Temitope Adekunle
The Use of AI to Analyze Social Media Attacks for Predictive Analytics
Adekunle, Temitope; Lawrence, Morolake; Alabi, Oluwaseyi; Ebong, Godwin; Ajiboye, Grace; Bamisaye, Temitope
Authors
Morolake Lawrence
Oluwaseyi Alabi
Godwin Ebong
Grace Ajiboye
Temitope Bamisaye
Abstract
Social engineering, on the other hand, presents weaknesses that are difficult to directly quantify in penetration testing. The majority of expert social engineers utilize phishing and adware tactics to convince victims to provide information voluntarily. Social Engineering (SE) in social media has a similar structural layout to regular postings but has a malevolent intrinsic purpose. Recurrent Neural Network-Long Short-Term Memory (RNN-LSTM) was used to train a novel SE model to recognize covert SE threats in communications on social networks. The dataset includes a variety of posts, including text, images, and videos. It was compiled over a period of several months and was carefully curated to ensure that it is representative of the types of content that is typically posted on social media. First, by using domain heuristics, the social engineering assaults detection (SEAD) pipeline is intended to weed out social posts with malevolent intent. After tokenizing each social media post into sentences, each post is examined using a sentiment analyzer to determine whether it is a training data normal or an abnormality. Subsequently, an RNN-LSTM model is trained to detect five categories of social engineering assaults, some of which may involve information-gathering signals. Comparing the experimental findings to the ground truth labeled by network experts, the SEA model achieved 0.82 classification precision and 0.79 recall.
Citation
Adekunle, T., Lawrence, M., Alabi, O., Ebong, G., Ajiboye, G., & Bamisaye, T. (in press). The Use of AI to Analyze Social Media Attacks for Predictive Analytics. #Journal not on list, 9(1), 17-24. https://doi.org/10.11648/j.ajomis.20240901.12
Journal Article Type | Article |
---|---|
Acceptance Date | Feb 5, 2024 |
Online Publication Date | Apr 2, 2024 |
Deposit Date | May 8, 2024 |
Publicly Available Date | May 8, 2024 |
Journal | American Journal of Operations Management and Information Systems |
Peer Reviewed | Peer Reviewed |
Volume | 9 |
Issue | 1 |
Pages | 17-24 |
DOI | https://doi.org/10.11648/j.ajomis.20240901.12 |
Files
Published Version
(394 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search