Detecting attacks that are based on unknown security vulnerabilities is a challenging problem. The timely detection of attacks based on hitherto unknown vulnerabilities is crucial for protecting other users and systems from being affected as well. To know the attributes of a novel attack's target system can support automated reconfiguration of firewalls and sending alerts to administrators of other vulnerable targets. We suggest a novel approach of post-incident intrusion detection by utilizing information gathered from real-time social media streams. To accomplish this we take advantage of social media users posting about incidents that affect their user accounts of attacked target systems or their observations about misbehaving online services. Combining knowledge of the attacked systems and reported incidents, we should be able to recognize patterns that define the attributes of vulnerable systems. By matching detected attribute sets with those attributes of well-known attacks, we furthermore should be able to link attacks to already existing entries in the Common Vulnerabilities and Exposures database. If a link to an existing entry is not found, we can assume to have detected an exploitation of an unknown vulnerability, i.e., a zero day exploit or the result of an advanced persistent threat. This finding could also be used to direct efforts of examining vulnerabilities of attacked systems and therefore lead to faster patch deployment.
[1]
Robert Roedler,et al.
On the endogenesis of Twitter's Spritzer and Gardenhose sample streams
,
2014,
2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[2]
Stefan Savage,et al.
Measuring Online Service Availability Using Twitter
,
2010,
WOSN.
[3]
Kalina Bontcheva,et al.
TwitIE: An Open-Source Information Extraction Pipeline for Microblog Text
,
2013,
RANLP.
[4]
Eriq Augustine,et al.
Outage detection via real-time social stream analysis: leveraging the power of online complaints
,
2012,
WWW.
[5]
Tom M. Mitchell,et al.
Weakly Supervised Extraction of Computer Security Events from Twitter
,
2015,
WWW.
[6]
Taghi M. Khoshgoftaar,et al.
Intrusion detection and Big Heterogeneous Data: a Survey
,
2015,
Journal of Big Data.