Professional Documents
Culture Documents
Modeling and Predicting The Cyber Hacking Breaches 15 Slides
Modeling and Predicting The Cyber Hacking Breaches 15 Slides
Modeling and Predicting The Cyber Hacking Breaches 15 Slides
BREACHES
Batch no:05
Branch :CSE
Section :A
TEAM MEMBERS:
K. Saipriyanka ( 16NP1A0520)
Under the Guidance of: B. Teja Sri (16NP1A0507)
Miss.P.Sarala G. Sudharma (16NP1A0515)
CSE Dept SK. Mehanaz (16NP1A0548)
ABSTRACT
Analyzing cyber incident data sets is an important
method for deepening our understanding of the
evolution of the threat situation. we report a statistical
analysis of a breach incident data set corresponding to
12 years (2005–2017) of cyber hacking activities that
include malware attacks. We show that, in contrast to
the findings reported in the literature, both hacking
breach incident inter-arrival times and breach sizes
should be modeled by stochastic processes, we conduct
both qualitative and quantitative trend analyses on the
data set.
EXISTING SYSTEM:
❏ Are data breaches caused by cyber-attacks increasing,
decreasing, or stabilizing?
❏ The dataset analyzed ,covered the time span from
2000 to 2008 and does not necessarily contain the
breach incidents that are caused by cyber-attacks.
❏ Two kinds of incidents: negligent breaches,
malicious breaches.
DISADVANTAGES:
❏ Mentioning the breach size.
❏ We don’t know how it was hacked.
PROPOSED SYSTEM:
❏ Breach incident data set corresponding to 12 years
(2005–2017) of cyber hacking activities that
include malware attacks.
❏ We show that both the hacking breach incident
interarrival times (reflecting incident frequency)
and breach sizes.
ADVANTAGES:
❏ Knowing the inter-arrival times and the breach
sizes,attack.
❏ Both qualitative and quantitative trend analyses of
the cyber hacking breach incidents.
ALGORITHM: