How users tweet about a cyber attack: An explorative study using machine learning and social network analysis

2020 ◽  
Vol 11 (2) ◽  
pp. 195-214 ◽  
Author(s):  
Daniel Vogler ◽  
Florian Meissner

Cybercrime is a growing threat for firms and customers that emerged with the digitization of business. However, research shows that even though people claim that they are concerned about their privacy online, they do not act correspondingly. This study investigates how prevalent security issues are during a cyber attack among Twitter users. The case under examination is the security breach at the US ticket sales company, Ticketfly, that compromised the information of 26 million users. Tweets related to cybersecurity are detected through the application of automated text classification based on supervised machine learning with support vector machines. Subsequently, the users that wrote security-related tweets are grouped into communities through a social network analysis. The results of this multi-method study show that users concerned about security issues are mostly part of expert communities with already superior knowledge about cybersecurity.

2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Quan Zou ◽  
Jinjin Li ◽  
Qingqi Hong ◽  
Ziyu Lin ◽  
Yun Wu ◽  
...  

MicroRNAs constitute an important class of noncoding, single-stranded, ~22 nucleotide long RNA molecules encoded by endogenous genes. They play an important role in regulating gene transcription and the regulation of normal development. MicroRNAs can be associated with disease; however, only a few microRNA-disease associations have been confirmed by traditional experimental approaches. We introduce two methods to predict microRNA-disease association. The first method, KATZ, focuses on integrating the social network analysis method with machine learning and is based on networks derived from known microRNA-disease associations, disease-disease associations, and microRNA-microRNA associations. The other method, CATAPULT, is a supervised machine learning method. We applied the two methods to 242 known microRNA-disease associations and evaluated their performance using leave-one-out cross-validation and 3-fold cross-validation. Experiments proved that our methods outperformed the state-of-the-art methods.


2020 ◽  
Vol 10 (5) ◽  
pp. 1699 ◽  
Author(s):  
Mateusz Nurek ◽  
Radosław Michalski

Formation of a hierarchy within an organization is a natural way of assigning the duties, delegating responsibilities and optimizing the flow of information. Only for the smallest companies the lack of the hierarchy, that is, a flat one, is possible. Yet, if they grow, the introduction of a hierarchy is inevitable. Most often, its existence results in different nature of the tasks and duties of its members located at various organizational levels or in distant parts of it. On the other hand, employees often send dozens of emails each day, and by doing so, and also by being engaged in other activities, they naturally form an informal social network where nodes are individuals and edges are the actions linking them. At first, such a social network seems distinct from the organizational one. However, the analysis of this network may lead to reproducing the organizational hierarchy of companies. This is due to the fact that that people holding a similar position in the hierarchy possibly share also a similar way of behaving and communicating attributed to their role. The key concept of this work is to evaluate how well social network measures when combined with other features gained from the feature engineering align with the classification of the members of organizational social network. As a technique for answering this research question, machine learning apparatus was employed. Here, for the classification task, Decision Trees, Random Forest, Neural Networks and Support Vector Machines have been evaluated, as well as a collective classification algorithm, which is also proposed in this paper. The used approach allowed to compare how traditional methods of machine learning classification, while supported by social network analysis, performed in comparison to a typical graph algorithm. The results demonstrate that the social network built using the metadata on communication highly exposes the organizational structure.


2012 ◽  
Vol 5 (1) ◽  
pp. 16-34 ◽  
Author(s):  
Marion E. Hambrick

Sport industry groups including athletes, teams, and leagues use Twitter to share information about and promote their products. The purpose of this study was to explore how sporting event organizers and influential Twitter users spread information through the online social network. The study examined two bicycle race organizers using Twitter to promote their events. Using social network analysis, the study categorized Twitter messages posted by the race organizers, identified their Twitter followers and shared relationships within Twitter, and mapped the spread of information through these relationships. The results revealed that the race organizers used their Twitter home pages and informational and promotional messages to attract followers. Popular Twitter users followed the race organizers early, typically within the first 4 days of each homepage’s creation, and they helped spread information to their respective followers. Sporting event organizers can leverage Twitter and influential users to share information about and promote their events.


2019 ◽  
Author(s):  
Robert Gove

Many analytical tasks, such as social network analysis, depend on comparing graphs. Existing methods are slow, or can be difficult to understand. To address these challenges, this paper proposes gragnostics, a set of 10 fast, layperson-understandable graph-level features. Each can be computed in linear time. To evaluate the ability of these features to discriminate different topologies and types of graphs, this paper compares a machine learning classifier using gragnostics to alternative classifiers, and the evaluation finds that the gragnostics classifier achieves higher performance. To evaluate gragnostics' utility in interactive visualization tools, this paper presents Chiron, a graph visualization tool that enables users to explore the subgraphs of a larger graph. Example usage scenarios of Chiron demonstrate that using gragnostics in a rank-by-feature framework can be effective for finding interesting subgraphs.


The advancement in cyber-attack technologies have ushered in various new attacks which are difficult to detect using traditional intrusion detection systems (IDS).Existing IDS are trained to detect known patterns because of which newer attacks bypass the current IDS and go undetected. In this paper, a two level framework is proposed which can be used to detect unknown new attacks using machine learning techniques. In the first level the known types of classes for attacks are determined using supervised machine learning algorithms such as Support Vector Machine (SVM) and Neural networks (NN). The second level uses unsupervised machine learning algorithms such as K-means. The experimentation is carried out with four models with NSL- KDD dataset in Openstack cloud environment. The Model with Support Vector Machine for supervised machine learning, Gradual Feature Reduction (GFR) for feature selection and K-means for unsupervised algorithm provided the optimum efficiency of 94.56 %.


2019 ◽  
Vol 5 (2) ◽  
pp. 108-119
Author(s):  
Yeslam Al-Saggaf ◽  
Amanda Davies

Purpose The purpose of this paper is to discuss the design, application and findings of a case study in which the application of a machine learning algorithm is utilised to identify the grievances in Twitter in an Arabian context. Design/methodology/approach To understand the characteristics of the Twitter users who expressed the identified grievances, data mining techniques and social network analysis were utilised. The study extracted a total of 23,363 tweets and these were stored as a data set. The machine learning algorithm applied to this data set was followed by utilising a data mining process to explore the characteristics of the Twitter feed users. The network of the users was mapped and the individual level of interactivity and network density were calculated. Findings The machine learning algorithm revealed 12 themes all of which were underpinned by the coalition of Arab countries blockade of Qatar. The data mining analysis revealed that the tweets could be clustered in three clusters, the main cluster included users with a large number of followers and friends but who did not mention other users in their tweets. The social network analysis revealed that whilst a large proportion of users engaged in direct messages with others, the network ties between them were not registered as strong. Practical implications Borum (2011) notes that invoking grievances is the first step in the radicalisation process. It is hoped that by understanding these grievances, the study will shed light on what radical groups could invoke to win the sympathy of aggrieved people. Originality/value In combination, the machine learning algorithm offered insights into the grievances expressed within the tweets in an Arabian context. The data mining and the social network analyses revealed the characteristics of the Twitter users highlighting identifying and managing early intervention of radicalisation.


2013 ◽  
Vol 13 (5) ◽  
pp. 652-662 ◽  
Author(s):  
Javier Di Deco ◽  
Ana M. Gonzalez ◽  
Julia Diaz ◽  
Virginia Mato ◽  
Daniel Garcia–Frank ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document