Volume 20 No 10 (2022)
 Download PDF
Detection of Cyber Hacking Breaches using Machine Learning Algorithm
Dr. A. Rama Swamy Reddy , Talasila Alekhya
Abstract
Analyzing the data gathered from cyber events is crucial if we are to understand the present state of the threat environment. There are still a lot of unanswered questions in this field of study. Based on malware attacks that occurred between 2005 and 2017, we did a statistical analysis of the data. Contrary to popular belief, we discover that hacking violation case interarrival durations and violation dimensions must be created by stochastic processes, not circulatory systems, as previously thought. This is because of autocorrelations. As a next step, we present stochastic process models for inter-arrival times and violation dimensions. These designs can also forecast the intervals between arrivals and the sizes of violations. For a better understanding of how hacking incidents are progressing, we do both qualitative and quantitative trend assessments on the data set. A current understanding of cyber security shows an increase in the frequency and severity of cyber attacks without an increase in their size.
Keywords
Cyber Hacking Breaches,Machine Learning, Attacks,Classifications
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.