Affiliation:
1. College of Computing, Umm-Alqura University, Mecca 24382, Saudi Arabia
2. Higher Institute of Computer Sciences and Mathematics, Monastir University, Monastir 5000, Tunisia
Abstract
The continuous developments in information technologies have resulted in a significant rise in security concerns, including cybercrimes, unauthorized access, and cyberattacks. Recently, researchers have increasingly turned to social media platforms like X to investigate cyberattacks. Analyzing and collecting news about cyberattacks from tweets can efficiently provide crucial insights into the attacks themselves, including their impacts, occurrence regions, and potential mitigation strategies. However, there is a shortage of labeled datasets related to cyberattacks. This paper describes CybAttT, a dataset of 36,071 English cyberattack-related tweets. These tweets are manually labeled into three classes: high-risk news, normal news, and not news. Our final overall Inner Annotation agreement was 0.99 (Fleiss kappa), which represents high agreement. To ensure dataset reliability and accuracy, we conducted rigorous experiments using different supervised machine learning algorithms and various fine-tuned language models to assess its quality and suitability for its intended purpose. A high F1-score of 87.6% achieved using the CybAttT dataset not only demonstrates the potential of our approach but also validates the high quality and thoroughness of its annotations. We have made our CybAttT dataset accessible to the public for research purposes.
Funder
Umm Alqura University, Saudi Arabia
Reference35 articles.
1. (2024, January 20). Security Operations Platform Powered by AI to Protect and Drive Your Business. Available online: www.threatstream.com.
2. (2024, January 20). AI-Powered Threat Intelligence Operations and Cyber Risk Quantification. Available online: www.threatconnect.com.
3. The future cybersecurity workforce: Going beyond technical skills for successful cyber performance;Dawson;Front. Psychol.,2018
4. Ponemon, L. (2017). Cost of Data Breach Study, Ponemon Institute.
5. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition;Ifinedo;Inf. Manag.,2014
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献