Keywords : Hacking breach
European Journal of Molecular & Clinical Medicine,
2021, Volume 8, Issue 2, Pages 659-661
To deepen our insight into the evolution of a threat situation, study of cyber incident data sources is an essential process. This is a relatively recent subject for science and many experiments still have to be conducted. Throughout this article, we present statistical analysis of the 12-year cyber hacking operation (2005-2017) violation incident data set which includes attacks bymalware. We prove that, in comparison to the literary results, breach sizes and inter-arrival times for hacking breaches can be modeled instead of distributions, since they have an auto-correlation. In order to adapt the time of the intercom and the scale of the violation, we suggest complex
stochastic process models. We also prove that the inter arrival periods and the violation scale can be estimated from these models. We perform quantitative and qualitative pattern research on the data set to achieve a better understanding of the growth of hacking infringement incidents. We derive a variety of observations into cyber security, including the challenge of cyber hacking in its scale, but not in its severity.