Application of Sentiment Analysis to Prevent Cyberattacks on Objects of Critical Information Infrastructure
DOI:
https://doi.org/10.47839/ijc.22.4.3362Keywords:
cyber security, information security, sentiment analysis, neural networks, artificial intelligence, machine learning, critical infrastructure, PythonAbstract
The article addresses the pressing issue of ensuring cyber security for critical information infrastructure, which is associated with the development of modern information technologies and the increased potential for cyber attacks from criminal groups and potential adversary state entities. An analysis of the scientific literature indicates the necessity of preventive measures and scientific research, which involve monitoring the cyberspace. The application of sentiment analysis is proposed to detect the emotional sentiment towards critical information infrastructure objects. Following a defined algorithm, a sentiment analysis model is constructed based on an artificial neural network using open-source Python programming language libraries. The model's distinguishing feature is the consideration of emoticons to determine the intensification of emotional attitudes towards conducting cyber attacks on critical information infrastructure objects. A dataset related to cyber attacks from social media platforms such as Twitter and Instagram is collected to train the neural network. The results of training and testing the neural network provide grounds to assert that the network's accuracy of 0.7852 is relatively high, enabling its application by cyber reconnaissance units for early detection of cyber threats to critical infrastructure objects in combination with other tools.
References
On critical infrastructure: Law of Ukraine dated November 16, 2021 No. 1882-IX. [Online]. Available at: https://zakon.rada.gov.ua/laws/main/1882-20#Text (date of application: 01.02.2023) (in Ukrainian).
T. J. Holt, M. Stonhouse, J. Freilich, S. M. Chermak, “Examining ideologically motivated cyberattacks performed by far-left groups,” Terrorism and Political Violence, vol. 33, issue 3, pp. 527-548, 2021. https://doi.org10.1080/09546553.2018.1551213.
M. Mundt, H. Baier, “Mapping cyber-physical threats for critical infrastructures,” in: Hämmerli, B., Helmbrecht, U., Hommel, W., Kunczik, L., Pickl, S. (Eds.), Critical Information Infrastructures Security, CRITIS, Lecture Notes in Computer Science, vol. 13723. Springer, Cham, 2022. https://doi.org/10.1007/978-3-031-35190-7_12.
A. Marino, E. Zio, “A framework for the resilience analysis of complex natural gas pipeline networks from a cyber-physical system perspective,” Computers & Industrial Engineering, vol. 162, 107727, 2021. https://doi.org/10.1016/j.cie.2021.107727.
M. Domínguez, J. J. Fuertes, M. Prada, S. Alonso, A. Morán, D. Pérez, “Design of platforms for experimentation in industrial cybersecurity,” Appl. Sci., vol. 12, 6520, 2022. https://doi.org/10.3390/app12136520.
A. Mottahedi, F. Sereshki, M. Ataei, A. N. Qarahasanlou, A. Barabadi, “The resilience of critical infrastructure systems: A systematic literature review,” Energies, vol. 14, no. 6, 1571, 2021. https://doi.org/10.3390/en14061571.
G. M. Makrakis, C. Kolias, G. Kambourakis, C. Rieger, J. Benjamin, “Industrial and critical infrastructure security: Technical analysis of real-life security incidents,” IEEE Access, vol. 9, pp. 165295-165325, 2021. https://doi.org/10.1109/ACCESS.2021.3133348.
Y. Geeta, P. Kolin, “Architecture and security of SCADA systems: A review,” International Journal of Critical Infrastructure Protection, vol. 34, 100433, 2021. https://doi.org/10.1016/j.ijcip.2021.100433.
M. Conti, D. Donadel, F. Turrin, “A survey on industrial control system testbeds and datasets for security research,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2248-2294, 2021. https://doi.org/10.1109/COMST.2021.3094360.
M. Landauer, F. Skopik, M. Wurzenberger, A. Rauber, “System log clustering approaches for cyber security applications: A survey,” Computers & Security, vol. 92, 101739, 2020. https://doi.org/10.1016/j.cose.2020.101739.
