Please use this identifier to cite or link to this item: https://repository.seku.ac.ke/handle/123456789/8234
Title: Uncovering sentiment-based predictors of cyber defacement attacks: A case of online discourse on x-platform
Authors: Kanja, George K.
Angolo, Shem M.
Shikali, Casper S.
Keywords: sentiment analysis
cyber defacement attacks
x platform
predictive modeling
cybersecurity monitoring
early-warning systems
Issue Date: 2025
Publisher: Scientific Research Publishing
Citation: Journal of information security, volume 16, issue 4, pp 568-594, 2025
Abstract: This paper discussed the possibility of utilizing a sentiment analysis of online discussions on X platform (which was previously X) as a predictor of cyber defacement attacks. It bridged a serious gap in the literature on cybersecurity, where the focus has been on technical signatures and little consideration has been made on socio-technical antecedents. The hypothesis that spikes of negative public sentiment might be predictive indicators of ideologically motivated cases of defacement was tested in the study. A hybrid sentiment analysis model was used, which incorporates lexicon-based VADER model with machine learning classifiers, such as Naive Bayes and Long Short-Term Memory networks. The data consisted of 503456 posts related to cybersecurity and the data were compared to the verified cases of defacement in repositories like ZoneH using time-series analysis, Pearson correlation, and cross-correlation functions. Findings indicated that negative sentiment only comprised of 8.6% of the posts with the majority being neutral (50.9) and positive (40.5). The temporal analysis showed that there is not a substantial change in negative sentiment, but short bursts of negative sentiment are associated with cybersecurity disclosure. The cross-correlation analysis showed only weak contemporaneous correlation (r ≈ 0.12, lag = 0 days) but no predictive correlation in negative lags. The stacked ensemble model (Naïve Bayes, BiLSTM, ARIMA) was very strong in classification (Accuracy = 0.8568, F1 = 0.8055, ROC-AUC = 0.9116) but mainly it was very sensitive to concurrent or retrospective signals. The research established that aggregate sentiment does not provide predictive information, socio-technical prediction would combat inactive fine-grained and entity-specific signals combined with technical threat knowledge.
Description: https://doi.org/10.4236/jis.2025.164029
URI: https://www.scirp.org/pdf/jis_7801155.pdf
http://repository.seku.ac.ke/xmlui/handle/123456789/8234
ISSN: 2153-1242
Appears in Collections:School of Science and Computing (JA)

Files in This Item:
File Description SizeFormat 
Kanja_Uncovering sentiment-based predictors of cyber defacement attacks....pdfabstract288.82 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.