You are on page 1of 6

UGC AUTONOMOUS

MODELING AND PREDICTING CYBER HACKING


BREACHES

TEAM MEMBERS:
A. Keerthana (18W91A05C7)
Under the Guidance of: M. Bhagya (18W91A05D8)
MD. Rehaman Pasha Raju Nayak (18W91A05F1)
CSE Dept T. Rushi (17W91A05A9)
ABSTRACT
Analyzing cyber incident data sets is an important
method for deepening our understanding of the
evolution of the threat situation. we report a statistical
analysis of a breach incident data set corresponding to
12 years (2005–2017) of cyber hacking activities that
include malware attacks. We show that, in contrast to
the findings reported in the literature, both hacking
breach incident inter-arrival times and breach sizes
should be modeled by stochastic processes, we conduct
both qualitative and quantitative trend analyses on the
data set.
EXISTING SYSTEM:
❏ Are data breaches caused by cyber-attacks increasing,
decreasing, or stabilizing?
❏ The dataset analyzed ,covered the time span from
2000 to 2008 and does not necessarily contain the
breach incidents that are caused by cyber-attacks.
❏ Two kinds of incidents: negligent breaches,
malicious breaches.
DISADVANTAGES:
❏ Mentioning the breach size.
❏ We don’t know how it was hacked.
PROPOSED SYSTEM:
❏ Breach incident data set corresponding to 12 years
(2005–2017) of cyber hacking activities that
include malware attacks.
❏ We show that both the hacking breach incident
interarrival times (reflecting incident frequency)
and breach sizes.
ADVANTAGES:
❏ Knowing the inter-arrival times and the breach
sizes , attack.
❏ Both qualitative and quantitative trend analyses of
the cyber hacking breach incidents.
SYSTEM REQUIREMENTS:
Software Requirements:
1. Python (3.6.2)
2. Django(1.11.5)
3. Mysql
4. Html , Css
5. Wampserver(2.4)
Hardware Requirements:
Processor: Pentium IV or higher.
RAM: 256 MB.
Space on Hard Disk: minimum 512MB
THANK YOU

You might also like