loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Slim Trabelsi 1 ; Henrik Plate 1 ; Amine Abida 1 ; M. Marouane Ben Aoun 1 ; Anis Zouaoui 2 ; Chedy Missaoui 2 ; Sofien Gharbi 2 and Alaeddine Ayari 2

Affiliations: 1 SAP Labs France, France ; 2 ESPRIT, Tunisia

ISBN: 978-989-758-117-5

Keyword(s): Vulnerability, Social, Networks, Zero-day, Monitoring, Data Mining, CVE.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Intrusion Detection & Prevention ; Security Management ; Software Security

Abstract: Monitoring software vulnerability information requires an important financial and human effort in order to track all the scattered sources publishing the last news about software vulnerabilities, patches and exploits. We noticed that in some social networks like Twitter we can aggregate a lot of information related to software vulnerabilities in a single channel. In this paper, we analyse the Twitter feed in order to monitor most of the information related to software vulnerabilities including zero-day publications.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.173.45

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Trabelsi, S.; Plate, H.; Abida, A.; Ben Aoun, M.; Zouaoui, A.; Missaoui, C.; Gharbi, S. and Ayari, A. (2015). Monitoring Software Vulnerabilities through Social Networks Analysis.In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 236-242. DOI: 10.5220/0005538602360242

@conference{secrypt15,
author={Slim Trabelsi. and Henrik Plate. and Amine Abida. and M. Marouane Ben Aoun. and Anis Zouaoui. and Chedy Missaoui. and Sofien Gharbi. and Alaeddine Ayari.},
title={Monitoring Software Vulnerabilities through Social Networks Analysis},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={236-242},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005538602360242},
isbn={978-989-758-117-5},
}

TY - CONF

JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Monitoring Software Vulnerabilities through Social Networks Analysis
SN - 978-989-758-117-5
AU - Trabelsi, S.
AU - Plate, H.
AU - Abida, A.
AU - Ben Aoun, M.
AU - Zouaoui, A.
AU - Missaoui, C.
AU - Gharbi, S.
AU - Ayari, A.
PY - 2015
SP - 236
EP - 242
DO - 10.5220/0005538602360242

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.