Who shall we follow in twitter for cyber vulnerability?

  • Authors:
  • Biru Cui;Stephen Moskal;Haitao Du;Shanchieh Jay Yang

  • Affiliations:
  • Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York;Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York;Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York;Department of Computer Engineering, Rochester Institute of Technology, Rochester, New York

  • Venue:
  • SBP'13 Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Twitter has become a key social media for sharing information, not only for casual conversations but also for business and technologies. As the Twitter community continues to grow, an intriguing question is to determine how to obtain most valuable information the earliest by following fewest Tweeters or Tweets. This multi-criteria optimization problem exhibits similar features as in the information cascade problem for blogs. This work revises an information cascade outbreak detection algorithm to find critical Twitter accounts that disseminate the most cyber vulnerabilities the earliest. Three award functions are defined to evaluate every account's contribution per topic from three aspects: timeliness, originality and influence. Critical users are selected according to their total contribution on a specific security category. Experiments were conducted using Tweets containing CVE information over a five-week period, to compare the proposed algorithm with account selections based on the number of followers and based on the PageRank algorithm. The results show that with the same number of users and tweets, our algorithm outperforms in both information coverage and timeliness.