Detecting Cyber Security Vulnerabilities through Reactive Programming
- Ole Christian Moholth, Kongsberg Gruppen, Kongsberg, Norway
- Radmila Juric, Faculty of Technology, Natural Sciences, and Maritime Science, University of Southeast Norway, Kongsberg, Norway
- Karoline Moholth McClenaghan, University of Southeast Norway, Kongsberg, Norway, Norway
AbstractWe propose a software architectural model, which uses reactive programming for collecting and filtering live tweets and interpreting their potential correlation to software vulnerabilities and exploits. We aim to investigate if we could discover the existence of exploits for disclosed vulnerabilities in Twitter data streams. Reactive programming is used for performing filtering and querying of tweet to find potential exploits. The result of processing Twitter data streams with reactive programming could be broadcasted, by pointing towards potential exploits, which might create a cyber-attack. They can also be entered as a new entry into existing overt or open source intelligence repositories.
Return to previous page