From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X
Article
Alsodi, Omar, Zhou, Xujuan, Gururajan, Raj, Shrestha, Anup and Btoush, Eyad. 2025. "From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X." Applied Sciences. 15 (7). https://doi.org/10.3390/app15073898
Article Title | From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X |
---|---|
ERA Journal ID | 211776 |
Article Category | Article |
Authors | Alsodi, Omar, Zhou, Xujuan, Gururajan, Raj, Shrestha, Anup and Btoush, Eyad |
Journal Title | Applied Sciences |
Journal Citation | 15 (7) |
Article Number | 3898 |
Number of Pages | 45 |
Year | 2025 |
Publisher | MDPI AG |
Place of Publication | Switzerland |
ISSN | 2076-3417 |
Digital Object Identifier (DOI) | https://doi.org/10.3390/app15073898 |
Web Address (URL) | https://www.mdpi.com/2076-3417/15/7/3898 |
Abstract | The pervasive use of social media platforms, such as X (formerly Twitter), has become a part of our daily lives, simultaneously increasing the threat of cyber attacks. To address this risk, numerous studies have explored methods to detect and predict cyber attacks by analyzing X data. This study specifically examines the application of AI techniques for predicting potential cyber threats on X. DeepNN consistently outperforms competing methods in terms of overall and average figure of merit. While character-level feature extraction methods are abundant, we contend that a semantic focus is more beneficial for this stage of the process. The findings indicate that current studies often lack comprehensive evaluations of critical aspects such as prediction scope, types of cybersecurity threats, feature extraction techniques, algorithm complexity, information summarization levels, scalability over time, and performance measurements. This review primarily focuses on identifying AI methods used to detect cyber threats on X and investigates existing gaps and trends in this area. Notably, over the past few years, limited review articles have been published on detecting cyber threats on X, especially those concentrating on recent journal articles rather than conference papers. |
Keywords | artificial intelligence; social media; cybersecurity; survey; security and privacy; natural language processing; cyber threat detection; X |
Contains Sensitive Content | Does not contain sensitive content |
ANZSRC Field of Research 2020 | 460499. Cybersecurity and privacy not elsewhere classified |
Byline Affiliations | Al-Zaytoonah University of Jordan, Jordan |
School of Business | |
SRM Institute of Science and Technology, India |
Permalink -
https://research.usq.edu.au/item/zx168/from-tweets-to-threats-a-survey-of-cybersecurity-threat-detection-challenges-ai-based-solutions-and-potential-opportunities-in-x
Download files
3
total views1
total downloads3
views this month1
downloads this month