0% found this document useful (0 votes)
118 views4 pages

Modeling and Predicting Cyber Hacking Breaches: Ranjit Patnaik Sekharamantri, Avinash Grandhi

Uploaded by

19RH1AO544
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views4 pages

Modeling and Predicting Cyber Hacking Breaches: Ranjit Patnaik Sekharamantri, Avinash Grandhi

Uploaded by

19RH1AO544
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

© 2022 IJNRD | Volume 7, Issue 6 June 2022 | ISSN: 2456-4184 | IJNRD.

ORG

MODELING AND PREDICTING CYBER


HACKING BREACHES
1
Ranjit Patnaik Sekharamantri, 2Avinash Grandhi
1
Computer Science and Engineering
1
Lovely Professional University, Phagwara, India

Abstract: Using cyber occurrence informational indexes, we can better understand the development of the danger
situation. However, numerous investigations need to be completed. Using a break event informational collection
(2005-2017), we compare it to 12 years of cyber hacking activities, including malware assaults, in this paper. As
opposed to the findings of the writing, we demonstrate that both hacking break occurrence between appearance times
and penetration sizes ought to be visualized by stochastic procedures instead of conveyances, since they show
autocorrelations. In order to fit the appearance times and break sizes separately, we propose specific stochastic
procedure models. We also demonstrate that these models can also predict the appearance times and penetration sizes
in advance. Using the informational index, we conduct both subjective and quantitative pattern analyses in order to
gain additional insight into hacking attacks. Although cyber hacking risks are declining in terms of their recurrence,
they are not decreasing in terms of their impact on society. This is based on a number of cybersecurity experiences we
draw from.
Keywords: Cyber Security, Breaches, Data Analysis, Penetration Testing, Hacking.

Introduction:
When you hack into a computer, you are taking advantage of its computing system or private network. Data breaches
are when sensitive, confidential or otherwise protected data has been accessed in an unauthorized fashion by
cybercriminals using a computer or network in an attack. They are the act of unauthorised access to a network security
system for illicit purposes. Cyberattacks are attacks that involve the use of one or more computers or networks by
cybercriminals. There is a risk of embarrassment, loss of employment opportunities, and loss of business opportunities
associated with a data breach. This is a confirmed incident where sensitive, confidential information is accessed or
disclosed in an unauthorized manner. Among the risks associated with privacy breaches are embarrassment, loss of
employment opportunities, and loss of business opportunities. Cybercriminals who successfully infiltrate data sources
and retrieve sensitive information result in data breaches that pose physical risks to safety and identity theft.
Generally, data breaches can be accomplished physically by gaining access to computers or networks to steal local
files or remotely by bypassing network security. The most recent data breaches have been some of the largest in
recorded history. Cyber incidents that are devastating include data breaches. A number of records have been breached
since 2005, according to the Privacy Rights Clearinghouse, totaling 9,919,228,821. Identified Theft Resource Center
and Cyber Scout reported 1,093 breaches in 2016, 40% more than the 780 breaches in 2015. In the first six months of
2019, data breaches revealed 4.1 billion records. As of 2019, 1,473 data breaches have been reported in the United
States with over 164.68 million sensitive records exposed. More than 3800 breach reports have been published
exposing 4.1 billion records. Due to the increasing use of digital files and the large reliance on digital data by
companies and users, data breaches have gained attention. Approximately 7.9 billion records have been exposed
during data breaches since January 2020, including credit card numbers, home addresses, phone numbers and other
highly sensitive information.

IJNRD2206072 International Journal of Novel Research and Development (www.ijnrd.org) 635


© 2022 IJNRD | Volume 7, Issue 6 June 2022 | ISSN: 2456-4184 | IJNRD.ORG
2. Literature Survey
Our paper predicts cyber hacking breaches. In addition to posing a threat to personal and financial security, data
breaches can be costly for organizations that keep large amounts of personal data. Researchers and practitioners alike
have argued for robust and innovative cyber-insurance pricing models to manage residual IT security risks. However,
the accuracy of premiums remains an open question. In 2011, the paper developed a cyber-insurance model using the
emerging copula methodology, filling an important scholarly gap. In 2015, we identified two distinct spatiotemporal
patterns based on macroscopic analysis of attack traffic flows: deterministic and stochastic patterns. In this approach,
a gray box model is recommended to accommodate statistical properties/phenomena exhibited by the data. The
methodologies we use in our prediction are often equally applicable to the analysis of any cyber attack data, even
though the predictions are based on specific cyber attack data. There has been an increase in data breach incidents in
2015, leading to severe financial and legal repercussions for the affected organizations. Extreme values, extreme value
theory, prediction, gray-box models, time series.
Index Terms In 2015, many thousands of people have lost their private information as a result of data breaches as a
result of the opportunity theory of crime, institutional anomie theory, and institutional theory. According to some
reports, there have been alarming increases in the size and frequency of knowledge breaches. This has forced
institutions worldwide to respond to what appears to be a worsening situation. The economy, human privacy, and
even national security have been threatened by cyber attacks, which have become a drag. It is crucial that we have a
solid understanding of cyber attacks from a variety of perspectives in 2017 before we can adequately deal with the
issue. This issue can be difficult to model. A study of multivariate cybersecurity risks is presented in this paper. In our
first statistical approach, we use vine copulas to simulate the multivariate dependence observed by real-world
cyberattack data in 2018, using the Copula-GARCH model. Our current method of predicting breach size and inter-
arrival time is a stochastic process model.

