5 PREDICTING POTENTIAL
THREATS
The observations reported during this study
highlighted many correlation between real attacks
generated by exploits kits and their popularity on
Social Medias. This consolidates somehow our
hypothesis related to the impact on the presence of
exploit kits in public Social Media that could
influence the cybersecurity landscape. For this reason
we propose in this paper to rely on Social Media real
time analysis as input to a prediction model concept.
This model would rely on the popularity of certain
topics related to vulnerabilities, exploits and bug
details. We propose to work on time series to
determine whether a variation of popularity related to
these topics can provide some hints on the new threats
that can target vulnerable or non-patched systems.
We are currently working on this model in order to
try to validate it through a long term study that will
compare real facts reported by security professionals
with the predictions generated by this model. We also
noticed that the cyber-threat landscape is permanently
evolving and morphing, and Social Media can
accompany this evolution as hacking community is
more and more present in these kind of media. We
propose to apply machine learning algorithms to
adapt the analysis to these new tendencies and not
only rely on a static predictive model dedicated to
only one kind of threat.
This model can be used for companies to optimize
the prioritization their patching schedule and try to
apply very urgent patches before a huge wave of
attacks targeting these specific systems.
6 CONCLUSION AND FUTURE
WORK
In this position paper we demonstrate the influence of
Social Media Networks on the cybersecurity
landscape. We proposed a study that analyses the
presence and the popularity of information related to
exploit kits on Twitter in order to correlate these
measurements with real data related to the impact of
the attacks generated by these kits. This data is
provided by security professional reports (from 2014
to 2015). The results obtained are very encouraging
especially with regards to the strong correlation
between the popularity of an exploit with the
importance of the related attack. This led us to
comfort our hypothesis: the more an exploit is
popular on social media, the more the probability of
having attacks generated from it is high. For this
reason we started developing a predictive model
based on security information collected from Social
Medias. Social Medias tell us what is the favourite
exploit kit and we can guess what could be the future
attacks. In this paper we describe the concept of threat
pre-diction without detailing the predictive model
since we need to conduct a long term study in order
to validate the predictions generated by this tool, and
this requires time. It is not yet clear to us the
estimation of the time delay between the first
apparition of an exploit on Twitter and the first
recorded attack. We need security professional
proprietary data to obtain this information.
Beside the pure time series based predictive
model we are also working on a ma-chine learning
based algorithm that tends to adapt the monitoring on
the type of security information that is highly
changing over the time. We are also experimenting
different existing popularity computation algorithms
for Social Media is order to verify the existence of a
better algorithm that could correspond better to the
information distribution of the real attacks.
REFERENCES
Chen, J. C., Li, B., 2015. Evolution of Exploit Kits:
Exploring Past Trends and Current Improvements.
Trend Micro White paper report 2015.
CISCO, 2015. Midyear Security Report http://www.cisco.c
om/assets/global/UK/events/switchup_challenge/pdf/c
isco-msr-2015.pdf.
Zaharia, A., 2015. The Ultimate Guide to Angler Exploit Kit
for Non-Technical People. Heimdal Security
https://heimdalsecurity.com/blog/ultimate-guide-angle
r-exploit-kit-non-technical-people/
Trabelsi S., Plate H., Abida A., Ben Aoun M., Zouaoui A.,
Missaoui C., Gharbi S. and Ayari A., 2015. Mining
social networks for software vulnerabilities monitoring.
In 7th Internation-al Conference on New Technologies,
Mobility and Security (NTMS), 2015 (pp. 1-7). IEEE.
Sabottke C., Suciu. O. and Dumitraş, T,. 2015.
Vulnerability disclosure in the age of social media:
Exploiting Twitter for predicting real-world exploits.
USENIX Security Symposium (USENIX Security),
Washington DC.
Edkrantz, M., Said, A., 2015. Predicting Cyber
Vulnerability Exploits with Machine Learning. IEEE
2nd International Conference on Cyber Security and
Cloud Computing (CSCloud) (pp513 – 514).
Trabelsi, S., 2015. SMASH Goes Live: Software
Vulnerability Live Monitoring on HANA. SAP
Community Network https://scn.sap.com/communit
y/hana-in-memory/use-cases/blog/2015/06/04/smash-g
oes-live-software-vulnerability-live-monitoring-on-ha
na.