Detecting Cyber Security Vulnerabilities through Reactive Programming Moholth, Ole Christian Juric, Radmila McClenaghan, Karoline Moholth 2019-01-03T00:57:55Z 2019-01-03T00:57:55Z 2019-01-08
dc.description.abstract We propose a software architectural model, which uses reactive programming for collecting and filtering live tweets and interpreting their potential correlation to software vulnerabilities and exploits. We aim to investigate if we could discover the existence of exploits for disclosed vulnerabilities in Twitter data streams. Reactive programming is used for performing filtering and querying of tweet to find potential exploits. The result of processing Twitter data streams with reactive programming could be broadcasted, by pointing towards potential exploits, which might create a cyber-attack. They can also be entered as a new entry into existing overt or open source intelligence repositories.
dc.format.extent 10 pages
dc.identifier.doi 10.24251/HICSS.2019.864
dc.identifier.isbn 978-0-9981331-2-6
dc.language.iso eng
dc.relation.ispartof Proceedings of the 52nd Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.subject Cyber Threat Intelligence and Analytics
dc.subject Software Technology
dc.subject Vulnerability, Exploits, Reactive Programming, OSINT
dc.title Detecting Cyber Security Vulnerabilities through Reactive Programming
dc.type Conference Paper
dc.type.dcmi Text
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
827.92 KB
Adobe Portable Document Format