Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World

The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world. Numerous scholarly papers have explored methods for collecting and extracting...

Full description

Saved in:
Bibliographic Details
Main Authors: Seokhee Lee, Aisha Abdu Hassan Mujammami, Kyounggon Kim
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10770224/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841542555787853824
author Seokhee Lee
Aisha Abdu Hassan Mujammami
Kyounggon Kim
author_facet Seokhee Lee
Aisha Abdu Hassan Mujammami
Kyounggon Kim
author_sort Seokhee Lee
collection DOAJ
description The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world. Numerous scholarly papers have explored methods for collecting and extracting data from social networks, shedding light on the importance of cyber threat intelligence. In this paper, data were collected from X (former ‘Twitter’) using a script based on specific keywords. Our research underscores the widespread nature of social networks, where a wealth of information is disseminated, and a substantial number of threat information. Given that a considerable portion of these cybercrime threats are shared through social networks, making them a priority becomes crucial. The findings of our research highlight the importance of effectively using social networks in understanding and responding to cyber threats. The study contributes to improving cybersecurity in the Arab region by providing information on the dynamics of cyber threats and the method of operation of attack groups. It emphasizes the critical role of social networks in contemporary cyber-attack landscapes, offering practical implications for cybersecurity practitioners, law enforcement agencies, and policymakers committed to securing the digital environment in Arab nations.
format Article
id doaj-art-6e569a92693240f0937f35f4ec709438
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-6e569a92693240f0937f35f4ec7094382025-01-14T00:02:42ZengIEEEIEEE Access2169-35362025-01-01135679569310.1109/ACCESS.2024.350802510770224Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab WorldSeokhee Lee0https://orcid.org/0009-0007-6142-7891Aisha Abdu Hassan Mujammami1Kyounggon Kim2Center of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi ArabiaCenter of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi ArabiaCenter of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi ArabiaThe primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world. Numerous scholarly papers have explored methods for collecting and extracting data from social networks, shedding light on the importance of cyber threat intelligence. In this paper, data were collected from X (former ‘Twitter’) using a script based on specific keywords. Our research underscores the widespread nature of social networks, where a wealth of information is disseminated, and a substantial number of threat information. Given that a considerable portion of these cybercrime threats are shared through social networks, making them a priority becomes crucial. The findings of our research highlight the importance of effectively using social networks in understanding and responding to cyber threats. The study contributes to improving cybersecurity in the Arab region by providing information on the dynamics of cyber threats and the method of operation of attack groups. It emphasizes the critical role of social networks in contemporary cyber-attack landscapes, offering practical implications for cybersecurity practitioners, law enforcement agencies, and policymakers committed to securing the digital environment in Arab nations.https://ieeexplore.ieee.org/document/10770224/Attack trendscybercrimessocial networksArab worldthreat intelligence
spellingShingle Seokhee Lee
Aisha Abdu Hassan Mujammami
Kyounggon Kim
Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
IEEE Access
Attack trends
cybercrimes
social networks
Arab world
threat intelligence
title Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
title_full Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
title_fullStr Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
title_full_unstemmed Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
title_short Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
title_sort leveraging social networks for cyber threat intelligence analyzing attack trends and ttps in the arab world
topic Attack trends
cybercrimes
social networks
Arab world
threat intelligence
url https://ieeexplore.ieee.org/document/10770224/
work_keys_str_mv AT seokheelee leveragingsocialnetworksforcyberthreatintelligenceanalyzingattacktrendsandttpsinthearabworld
AT aishaabduhassanmujammami leveragingsocialnetworksforcyberthreatintelligenceanalyzingattacktrendsandttpsinthearabworld
AT kyounggonkim leveragingsocialnetworksforcyberthreatintelligenceanalyzingattacktrendsandttpsinthearabworld