Title :
Monitoring software vulnerabilities through social networks analysis
Author :
Slim Trabelsi;Henrik Plate;Amine Abida;M. Marouane Ben Aoun;Anis Zouaoui;Chedy Missaoui;Sofien Gharbi;Alaeddine Ayari
Author_Institution :
SAP Labs France, Mougins, France
fDate :
7/1/2015 12:00:00 AM
Abstract :
Monitoring software vulnerability information requires an important financial and human effort in order to track all the scattered sources publishing the last news about software vulnerabilities, patches and exploits. We noticed that in some social networks like Twitter we can aggregate a lot of information related to software vulnerabilities in a single channel. In this paper, we analyse the Twitter feed in order to monitor most of the information related to software vulnerabilities including zero-day publications.
Keywords :
"Software","Security","Twitter","Media","Databases","Clustering algorithms","Monitoring"
Conference_Titel :
e-Business and Telecommunications (ICETE), 2015 12th International Joint Conference on