Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world. Numerous scholarly papers have explored methods for collecting and extracting...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10770224/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841542555787853824 |
---|---|
author | Seokhee Lee Aisha Abdu Hassan Mujammami Kyounggon Kim |
author_facet | Seokhee Lee Aisha Abdu Hassan Mujammami Kyounggon Kim |
author_sort | Seokhee Lee |
collection | DOAJ |
description | The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world. Numerous scholarly papers have explored methods for collecting and extracting data from social networks, shedding light on the importance of cyber threat intelligence. In this paper, data were collected from X (former ‘Twitter’) using a script based on specific keywords. Our research underscores the widespread nature of social networks, where a wealth of information is disseminated, and a substantial number of threat information. Given that a considerable portion of these cybercrime threats are shared through social networks, making them a priority becomes crucial. The findings of our research highlight the importance of effectively using social networks in understanding and responding to cyber threats. The study contributes to improving cybersecurity in the Arab region by providing information on the dynamics of cyber threats and the method of operation of attack groups. It emphasizes the critical role of social networks in contemporary cyber-attack landscapes, offering practical implications for cybersecurity practitioners, law enforcement agencies, and policymakers committed to securing the digital environment in Arab nations. |
format | Article |
id | doaj-art-6e569a92693240f0937f35f4ec709438 |
institution | Kabale University |
issn | 2169-3536 |
language | English |
publishDate | 2025-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj-art-6e569a92693240f0937f35f4ec7094382025-01-14T00:02:42ZengIEEEIEEE Access2169-35362025-01-01135679569310.1109/ACCESS.2024.350802510770224Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab WorldSeokhee Lee0https://orcid.org/0009-0007-6142-7891Aisha Abdu Hassan Mujammami1Kyounggon Kim2Center of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi ArabiaCenter of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi ArabiaCenter of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi ArabiaThe primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world. Numerous scholarly papers have explored methods for collecting and extracting data from social networks, shedding light on the importance of cyber threat intelligence. In this paper, data were collected from X (former ‘Twitter’) using a script based on specific keywords. Our research underscores the widespread nature of social networks, where a wealth of information is disseminated, and a substantial number of threat information. Given that a considerable portion of these cybercrime threats are shared through social networks, making them a priority becomes crucial. The findings of our research highlight the importance of effectively using social networks in understanding and responding to cyber threats. The study contributes to improving cybersecurity in the Arab region by providing information on the dynamics of cyber threats and the method of operation of attack groups. It emphasizes the critical role of social networks in contemporary cyber-attack landscapes, offering practical implications for cybersecurity practitioners, law enforcement agencies, and policymakers committed to securing the digital environment in Arab nations.https://ieeexplore.ieee.org/document/10770224/Attack trendscybercrimessocial networksArab worldthreat intelligence |
spellingShingle | Seokhee Lee Aisha Abdu Hassan Mujammami Kyounggon Kim Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World IEEE Access Attack trends cybercrimes social networks Arab world threat intelligence |
title | Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World |
title_full | Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World |
title_fullStr | Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World |
title_full_unstemmed | Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World |
title_short | Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World |
title_sort | leveraging social networks for cyber threat intelligence analyzing attack trends and ttps in the arab world |
topic | Attack trends cybercrimes social networks Arab world threat intelligence |
url | https://ieeexplore.ieee.org/document/10770224/ |
work_keys_str_mv | AT seokheelee leveragingsocialnetworksforcyberthreatintelligenceanalyzingattacktrendsandttpsinthearabworld AT aishaabduhassanmujammami leveragingsocialnetworksforcyberthreatintelligenceanalyzingattacktrendsandttpsinthearabworld AT kyounggonkim leveragingsocialnetworksforcyberthreatintelligenceanalyzingattacktrendsandttpsinthearabworld |