Submit your paper : editorIJETjournal@gmail.com Paper Title : Modeling and Predicting Cyber Hacking Breaches ISSN : 2395-1303 Year of Publication : 2022 10.5281/zenodo.7239153 MLA Style: -Dr. P. Shanmuga Priya, K. Sai Vineela, D. Keerthi, M. Hema Haritha Modeling and Predicting Cyber Hacking Breaches , Volume 8 - Issue 5 September - October 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: -Dr. P. Shanmuga Priya, K. Sai Vineela, D. Keerthi, M. Hema Haritha Modeling and Predicting Cyber Hacking Breaches , Volume 8 - Issue 5 September - October 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract Modeling and predicting cyber hacking breaches is a vital, however difficult, problems. during this paper, we tend to initiate the study of modeling and predicting cyber hacking breaches. In this study we tend to plan a theoretical account model to predict each hacking breach incident lay to rest arrival times and breach sizes, here we'll use each qualitative and quantitative analysis on the information set. Reference [1] P. R. Clearinghouse. Privacy Rights Clearinghouse’s Chronology of Data Breaches. Accessed:Nov.2017.[Online]. Available:https://www.privacyrights.org/data-breaches. [2] ITR Center. Data Breaches Increase 40 Percent in 2016, Finds New Report From fraud Resource Center and CyberScout. Accessed: Nov. 2017.[Online].Available: http://www.idtheftcenter.org/ 2016databreaches.html. [3] C. R. Center. Cybersecurity Incidents. Accessed: Nov. 2017. [Online]. Available: https://www.opm.gov/cybersecurity/cybersecurity-incidents. [4] K. Scarfone, P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” NIST Special Publication800-94, Feb. 2007. [5] NetDiligence. The 2016 Cyber Claims Study. Accessed: Nov. 2017. [Online]. Available: https://netdiligence.com/wp-content/uploads/2016/ 10/P02_NetDiligence2016-Cyber-Claims-Study-ONLINE.pdf. [6] M. Eling and W. Schnell, “What can we realize cyber risk and cyber risk insurance?” J. Risk Finance, vol. 17, no. 5, pp. 474–491, 2016. [7] T. Maillart and D. Sornette, “Heavy-tailed distribution of cyber-risks,” Eur. Phys. J. B, vol. 75, no. 3, pp. 357–364, 2010. [8] R. B. Security. Datalossdb. Accessed: Nov. 2017.[Online].Available: https://blog.datalossdb.org. [9] F.Y. Leu, J.C. Lin, M.C. Li, C.T Yang, P.C Shih, “Integrating Grid with Intrusion Detection,” Proc. 19thInternational Conference on Advanced Information Networking and Applications, pp. 304-309, 2005. [10] White paper, “Intrusion Detection: A Survey,” ch.2, DAAD19-01, NSF, 2002. Keywords — Cyber risk analysis, Hacking breach, breach prediction, knowledge breach cyber threats, analysis, cyber security knowledge analytics and statistic. |