Cargando…
Is COVID-19 Being Used to Spread Malware
With the rising number of people using social networks after the pandemic of COVID-19, cybercriminals took the advantage of (i) the increased base of possible victims and (ii) the use of a trending topic as the pandemic COVID-19 to lure victims and attract their attention and put malicious content t...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Nature Singapore
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10189705/ https://www.ncbi.nlm.nih.gov/pubmed/37220558 http://dx.doi.org/10.1007/s42979-023-01838-6 |
_version_ | 1785043141526552576 |
---|---|
author | Ahmed, Ruqayah N. Javed, Amir Bedewi, Wafi |
author_facet | Ahmed, Ruqayah N. Javed, Amir Bedewi, Wafi |
author_sort | Ahmed, Ruqayah N. |
collection | PubMed |
description | With the rising number of people using social networks after the pandemic of COVID-19, cybercriminals took the advantage of (i) the increased base of possible victims and (ii) the use of a trending topic as the pandemic COVID-19 to lure victims and attract their attention and put malicious content to infect the most possible number of people. Twitter platform forces an auto-shortening to any included URL within a 140-character message called “tweet” and this makes it easier for the attackers to include malicious URLs within Tweets. Here comes the need to adopt new approaches to resolve the problem or at least identify it to better understand it to find a suitable solution. One of the proven effective approaches is the adaption of machine learning (ML) concepts and applying different algorithms to detect, identify, and even block the propagation of malware. Hence, this study’s main objectives were to collect tweets from Twitter that are related to the topic of COVID-19 and extract features from these tweets and import them as independent variables for the machine learning models to be developed later, so they would identify imported tweets as to be malicious or not. |
format | Online Article Text |
id | pubmed-10189705 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Springer Nature Singapore |
record_format | MEDLINE/PubMed |
spelling | pubmed-101897052023-05-19 Is COVID-19 Being Used to Spread Malware Ahmed, Ruqayah N. Javed, Amir Bedewi, Wafi SN Comput Sci Original Research With the rising number of people using social networks after the pandemic of COVID-19, cybercriminals took the advantage of (i) the increased base of possible victims and (ii) the use of a trending topic as the pandemic COVID-19 to lure victims and attract their attention and put malicious content to infect the most possible number of people. Twitter platform forces an auto-shortening to any included URL within a 140-character message called “tweet” and this makes it easier for the attackers to include malicious URLs within Tweets. Here comes the need to adopt new approaches to resolve the problem or at least identify it to better understand it to find a suitable solution. One of the proven effective approaches is the adaption of machine learning (ML) concepts and applying different algorithms to detect, identify, and even block the propagation of malware. Hence, this study’s main objectives were to collect tweets from Twitter that are related to the topic of COVID-19 and extract features from these tweets and import them as independent variables for the machine learning models to be developed later, so they would identify imported tweets as to be malicious or not. Springer Nature Singapore 2023-05-17 2023 /pmc/articles/PMC10189705/ /pubmed/37220558 http://dx.doi.org/10.1007/s42979-023-01838-6 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Original Research Ahmed, Ruqayah N. Javed, Amir Bedewi, Wafi Is COVID-19 Being Used to Spread Malware |
title | Is COVID-19 Being Used to Spread Malware |
title_full | Is COVID-19 Being Used to Spread Malware |
title_fullStr | Is COVID-19 Being Used to Spread Malware |
title_full_unstemmed | Is COVID-19 Being Used to Spread Malware |
title_short | Is COVID-19 Being Used to Spread Malware |
title_sort | is covid-19 being used to spread malware |
topic | Original Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10189705/ https://www.ncbi.nlm.nih.gov/pubmed/37220558 http://dx.doi.org/10.1007/s42979-023-01838-6 |
work_keys_str_mv | AT ahmedruqayahn iscovid19beingusedtospreadmalware AT javedamir iscovid19beingusedtospreadmalware AT bedewiwafi iscovid19beingusedtospreadmalware |