CybAttT: A Dataset of Cyberattack News Tweets for Enhanced Threat Intelligence

Author:

Lughbi Huda1ORCID,Mars Mourad12ORCID,Almotairi Khaled1ORCID

Affiliation:

1. College of Computing, Umm-Alqura University, Mecca 24382, Saudi Arabia

2. Higher Institute of Computer Sciences and Mathematics, Monastir University, Monastir 5000, Tunisia

Abstract

The continuous developments in information technologies have resulted in a significant rise in security concerns, including cybercrimes, unauthorized access, and cyberattacks. Recently, researchers have increasingly turned to social media platforms like X to investigate cyberattacks. Analyzing and collecting news about cyberattacks from tweets can efficiently provide crucial insights into the attacks themselves, including their impacts, occurrence regions, and potential mitigation strategies. However, there is a shortage of labeled datasets related to cyberattacks. This paper describes CybAttT, a dataset of 36,071 English cyberattack-related tweets. These tweets are manually labeled into three classes: high-risk news, normal news, and not news. Our final overall Inner Annotation agreement was 0.99 (Fleiss kappa), which represents high agreement. To ensure dataset reliability and accuracy, we conducted rigorous experiments using different supervised machine learning algorithms and various fine-tuned language models to assess its quality and suitability for its intended purpose. A high F1-score of 87.6% achieved using the CybAttT dataset not only demonstrates the potential of our approach but also validates the high quality and thoroughness of its annotations. We have made our CybAttT dataset accessible to the public for research purposes.

Funder

Umm Alqura University, Saudi Arabia

Publisher

MDPI AG

Reference35 articles.

1. (2024, January 20). Security Operations Platform Powered by AI to Protect and Drive Your Business. Available online: www.threatstream.com.

2. (2024, January 20). AI-Powered Threat Intelligence Operations and Cyber Risk Quantification. Available online: www.threatconnect.com.

3. The future cybersecurity workforce: Going beyond technical skills for successful cyber performance;Dawson;Front. Psychol.,2018

4. Ponemon, L. (2017). Cost of Data Breach Study, Ponemon Institute.

5. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition;Ifinedo;Inf. Manag.,2014

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3