0% found this document useful (0 votes)
80 views6 pages

Modeling and Predicting Cyber Hacking Breaches

This document summarizes a study analyzing cyber hacking breach incidents from 2005-2017. It discusses the limitations of existing approaches that do not consider whether breaches are caused by cyber attacks or other factors. The proposed system analyzes a dataset of cyber hacking breaches over 12 years, examining trends in both the frequency of incidents using inter-arrival times and the sizes of breaches. It performs both qualitative and quantitative analyses of these trends.

Uploaded by

texxas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views6 pages

Modeling and Predicting Cyber Hacking Breaches

This document summarizes a study analyzing cyber hacking breach incidents from 2005-2017. It discusses the limitations of existing approaches that do not consider whether breaches are caused by cyber attacks or other factors. The proposed system analyzes a dataset of cyber hacking breaches over 12 years, examining trends in both the frequency of incidents using inter-arrival times and the sizes of breaches. It performs both qualitative and quantitative analyses of these trends.

Uploaded by

texxas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

UGC AUTONOMOUS

MODELING AND PREDICTING CYBER


HACKING BREACHES

TEAM MEMBERS:
A. Keerthana (18W91A05C7)
Under the Guidance of: M. Bhagya (18W91A05D8)
MD. Rehaman Pasha Raju Nayak (18W91A05F1)
CSE Dept T. Rushi (17W91A05A9)

This study source was downloaded by 100000862852247 from CourseHero.com on 02-25-2023 01:34:32 GMT -06:00
ABSTRACT
Analyzing cyber incident data sets is an important
method for deepening our understanding of the
evolution of the threat situation. we report a statistical
analysis of a breach incident data set corresponding to
12 years (2005–2017) of cyber hacking activities that
include malware attacks. We show that, in contrast to
the findings reported in the literature, both hacking
breach incident inter-arrival times and breach sizes
should be modeled by stochastic processes, we conduct
both qualitative and quantitative trend analyses on the
data set.

This study source was downloaded by 100000862852247 from CourseHero.com on 02-25-2023 01:34:32 GMT -06:00
EXISTING SYSTEM:
❏ Are data breaches caused by cyber-attacks increasing,
decreasing, or stabilizing?
❏ The dataset analyzed ,covered the time span from
2000 to 2008 and does not necessarily contain the
breach incidents that are caused by cyber-attacks.
❏ Two kinds of incidents: negligent breaches,
malicious breaches.
DISADVANTAGES:
❏ Mentioning the breach size.
❏ We don’t know how it was hacked.

This study source was downloaded by 100000862852247 from CourseHero.com on 02-25-2023 01:34:32 GMT -06:00
PROPOSED SYSTEM:
❏ Breach incident data set corresponding to 12 years
(2005–2017) of cyber hacking activities that
include malware attacks.
❏ We show that both the hacking breach incident
interarrival times (reflecting incident frequency)
and breach sizes.
ADVANTAGES:
❏ Knowing the inter-arrival times and the breach
sizes , attack.
❏ Both qualitative and quantitative trend analyses of
the cyber hacking breach incidents.

This study source was downloaded by 100000862852247 from CourseHero.com on 02-25-2023 01:34:32 GMT -06:00
SYSTEM REQUIREMENTS:
Software Requirements:
1. Python (3.6.2)
2. Django(1.11.5)
3. Mysql
4. Html , Css
5. Wampserver(2.4)
Hardware Requirements:
Processor: Pentium IV or higher.
RAM: 256 MB.
Space on Hard Disk: minimum 512MB

This study source was downloaded by 100000862852247 from CourseHero.com on 02-25-2023 01:34:32 GMT -06:00
THANK YOU

This study source was downloaded by 100000862852247 from CourseHero.com on 02-25-2023 01:34:32 GMT -06:00
Powered by TCPDF (www.tcpdf.org)

You might also like