Detecting Cyber Security Vulnerabilities through Reactive Programming

dc.contributor.author Moholth, Ole Christian
dc.contributor.author Juric, Radmila
dc.contributor.author McClenaghan, Karoline Moholth
dc.date.accessioned 2019-01-03T00:57:55Z
dc.date.available 2019-01-03T00:57:55Z
dc.date.issued 2019-01-08
dc.description.abstract We propose a software architectural model, which uses reactive programming for collecting and filtering live tweets and interpreting their potential correlation to software vulnerabilities and exploits. We aim to investigate if we could discover the existence of exploits for disclosed vulnerabilities in Twitter data streams. Reactive programming is used for performing filtering and querying of tweet to find potential exploits. The result of processing Twitter data streams with reactive programming could be broadcasted, by pointing towards potential exploits, which might create a cyber-attack. They can also be entered as a new entry into existing overt or open source intelligence repositories.
dc.format.extent 10 pages
dc.identifier.doi 10.24251/HICSS.2019.864
dc.identifier.isbn 978-0-9981331-2-6
dc.identifier.uri http://hdl.handle.net/10125/60157
dc.language.iso eng
dc.relation.ispartof Proceedings of the 52nd Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject Cyber Threat Intelligence and Analytics
dc.subject Software Technology
dc.subject Vulnerability, Exploits, Reactive Programming, OSINT
dc.title Detecting Cyber Security Vulnerabilities through Reactive Programming
dc.type Conference Paper
dc.type.dcmi Text
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
0717.pdf
Size:
827.92 KB
Format:
Adobe Portable Document Format
Description: