Download PDFOpen PDF in browserExploring Open Source Information for Cyber Threat IntelligenceEasyChair Preprint 75095 pages•Date: February 26, 2022AbstractCyberspace is one of the most complex systems ever developed by humans; many people use it daily, yet few comprehend it. Use Social media cannot replace security specialists. to examine certain attacks in detail, such as de- detecting network irregularities, worms, and port scanning besides However, analysing social media data can uncover new cyber threat and security threat patterns in- comprising carding and data theft. We used AI- ing the proposed system's cyber danger. Ideal design is produced by training a Twitter cyber-Threat dataset with SVM, NB, DT, RF, ANN. Preferable model for defining cyberthreats and their types. Keyphrases: Artificial Neural Network, Decision Tree Classifier, Naïve Bayes Classifier, Random Forest, Support Vector Machine, Threats etc., machine learning
|