Social Media Zero-Day Attack Detection Using TensorFlow
Abstract
:1. Introduction
- It addresses the importance of ongoing efforts in developing intelligence software capable of detecting dangerous language and preventing potential attacks globally. The study highlights the relevance of applications like CyberTwitter, which aid in data collection and threat identification. However, it emphasizes relying on Open-Source Threat Intelligence (OSINT) platforms to achieve these goals. The researchers have developed codes specifically for data collection from Twitter, focusing on vulnerability assessment and utilizing it as a valuable OSINT source for identifying potential threats. Twitter was selected for this study due to its widespread social media use. The researchers have developed a code that analyzes tweets specifically for relevant terms related to threats.
- Our primary focus is heightened performance in identifying zero-day attacks on social media. We gained access to tweets from individuals who had shared zero-day attacks in the past. We harnessed NLTK tools to capture target words in various languages, integrating these with Tensorflow modules. NLTK was chosen for text analysis due to its robust capabilities in NLP, text mining, and language tasks. NLTK’s preprocessing complements TensorFlow’s models, improving accuracy. The NLTK and TensorFlow combination proves effective in various scenarios. This approach allowed us to compile all zero-day-related terms across different languages on Twitter.
- The code utilizes machine learning techniques to identify additional similar words or phrases associated with potential threats. By examining the content of tweets, the code aims to determine whether any tweets contain information or discussions pertaining to security threats. Moreover, this code can be enhanced by incorporating the ability to learn new phrases, even beyond the realm of the security context. This flexibility allows the program to adapt and recognize emerging patterns or language trends that may be relevant to identifying potential threats.
- Another crucial aspect of the code implemented in this research is its capability to identify the user’s identity and location. This feature provides an added layer of information that can assist in analyzing and contextualizing the detected threats.
2. Research Background
2.1. Zero-Day Attack
2.2. Cybersecurity on Twitter
2.3. Related Literature
3. Research Method
3.1. Python Programming Language
3.2. TensorFlow Machine Learning Library
3.3. NLTK Toolkit
4. Experimental Results
4.1. Code Developed
4.2. Searched Words
4.3. Performance Evaluation
5. Discussion and Research Limitations
6. Conclusions and Future Research Directions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Bu, S.-J.; Cho, S.-B. Deep character-level anomaly detection based on a convolutional autoencoder for zero-day phishing URL detection. Electronics 2021, 10, 1492. [Google Scholar] [CrossRef]
- Statista. Number of Internet and Social Media Users Worldwide as of April 2023. Available online: https://www.statista.com/statistics/617136/digital-population-worldwide/ (accessed on 26 June 2023).
- Marinho, R.; Holanda, R. Automated emerging cyber threat identification and profiling based on natural language processing. IEEE Access 2023, 11, 58915–58936. [Google Scholar] [CrossRef]
- Cheng, X.; Zhang, J.; Tu, Y.; Chen, B. Cyber situation perception for Internet of things systems based on zero-day attack activities recognition within advanced persistent threat. Concurr. Comput. Pract. Exp. 2022, 34, e6001. [Google Scholar] [CrossRef]
- Pattnaik, N.; Li, S.; Nurse, J.R. Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter. Comput. Secur. 2023, 125, 103008. [Google Scholar] [CrossRef]
- Zahoora, U.; Rajarajan, M.; Pan, Z.; Khan, A. Zero-day ransomware attack detection using deep contractive autoencoder and voting based ensemble classifier. Appl. Intell. 2022, 52, 13941–13960. [Google Scholar] [CrossRef]
