Skip to main content

Who Shall We Follow in Twitter for Cyber Vulnerability?

  • Conference paper
Social Computing, Behavioral-Cultural Modeling and Prediction (SBP 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7812))

Abstract

Twitter has become a key social media for sharing information, not only for casual conversations but also for business and technologies. As the Twitter community continues to grow, an intriguing question is to determine how to obtain most valuable information the earliest by following fewest Tweeters or Tweets. This multi-criteria optimization problem exhibits similar features as in the information cascade problem for blogs. This work revises an information cascade outbreak detection algorithm to find critical Twitter accounts that disseminate the most cyber vulnerabilities the earliest. Three award functions are defined to evaluate every account’s contribution per topic from three aspects: timeliness, originality and influence. Critical users are selected according to their total contribution on a specific security category. Experiments were conducted using Tweets containing CVE information over a five-week period, to compare the proposed algorithm with account selections based on the number of followers and based on the PageRank algorithm. The results show that with the same number of users and tweets, our algorithm outperforms in both information coverage and timeliness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, S.: Twitter now seeing 400 million tweets per day (June 2012), http://www.mediabistro.com/alltwitter/twitter-400-million-tweets2_b23744

  2. Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: real-time event detection by social sensors. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 851–860. ACM, New York (2010)

    Chapter  Google Scholar 

  3. Spice, B.: Press release: Quarter of tweets not worth reading, twitter users tell researchers (February 2012), http://www.cmu.edu/news/stories/archives/2012/february/feb1_twitterresearch.html

  4. Gibson, D., Kleinberg, J., Raghavan, P.: Inferring web communities from link topology. In: Proceedings of the Ninth ACM Conference on Hypertext and Hypermedia: Links, Objects, Time and Space—Structure in Hypermedia Systems: Links, Objects, Time and Space—Structure in Hypermedia Systems, HYPERTEXT 1998, pp. 225–234. ACM, New York (1998)

    Chapter  Google Scholar 

  5. Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web (1999)

    Google Scholar 

  6. Anagnostopoulos, A., Kumar, R., Mahdian, M.: Influence and correlation in social networks. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008, pp. 7–15. ACM, New York (2008)

    Chapter  Google Scholar 

  7. Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., Van Briesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2007, pp. 420–429. ACM, New York (2007)

    Chapter  Google Scholar 

  8. Java, A., Song, X., Finin, T., Tseng, B.: Why we twitter: understanding microblogging usage and communities. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, WebKDD/SNA-KDD 2007, pp. 56–65. ACM, New York (2007)

    Chapter  Google Scholar 

  9. Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 591–600. ACM, New York (2010)

    Chapter  Google Scholar 

  10. Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in twitter: The million follower fallacy. In: 4th International AAAI Conference on Weblogs and Social Media, ICWSM, vol. 14(1), p. 8 (2010)

    Google Scholar 

  11. Granovetter, M.: Threshold models of collective behavior. American Journal of Sociology, 1420–1443 (1978)

    Google Scholar 

  12. Goldenberg, J., Libai, B., Muller, E.: Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters 12(3), 211–223 (2001)

    Article  Google Scholar 

  13. Gruhl, D., Liben-Nowell, D., Guha, R., Tomkins, A.: Information diffusion through blogspace. SIGKDD Explor. Newsl. 6(2), 43–52 (2004)

    Article  Google Scholar 

  14. Gomez-Rodriguez, M., Leskovec, J., Krause, A.: Inferring networks of diffusion and influence. ACM Trans. Knowl. Discov. Data 5(4), 21:1–21:37 (2012)

    Google Scholar 

  15. Common Vulnerabilities and Exposures (September 2012), http://cve.mitre.org/

  16. Common Weakness Enumeration (October 2012), http://cwe.mitre.org/

  17. Security Vulneribility Datasource (October 2012), http://www.cvedetails.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cui, B., Moskal, S., Du, H., Yang, S.J. (2013). Who Shall We Follow in Twitter for Cyber Vulnerability?. In: Greenberg, A.M., Kennedy, W.G., Bos, N.D. (eds) Social Computing, Behavioral-Cultural Modeling and Prediction. SBP 2013. Lecture Notes in Computer Science, vol 7812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37210-0_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37210-0_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37209-4

  • Online ISBN: 978-3-642-37210-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics