Loading

Monitoring Cyber Attacks and Analysis of Breaches
Anup S Kumar1, N.R. Sathish Kumar2, Arun Das3, Shubam4, S.P. Mani Raj5

1Anup S Kumar, UG Scholar, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
2N.R. Sathish Kumar, UG Scholar, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
3Arun Das, UG Scholar, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
4Shubam, UG Scholar, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
5S.P. Mani Raj, Assistant Professor, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
Manuscript received on 23 April 2019 | Revised Manuscript received on 02 May 2019 | Manuscript Published on 08 May 2019 | PP: 222-225 | Volume-7 Issue-5S3 February 2019 | Retrieval Number: E11420275S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. In present generation we come to know about many cyber breaches and hacking taking place. In this paper work, we research about the various cyber-attacks and breaches and study the way these attacks are done and find an alternative for the same. We show that rather than by distributing these attacks as because they exhibit autocorrelations, we should model by stochastic process both the hacking breach incident inter-arrival times and breach sizes. We draw a set of cyber securities insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency.
Keywords: Hacking, Cyber-attacks, Cyber Threats, Breach Prediction, Times Series, Cybersecurity Data Analytics.
Scope of the Article: Cyber-Physical Systems