Analyzing Cyber Attacks and Breaches: A Comprehensive Monitoring Approach
Main Article Content
Abstract
Analyzing cyber incident data sets is a crucial strategy to enhance our understanding of the evolving threat landscape. Although this area of research is relatively new, there is still much ground to cover. In this report, we present a statistical analysis of a data set comprising 12 years of cyber hacking activities, including malware attacks. Contrary to what has been reported in existing literature, we find that both the inter-arrival times of hacking breach incidents and the breach sizes should be modeled using stochastic processes rather than distributions due to their autocorrelations. To address this, we propose specific stochastic process models to appropriately fit the inter-arrival times and breach sizes. Moreover, these models effectively predict both the inter-arrival times and the breach sizes. To gain deeper insights into the patterns of hacking breach incidents, we conduct both qualitative and quantitative trend analyses on the data set. Through this comprehensive approach, we extract valuable cyber security insights. Notably, we observe that the frequency of cyber hacks is indeed increasing over time, indicating a worsening threat scenario. However, interestingly, the extent of the damage caused by these hacks has not shown a corresponding increase. By carefully studying these trends, we aim to contribute to the overall understanding of cyber security threats, helping organizations and researchers develop more effective strategies to protect against evolving cyber-attacks. Our findings highlight the importance of employing stochastic processes for modeling such incidents, and this work paves the way for further research and exploration in this dynamic field.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.