Document Type
Conference Paper
Rights
Available under a Creative Commons Attribution Non-Commercial Share Alike 4.0 International Licence
Disciplines
Computer Sciences
Abstract
Abstract—Cyber security is striving to find new forms of protection against hacker attacks. An emerging approach nowadays is the investigation of security-related messages exchanged on Deep/Dark Web and even Surface Web channels. This approach can be supported by the use of supervised machine learning models and text mining techniques. In our work, we compare a variety of machine learning algorithms, text representations and dimension reduction approaches for the detection accuracies of software-vulnerability-related communications. Given the imbalanced nature of the three public datasets used, we investigate appropriate sampling approaches to boost detection accuracies of our models. In addition, we examine how feature reduction techniques, such as Document Frequency Reduction, Chi-square and Singular Value Decomposition (SVD) can be used to reduce the number of features of the model without impacting the detection performance. We conclude that: (1) a Support Vector Machine (SVM) algorithm used with traditional Bag of Words achieved highest accuracies (2) The increase of the minority class with Random Oversampling technique improves the detection performance of the model by 5% on average, and (3) The number of features of the model can be reduced by up to 10% without affecting the detection performance. Also, we have provided the labelled dataset used in this work for further research. These findings can be used to support Cyber Security Threat Intelligence (CTI) with respect to the use of text mining techniques for detecting security-related communication
DOI
https://doi.org/10.21427/h5bt-7s13
Recommended Citation
Queiroz, A., Mckeever, S. & Keegan, B. (2019) Eavesdropping Hackers: Detecting Software Vulnerability Communication on Social Media Using Text Mining, The Fourth International Conference on Cyber-Technologies and Cyber-Systems (Cyber 2019), Porto, Portugal. doi:10.21427/h5bt-7s13
Publication Details
Pages: 41 to 48
Copyright: Copyright (c) IARIA, 2019
Publication date: September 22, 2019
Published in: conference
CYBER 2019, The Fourth International Conference on Cyber-Technologies and Cyber-Systems // View article cyber_2019_3_30_80058ISSN: 2519-8599
ISBN: 978-1-61208-743-6
Location: Porto, Portugal
Dates: from September 22, 2019 to September 26, 2019