- Ahmad, R.; Alsmadi, I.; Alhamdani, W.; Tawalbeh, L.A. Zero-day attack detection: A systematic literature review. Artif. Intell. Rev. 2023, 5, 1–79. [Google Scholar] [CrossRef]
- Yadav, A.; Kumar, A.; Singh, V. Open-source intelligence: A comprehensive review of the current state, applications and future perspectives in cyber security. Artif. Intell. Rev. 2023, 15, 1–32. [Google Scholar] [CrossRef]
- Malatji, M.; Marnewick, A.; von Solms, S. Validation of a socio-technical management process for optimising cybersecurity practices. Comput. Secur. 2020, 95, 101846. [Google Scholar] [CrossRef]
- Fatima, R.; Yasin, A.; Liu, L.; Wang, J. How persuasive is a phishing email? A phishing game for phishing awareness. J. Comput. Secur. 2019, 27, 581–612. [Google Scholar] [CrossRef]
- Fatima, R.; Yasin, A.; Liu, L.; Jianmin, W. Strategies for counteracting social engineering attacks. Comput. Fraud Secur. 2022, 2022, S1361–S3723. [Google Scholar] [CrossRef]
- Ali, S.; Rehman, S.U.; Imran, A.; Adeem, G.; Iqbal, Z.; Kim, K.-I. Comparative evaluation of AI-based techniques for zero-day attacks detection. Electronics 2022, 11, 3934. [Google Scholar] [CrossRef]
- Fjelland, R. Why general artificial intelligence will not be realized. Humanit. Soc. Sci. Commun. 2020, 7, 10. [Google Scholar] [CrossRef]
- Mishra, A.; Alzoubi, Y.I.; Anwar, M.J.; Gill, A.Q. Attributes impacting cybersecurity policy development: An evidence from seven nations. Comput. Secur. 2022, 120, 102820. [Google Scholar] [CrossRef]
- Fourati, M.; Jedidi, A.; Gargouri, F. A deep learning-based classification for topic detection of audiovisual documents. Appl. Intell. 2022, 53, 8776–8798. [Google Scholar] [CrossRef]
- Mishra, A.; Alzoubi, Y.I.; Gill, A.Q.; Anwar, M.J. Cybersecurity enterprises policies: A comparative study. Sensors 2022, 22, 538. [Google Scholar] [CrossRef]
- Mishra, A.; Jabar, T.S.; Alzoubi, Y.I.; NathMishra, K. Enhancing privacy-preserving mechanisms in cloud storage: A novel conceptual framework. Concurr. Comput. Pract. Exp. 2023, e7831. [Google Scholar] [CrossRef]
- Mittal, S.; Das, P.K.; Mulwad, V.; Joshi, A.; Finin, T. Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM ‘16), San Francisco, CA, USA, 18–21 August 2016; IEEE: New York, NY, USA; pp. 860–867. [Google Scholar]
- Altalhi, S.; Gutub, A. A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J. Ambient Intell. Humaniz. Comput. 2021, 12, 10209–10221. [Google Scholar] [CrossRef]
- Hindy, H.; Atkinson, R.; Tachtatzis, C.; Colin, J.-N.; Bayne, E.; Bellekens, X. Utilising deep learning techniques for effective zero-day attack detection. Electronics 2020, 9, 1684. [Google Scholar] [CrossRef]
- Kim, J.-Y.; Bu, S.-J.; Cho, S.-B. Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inf. Sci. 2018, 460, 83–102. [Google Scholar] [CrossRef]
- Mbona, I.; Eloff, J.H. Detecting zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access 2022, 10, 69822–69838. [Google Scholar] [CrossRef]
- Peppes, N.; Alexakis, T.; Adamopoulou, E.; Demestichas, K. The effectiveness of zero-day attacks data samples generated via GANs on deep learning classifiers. Sensors 2023, 23, 900. [Google Scholar] [CrossRef]
- Sarhan, M.; Layeghy, S.; Gallagher, M.; Portmann, M. From zero-shot machine learning to zero-day attack detection. Int. J. Inf. Secur. 2023, 22, 947–959. [Google Scholar] [CrossRef]
- Soltani, M.; Ousat, B.; Siavoshani, M.J.; Jahangir, A.H. An adaptable deep learning-based Intrusion Detection System to zero-day attacks. J. Inf. Secur. Appl. 2023, 76, 103516. [Google Scholar] [CrossRef]
- Won, D.-O.; Jang, Y.-N.; Lee, S.-W. PlausMal-GAN: Plausible malware training based on generative adversarial networks for analogous zero-day malware detection. IEEE Trans. Emerg. Top. Comput. 2022, 11, 82–94. [Google Scholar] [CrossRef]
- Zuhair, H.; Selamat, A.; Krejcar, O. A multi-tier streaming analytics model of 0-day ransomware detection using machine learning. Appl. Sci. 2020, 10, 3210. [Google Scholar] [CrossRef]
- Matplotlib. Matplotlib: Visualization with Python. 2022. Available online: https://matplotlib.org/ (accessed on 26 June 2023).
