5  PREDICTING POTENTIAL 
THREATS 
The observations reported during this study 
highlighted many correlation between real attacks 
generated by exploits kits and their popularity on 
Social Medias. This consolidates somehow our 
hypothesis related to the impact on the presence of 
exploit kits in public Social Media that could 
influence the cybersecurity landscape. For this reason 
we propose in this paper to rely on Social Media real 
time analysis as input to a prediction model concept. 
This model would rely on the popularity of certain 
topics related to vulnerabilities, exploits and bug 
details. We propose to work on time series to 
determine whether a variation of popularity related to 
these topics can provide some hints on the new threats 
that can target vulnerable or non-patched systems. 
We are currently working on this model in order to 
try to validate it through a long term study that will 
compare real facts reported by security professionals 
with the predictions generated by this model. We also 
noticed that the cyber-threat landscape is permanently 
evolving and morphing, and Social Media can 
accompany this evolution as hacking community is 
more and more present in these kind of media. We 
propose to apply machine learning algorithms to 
adapt the analysis to these new tendencies and not 
only rely on a static predictive model dedicated to 
only one kind of threat.   
This model can be used for companies to optimize 
the prioritization their patching schedule and try to 
apply very urgent patches before a huge wave of 
attacks targeting these specific systems. 
6  CONCLUSION AND FUTURE 
WORK 
In this position paper we demonstrate the influence of 
Social Media Networks on the cybersecurity 
landscape. We proposed a study that analyses the 
presence and the popularity of information related to 
exploit kits on Twitter in order to correlate these 
measurements with real data related to the impact of 
the attacks generated by these kits. This data is 
provided by security professional reports (from 2014 
to 2015). The results obtained are very encouraging 
especially with regards to the strong correlation 
between the popularity of an exploit with the 
importance of the related attack.  This led us to 
comfort our hypothesis: the more an exploit is 
popular on social media, the more the probability of 
having attacks generated from it is high. For this 
reason we started developing a predictive model 
based on security information collected from Social 
Medias. Social Medias tell us what is the favourite 
exploit kit and we can guess what could be the future 
attacks. In this paper we describe the concept of threat 
pre-diction without detailing the predictive model 
since we need to conduct a long term study in order 
to validate the predictions generated by this tool, and 
this requires time. It is not yet clear to us the 
estimation of the time delay between the first 
apparition of an exploit on Twitter and the first 
recorded attack. We need security professional 
proprietary data to obtain this information. 
Beside the pure time series based predictive 
model we are also working on a ma-chine learning 
based algorithm that tends to adapt the monitoring on 
the type of security information that is highly 
changing over the time. We are also experimenting 
different existing popularity computation algorithms 
for Social Media is order to verify the existence of a 
better algorithm that could correspond better to the 
information distribution of the real attacks. 
REFERENCES 
Chen, J. C., Li, B., 2015. Evolution of Exploit Kits: 
Exploring Past Trends and Current Improvements. 
Trend Micro White paper report 2015. 
CISCO, 2015. Midyear Security Report http://www.cisco.c 
om/assets/global/UK/events/switchup_challenge/pdf/c
isco-msr-2015.pdf. 
Zaharia, A., 2015. The Ultimate Guide to Angler Exploit Kit 
for Non-Technical People. Heimdal Security 
https://heimdalsecurity.com/blog/ultimate-guide-angle 
r-exploit-kit-non-technical-people/ 
Trabelsi S., Plate H., Abida A., Ben Aoun M., Zouaoui A., 
Missaoui C., Gharbi S. and Ayari A., 2015. Mining 
social networks for software vulnerabilities monitoring. 
In 7th Internation-al Conference on New Technologies, 
Mobility and Security (NTMS), 2015 (pp. 1-7). IEEE. 
Sabottke C., Suciu. O. and Dumitraş, T,. 2015. 
Vulnerability disclosure in the age of social media: 
Exploiting Twitter for predicting real-world exploits. 
USENIX Security Symposium (USENIX Security), 
Washington DC. 
Edkrantz, M., Said, A., 2015. Predicting Cyber 
Vulnerability Exploits with Machine Learning. IEEE 
2nd International Conference on Cyber Security and 
Cloud Computing (CSCloud) (pp513 – 514). 
Trabelsi, S., 2015. SMASH Goes Live: Software 
Vulnerability Live Monitoring on HANA. SAP 
Community Network  https://scn.sap.com/communit 
y/hana-in-memory/use-cases/blog/2015/06/04/smash-g 
oes-live-software-vulnerability-live-monitoring-on-ha 
na.