Affiliation:
1. Centro de Investigación en Computación (CIC), Instituto Politécnico Nacional (IPN), Av. Juan de Dios Batiz, s/n, Mexico City 07320, Mexico
Abstract
Social networks have captured the attention of many people worldwide. However, these services have also attracted a considerable number of malicious users whose aim is to compromise the digital assets of other users by using messages as an attack vector to execute different types of cyberattacks against them. This work presents an approach based on natural language processing tools and a convolutional neural network architecture to detect and classify four types of cyberattacks in social network messages, including malware, phishing, spam, and even one whose aim is to deceive a user into spreading malicious messages to other users, which, in this work, is identified as a bot attack. One notable feature of this work is that it analyzes textual content without depending on any characteristics from a specific social network, making its analysis independent of particular data sources. Finally, this work was tested on real data, demonstrating its results in two stages. The first stage detected the existence of any of the four types of cyberattacks within the message, achieving an accuracy value of 0.91. After detecting a message as a cyberattack, the next stage was to classify it as one of the four types of cyberattack, achieving an accuracy value of 0.82.
Funder
CONAHCYT, Mexico
Secretaría de Investigación y Posgrado of the Instituto Politécnico Nacional, Mexico
Microsoft
Subject
Artificial Intelligence,Engineering (miscellaneous)
Reference31 articles.
1. Online and offline social networks: Use of social networking sites by emerging adults;Subrahmanyam;J. Appl. Dev. Psychol.,2008
2. BILROST: Handling actuators of the internet of things through tweets on twitter using a domain-specific language;Pelayo;Int. J. Interact. Multimed. Artif. Intell.,2021
3. Kumar, R., Anand, A., Kumar, P., and Kumar, R.K. (2020, January 12–14). Internet of Things and Social Media: A review of Literature and Validation from Twitter Analytics. Proceedings of the 2020 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India.
4. Cyber-Attacks—Trends, Patterns and Security Countermeasures;Bendovschi;Procedia Econ. Financ.,2015
5. Survey of websites and web application security threats using vulnerability assessment;Appiah;J. Comput. Sci.,2018
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献