- Python. Python 3.11.1 documentation. Available online: https://docs.python.org/3/ (accessed on 25 June 2023).
- TensorFlow. TensorFlow core. Available online: https://www.tensorflow.org/tutorials/text/word2vec (accessed on 28 June 2023).
- NLTK. Natural Language Toolkit. Available online: https://www.nltk.org/ (accessed on 28 June 2023).
- Mohammed, A.; Kora, R. An effective ensemble deep learning framework for text classification. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 8825–8837. [Google Scholar] [CrossRef]
Study | Focus | Method | Description |
---|---|---|---|
[19] | Predictions of cyberattacks | Survey | Comparing different proposed work against detection scope, performance measurements, feature extraction methods, information summarization levels, algorithm complexity, and scalability over time |
[1] | Zero-day prediction | Autoencoder and deep anomaly detection | Test three datasets from the real world totaling 222,541 URLs |
[20] | Zero-day detection | Deep learning technique | Developing an Intrusion IDS model with a high recall rate and minimal false negatives |
[21] | Zero-day detection | tDCGAN | Generating synthetic malware and distinguishing it from real malware |
[22] | Zero-day detection | Semi-supervised machine learning | Deploying Benford’s law that locates abnormal behavior based on the distribution of leading digits in numerical data |
[23] | Zero-day detection | Neural Network classifier | Generating synthetic zero-day data and applying NN classifier to predict the zero-day attack |
[24] | Zero-day detection | Zero-shot learning approach | Evaluating the effectiveness of machine learning-based IDSs in recognizing zero-day attack |
[25] | Zero-day detection | Deep learning-based IDS | Using deep novelty-based classifiers and conventional clustering based on specialized layers of deep structures |
[26] | Analogous zero-day detection | PlausMal-GAN | A malware training framework based on the generated analogous malware data using generative adversarial networks |
[27] | Classify various ransomware variants | Multi-tier streaming analytics model | Numerically grouping ransomware variants into ancestor groups and statistically combining those from multiple-descendant families |
This study | Zero-day detection | Tensorflow technique | Collecting and analyzing real data from the Twitter platform to detect potential zero-day attacks |
Technique | Success State | Success Rate | Reply Count | Favorite Count | Retweet | NLTK | TensorFlow |
---|---|---|---|---|---|---|---|
Reply | X | 10% | 381 | 121 | 54 | 24 | 1 |
Favorite | X | 20% | 3 | 988 | 636 | 34 | 0 |
Retweet | ✓ | 60% | 44 | 920 | 899 | 25 | 2 |
NLTK | ✓ | 60% | 0 | 17 | 9 | 61 | 2 |
TensorFlow | ✓ | 80% | 0 | 2 | 0 | 52 | 5 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Topcu, A.E.; Alzoubi, Y.I.; Elbasi, E.; Camalan, E. Social Media Zero-Day Attack Detection Using TensorFlow. Electronics 2023, 12, 3554. https://doi.org/10.3390/electronics12173554
Topcu AE, Alzoubi YI, Elbasi E, Camalan E. Social Media Zero-Day Attack Detection Using TensorFlow. Electronics. 2023; 12(17):3554. https://doi.org/10.3390/electronics12173554
Chicago/Turabian StyleTopcu, Ahmet Ercan, Yehia Ibrahim Alzoubi, Ersin Elbasi, and Emre Camalan. 2023. "Social Media Zero-Day Attack Detection Using TensorFlow" Electronics 12, no. 17: 3554. https://doi.org/10.3390/electronics12173554
APA StyleTopcu, A. E., Alzoubi, Y. I., Elbasi, E., & Camalan, E. (2023). Social Media Zero-Day Attack Detection Using TensorFlow. Electronics, 12(17), 3554. https://doi.org/10.3390/electronics12173554