of network security-related events promptly and provide a source of information flow about cyber threats. In this paper, for detecting cyber threat events on Twitter, we present a multi-task learning approach based on the natural language processing technology and machine learning algorithm of the Iterated Dilated Convolutional Neural Network (IDCNN) and Bidirectional Long Short-Term Memory (BiLSTM) to establish a highly accurate network model. Furthermore, we collect a network threat-related Twitter database from the public datasets to verify our model’s performance. The results show that the proposed model works well to detect cyber threat events from tweets and significantly outperform several baselines.https://www.mdpi.com/2076-3417/10/17/5922event detectioncyber threatTwitter datamachine learning |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yong Fang Jian Gao Zhonglin Liu Cheng Huang |
spellingShingle |
Yong Fang Jian Gao Zhonglin Liu Cheng Huang Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM Applied Sciences event detection cyber threat Twitter data machine learning |
author_facet |
Yong Fang Jian Gao Zhonglin Liu Cheng Huang |
author_sort |
Yong Fang |
title |
Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM |
title_short |
Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM |
title_full |
Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM |
title_fullStr |
Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM |
title_full_unstemmed |
Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM |
title_sort |
detecting cyber threat event from twitter using idcnn and bilstm |
publisher |
MDPI AG |
series |
Applied Sciences |
issn |
2076-3417 |
publishDate |
2020-08-01 |
description |
In the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security. As one of the world’s most popular social media sites, users post all kinds of messages on Twitter, from daily life to global news and political strategy. It can aggregate a large number of network security-related events promptly and provide a source of information flow about cyber threats. In this paper, for detecting cyber threat events on Twitter, we present a multi-task learning approach based on the natural language processing technology and machine learning algorithm of the Iterated Dilated Convolutional Neural Network (IDCNN) and Bidirectional Long Short-Term Memory (BiLSTM) to establish a highly accurate network model. Furthermore, we collect a network threat-related Twitter database from the public datasets to verify our model’s performance. The results show that the proposed model works well to detect cyber threat events from tweets and significantly outperform several baselines. |
topic |
event detection cyber threat Twitter data machine learning |
url |
https://www.mdpi.com/2076-3417/10/17/5922 |
work_keys_str_mv |
AT yongfang detectingcyberthreateventfromtwitterusingidcnnandbilstm AT jiangao detectingcyberthreateventfromtwitterusingidcnnandbilstm AT zhonglinliu detectingcyberthreateventfromtwitterusingidcnnandbilstm AT chenghuang detectingcyberthreateventfromtwitterusingidcnnandbilstm |
_version_ |
1724536297002893312 |