International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 2, February 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Novel Method Of Cyber Threat Detection Using Feature Extraction

[Full Text]



Soumya.T.R, S. Revathy



Threat event detection, Feature extraction, Cyber threat event



Cyber threat event detection is the method that ensures safety of the public when there is occurrence of serious events. Social media is a platform used for the purpose of social wellness, utilized as an information source for the hackers. Twitter-one of the social media is a web application of micro blogging type has become popular serving several hundred million users. Detection of real world cyber threat event that threatens the social security and safety or causes interruption to the social order is made possible by the exploitation of user generated data, which is a rich source of data. In this paper, threat event is detected by the two types of feature extraction namely temporal feature and textual feature. Based on the features extracted, investigation of the cyber threat event is performed over time. Firstly, identification of the cyber threat event is done regardless of the user’s influence. Secondly, the temporal feature plays an important role in the detection of the threat event therefore cannot be ignored. Thirdly, the overall performance of the detection of cyber threat event is improved using the textual features. This approach is a novel method for the detection of the cyber threat event for the real world data from social media.



[1] Alsaedi, N., Burnap, P. and Rana, O. 2014. A Combined Classification-Clustering Framework for Identifying Disruptive Events. Proceedings of 7th ASE International Conference on Social Computing (SocialCom 2014), pp. 1–10.
[2] Atefeh, F. and Khreich, W. 2013. A Survey of techniques for event detection in twitter. Computational Intelligence 0(0).
[3] Frank, J.R., Kleiman-weiner, M., Roberts, D. a, Niu, F., Ce, Z., Christopher, R. and Soboroff, I. 2012. Building an Entity-Centric Stream Filtering Test Collection for TREC 2012. TREC.
[4] Ji, H. and Grishman, R. 2011. Knowledge Base Population : Successful Approaches and Challenges. Acl, pp. 1148–1158.
[5] Kanhabua, N. and Nørvåg, K. 2010. Determining time of queries for re-ranking search results. In Proc. ECDL, pp. 261–272.
[6] Radinsky, K., Agichtein, E., Gabrilovich, E. and Markovitch, S. 2011. A word at a time: computing word relatedness using temporal semantic analysis. Proceedings of the WWW’11, pp. 337–346.
[7] Georgescu, M., Pham, D.D., Kanhabua, N., Zerr, S., Siersdorfer, S. and Nejdl, W. 2013. Temporal Summarization of Event-related Updates in Wikipedia. WWW Companion, pp. 281–284.
[8] Ma, Z., Sun, A. and Cong, G. 2013. On predicting the popularity of newly emerging hashtags in twitter. Journal of the American Society for Information Science and Technology 64(7), pp.1399-1410.
[9] Thelwall, M., Buckley, K. and Paltoglou, G. 2011. Sentiment in Twitter events. Journal of the American Society for Information Science and Technology 62(2), pp. 406–418.
[10] Backstrom, L., Kleinberg, J., Lee, L. and Danescu-niculescu-mizil, C. 2013. Characterizing and Curating Conversation Threads : Wsdm, pp. 13–22.
[11] Hecht, B., Hong, L., Suh, B. and Chi, E. 2011. Tweets from Justin Bieber’s heart: the dynamics of the location field in user profiles. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’11), pp. 237–246.
[12] Cha, M., Haddadi, H., Benevenuto, F. and Gummadi, P. 2010. Measuring User Influence in Twitter: The Million Follower Fallacy. ICWSM.
[13] Cheng, J., Adamic, L., Dow, P., Jon, K. and Jure, L. 2014. Can cascades be predicted? WWW ’14.
[14] Agarwal, A., Xie, B., Vovsha, I., Rambow, O. and Passonneau, R. 2011. Sentiment analysis of twitter data. Proceedings of the ACL 2011 Workshop on Languages in Social Media, pp. 30–38.
[15] James, A. 2002. Introduction to topic detection and tracking. In Topic detection and tracking: event-based information organization, pp. 1–16.
[16] Gabrilovich, E., Dumais, S. and Horvitz, E. 2004. Newsjunkie: providing personalized newsfeeds via analysis of information novelty. WWW ’13, pp. 482–490. WWW ’14.
[17] Elsas, J.L. and Dumais, S.T. 2010. Leveraging temporal dynamics of document content in relevance ranking. WSDM ’10.
[18] Lee, K., Caverlee, J. and Webb, S. 2010. Uncovering social spammers: social honeypots+ machine learning. SIGIR ’33.
[19] Petrovic, S., Osborne, M. and Lavrenko, V. 2011. RT to Win! Predicting Message Propagation in Twitter. ICWSM.
[20] Dou, W., Wang, X., Skau, D., Ribarsky, W. and Zhou, M.X. 2012. LeadLine: Interactive visual analysis of text data through event identification. (VAST 2012), pp. 93–102.
[21] Becker, H., Naaman, M. and Gravano, L. 2011. Beyond Trending Topics: Real- Event Identification on Twitter. ICWSM, pp. 1–17.
[22] Burnap, P., Williams, M.L., Sloan, L., Rana, O., Housley, W., Edwards, A., Knight, V., Procter, R. and Voss, A. 2014. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining 4, p. 206.
[25] Mitra, P., Murthy, C. a and Pal, S.K. 2002. Unsupervised Feature Selection Using Feature Similarity. IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI 24(3), pp. 301–312.
[26] Takahashi, T. and Igata, N. 2012. Rumor detection on twitter. SCIS ‘6 and ISIS ‘13, pp. 452–457.
[27] Tsur, O. and Rappoport, A. 2012. What ’ s in a Hashtag ? Content based Prediction of the Spread of Ideas in Microblogging Communities. WSDM’12. pp. 16–23.
[28] Fawcett, T. 2006. An introduction to ROC analysis. Pattern Recognition Letters 27(8), pp. 861–874.
[29] Sarma, T.H., Viswanath, P. and Reddy, B.E. 2013. Single pass kernel k -means clustering method. 38(June), pp. 407–419.
[30] Cui, Y., Wong, W. and Cheung, D. 2009. Privacy-Preserving Clustering with High Accuracy and Low Time Complexity. DASFAA 2009, pp. 456–470.