V. Lakhno, B. Husiev, A. Blozva, D. Kasatkin, T. Osypova, “Clusterization of signs of network attacks in information security analysis problems,” Cyber Security: Education, Science, Technology, vol. 1, issue 9, pp. 45–58, 2020. (in Ukrainian). https://doi.org/10.28925/2663-4023.2020.9.4558.
A. Kuznetsov, V. Kalashnikov, R. Brumnyk, S. Kavun, “Editorial ‘Computational aspects of critical infrastructures security’, ‘Security and post-quantum cryptography’”, International Journal of Computing, vol. 19, issue 2, pp. 233-236, 2020. https://doi.org/10.47839/ijc.19.2.1766.
K. Shaukat, S. Luo, S. Chen, D. Liu, “Cyber threat detection using machine learning techniques: A performance evaluation perspective,” Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, pp. 1-6, 2020. https://doi.org/10.1109/ICCWS48432.2020.9292388.
A. Gupta, P. Matta, B. Pant, “Identification of cybercriminals in social media using machine learning,” Proceedings of the 2022 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), Bangalore, India, pp. 1-6, 2022. https://doi.org/10.1109/SMARTGENCON56628.2022.10084119.
M. Asif, A. Ishtiaq, H. Ahmad, H. Aljuaid, “Sentiment analysis of extremism in social media from textual information,” Telematics and Informatics, vol. 48, issue 3, 101345, 2020. http://dx.doi.org/10.1016/j.tele.2020.101345.
K. Dotson, “Microsoft previews AI-powered security copilot to help cybersecurity staff,” 2023 SiliconANGLE Media Inc. https://siliconangle.com/2023/03/28/microsoft-previews-ai-powered-security-copilot-assist-cybersecurity-professionals/.
P. Rogov, B. Vorovych, V. Tkachenko, “Ways of ensuring the cyber security of objects of the state's critical information infrastructure in the military sphere,” Collection of scientific works of the Center for Military and Strategic Studies of the National Defense University of Ukraine named after Ivan Chernyakhovsky, vol. 59, No. 1, 2017, pp. 64-72, (in Ukrainian). https://doi.org/10.33099/2304-2745/2017-1-59/64-72.
S. Mazepa, L. Dostalek, O. Sharmar, S. Banach, “Cybercrime and vulnerability of critical information infrastructure of Ukraine,” Proceedings of the 2020 10th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany, pp. 783-786, 2020. https://doi.org/10.1109/ACIT49673.2020.9208965.
L. Slipachuk, S. Tolyupa, V. Nakonechny, “Cybersecurity management process of critical infrastructure using an integrated management system of the national cyber security sector in Ukraine,” Proceedings of the 2019 3rd International Conference on Advanced Information and Communication Technologies (AICT), Lviv, Ukraine, 2019, pр. 451-454, https://doi.org/10.1109/AIACT.2019.8847877.
D. Antonakaki, P. Fragopoulou, S. Ioannidis, “A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks,” Expert Systems with Applications, vol. 164, 114006, 2021. https://doi.org/10.1016/j.eswa.2020.114006.
E. Pronoza, P. Panicheva, O. Koltsova, P. Rosso, “Detecting ethnicity-targeted hate speech in Russian social media texts,” Information Processing and Management, vol. 58, Issue 6, 102674, 2021. https://doi.org/10.1016/j.ipm.2021.102674.
J.-H. Park, H.-Y. Kwon, “Cyberattack detection model using community detection and text analysis on social media,” ICT Express, vol. 8, issue 4, pp. 499-506, 2022. https://doi.org/10.1016/j.icte.2021.12.003.
J. Huang, Y. Meng, F. Guo, H. Ji, J. Han, “Weakly-supervised aspect-based sentiment analysis via joint aspect-sentiment topic embedding,” Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 6989–6999, 2020. https://doi.org/2020. 10.18653/v1/2020.emnlp-main.568.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.