Please use this identifier to cite or link to this item:

Detecting Cyber Security Vulnerabilities through Reactive Programming

File Size Format  
0717.pdf 827.92 kB Adobe PDF View/Open

Item Summary

Title:Detecting Cyber Security Vulnerabilities through Reactive Programming
Authors:Moholth, Ole Christian
Juric, Radmila
McClenaghan, Karoline Moholth
Keywords:Cyber Threat Intelligence and Analytics
Software Technology
Vulnerability, Exploits, Reactive Programming, OSINT
Date Issued:08 Jan 2019
Abstract:We propose a software architectural model, which uses reactive programming for collecting and filtering live tweets and interpreting their potential correlation to software vulnerabilities and exploits. We aim to investigate if we could discover the existence of exploits for disclosed vulnerabilities in Twitter data streams. Reactive programming is used for performing filtering and querying of tweet to find potential exploits. The result of processing Twitter data streams with reactive programming could be broadcasted, by pointing towards potential exploits, which might create a cyber-attack. They can also be entered as a new entry into existing overt or open source intelligence repositories.
Pages/Duration:10 pages
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections: Cyber Threat Intelligence and Analytics

Please email if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons