ISSN:2582-5208

www.irjmets.com

Paper Key : IRJ************633
Author: R. Sai Hanuman Koushik
Date Published: 12 Apr 2024
Abstract
Over time, new cyber security vulnerabilities emerge and cyber criminals exploit them in an increasingly smaller way. Recent events such as the Log4j vulnerability show positive aspects. A few hours after the vulnerability was reported, attackers began scanning the Internet for vulnerable hosts where they could distribute threats such as cryptocurrency miners and ransomware. Therefore, cybersecurity defense strategies must identify threats and their potential as quickly as possible to achieve protection success. While discovering new threats is important, it is difficult for security analysts because there is so much data and information that needs to be analyzed to find signs that a threat exists. In this sense, we propose a framework to identify and describe emerging threats, using Twitter messages as the source of events and Open Source Intelligence as a method aware of threat characteristics. The framework has three main components: Identifying cyber threats and their names; Analyzing threats by their target or targets, using two layers of machine learning to filter and classify tweets; and they can create threats based on their alarms. The main purpose of our work is a way to explain or describe threats to its purpose or objectives by providing more detail about the threats and their effects.
Paper File to download :