3.Proposed System
Our three contributions are as follows:

In our first step, we demonstrate that stochastic processes should be modeled for hacking breach incident inter arrival
times (reflecting incident frequency) as well as breach sizes, rather than distributions. As they exhibit autocorrelation,
the evolution of hacking breach interarrival times can be described, and ARMA-GARCH models can be used to
accurately describe the evolution of hacking breach sizes. The acronym ARMA stands for "Auto Regressive and
Moving Average" and the acronym GARCH stands for "Generalized Auto Regressive Conditional
Heteroskedasticity". We use stochastic processes instead of distributions to model these cyber threat factors and show
that they can predict inter-arrival times and breach sizes.

We also find that the break-in interval and the break-in size are positively correlated.

Finally, we analyze cyber hacking breach incidents qualitatively and quantitatively. As a result of the increasing
number of hacking breach incidents, we see that the situation is indeed getting worse in terms of the inter arrival time
of incidents, but the size of the breach incidents is stabilizing, which indicates that the damage of individual breaches
won't get as severe.

For the first time, we show we can reduce inter-arrival time and breach size with a stochastic process model rather
than distributions. We also demonstrate that we can predict inter-arrival times and breach sizes with a stochastic
process model. We conduct a qualitative as well as quantitative analysis of cyber hacking breach incidents here to
solve the problems, the dependence must be considered, otherwise, the prediction would not be accurate. We use the
SUPPORT VECTOR MACHINE algorithm. The Support Vector Machine (SVM) is a machine learning supervised
machine learning algorithm that can be used to classify and predict. It is primarily used to classify

IJNRD2206072 International Journal of Novel Research and Development (www.ijnrd.org) 636


© 2022 IJNRD | Volume 7, Issue 6 June 2022 | ISSN: 2456-4184 | IJNRD.ORG

Architecture Diagram

4.Modules

1. Upload Data
In order to maintain the security of the data that is not released without the knowledge of the user, the administrator
and authorized user can upload the data resources to database with the keys. As a result of their details shared with the
admin, users are authorized based on their details. Only authorized users have access to the system, uploading files or
requesting them.
2. Access Details
A database user can have access to the database's data. Data uploaded are managed by the administrator, and the
administrator is the only person with the authority to approve or disapprove users based on their information.
3. User Permission
Any resource data may be accessed with only the administrator's permission. Users are permitted to share their data
with admin first and verify their data before accessing the data. Users are blocked according to the attempts they make
to access the data. If the user requests unblocking them, admins will unblock them according to their requests and
previous activities.
4. Data Analysis
In order to get the best analysis and prediction of the dataset as well as the given data policies, the collected data are
applied to a graph. It is possible to analyze the dataset using this pictorial representation to better understand its
details.

CONCLUSION:
The world over there have been numerous cases of standard data breaches, which shows how real the danger of
essential system attack is. Through the inclusion of refinement and specialized knowledge of software engineers, as
well as making the fundamental information structure dynamically enormous and entangled, it is constantly
vulnerable to exploitation. In this article, it is suggested that a multifaceted approach is needed; one that combines
development, competency in work, sensibility, and a convincing legal framework. In this context, it is important to
note that the vast majority of domains elucidated by this fundamental assessment can be made into inspirations for
future bearings. Initially, from a particular point of view, it is important to review new procedures that threaten the
security of the fundamental information system.

IJNRD2206072 International Journal of Novel Research and Development (www.ijnrd.org) 637


© 2022 IJNRD | Volume 7, Issue 6 June 2022 | ISSN: 2456-4184 | IJNRD.ORG
Moreover, from a law and approach perspective, governments must ensure that each part of the system that is deemed
essential is adequately protected by both real and approach instruments. It is necessary to conduct further research to
separate the total true scene that defines the fundamental information structure that includes every enabling law from
all regions.

REFERENCES:
[1] White paper, "Intrusion Detection: A Survey," ch.2, DAAD19-01, NSF, 2002.
[2] F.Y. Leu, J.C. Lin, M.C. Li, C.T Yang, P.C Shih, "Integrating Grid with Intrusion Detection," Proc. 19th
International Conference on Advanced Information Networking and Applications, pp. 304-309, 2005.
[3] P. R. Clearinghouse. Privacy Rights Clearinghouse's Chronology of Data Breaches. Accessed: Nov. 2017
[4] ITR Center. Data Breaches Increase 40 Percent in 2016, Finds New Report From fraud Resource Center
and CyberScout. Accessed: Nov. 2017.
[5] NetDiligence. The 2016 Cyber Claims Study. Accessed: Nov. 2017.
[6] M. Eling and W. Schnell, "What can we realize cyber risk and cyber risk insurance?" J. Risk Finance, vol.
17, no. 5, pp. 474 491, 2016.
[7] T. Maillart and D. Sornette, "Heavy-tailed distribution of cyber-risks," Eur. Phys. J. B. vol. 75, no. 3, pp.
357-364, 2010.
[8] C. R. Center. Cybersecurity Incidents. Accessed: Nov. 2017.

IJNRD2206072 International Journal of Novel Research and Development (www.ijnrd.org) 638

You might also like