Submit your articles to the African Journal of Biomedical Research, active in Scopus Q3 and Clarivate Web of Science Zoological Records. Click here to submit your manuscript.
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
Volume 11 (2024) | Issue 5
To deepen our insight into the evolution of a threat situation, study of cyber incident data sources is an essential process. This is a relatively recent subject for science and many experiments still have to be conducted. Throughout this article, we present statistical analysis of the 12-year cyber hacking operation (2005-2017) violation incident data set which includes attacks by malware. We prove that, in comparison to the literary results, breach sizes and inter-arrival times for hacking breaches can be modeled instead of distributions, since they have an auto-correlation. In order to adapt the time of the intercom and the scale of the violation, we suggest complex stochastic process models. We also prove that the inter arrival periods and the violation scale can be estimated from these models. We perform quantitative and qualitative pattern research on the data set to achieve a better understanding of the growth of hacking infringement incidents. We derive a variety of observations into cyber security, including the challenge of cyber hacking in its scale, but not in its severity.