Modeling and Predicting Cyber Hacking Breaches: Under The Guidance Of: Team Members
Modeling and Predicting Cyber Hacking Breaches: Under The Guidance Of: Team Members
BREACHES
ADVANTAGES:
Knowing the inter-arrival times and the breach sizes.
Both qualitative and quantitative trend analyses of the cyber
hacking breach incidents.
SYSTEM REQUIREMENTS:
Software Requirements:
1. Python (3.6.2)
2. Django(1.11.5)
3. Mysql
4. Html , Css
5. Wampserver (2.4)
Hardware Requirements:
Processor: Pentium IV or higher.
RAM: 256 MB.
Space on Hard Disk: minimum 512MB
DESIGN
Architecture:
MODULES:
UPLOAD DATA:
The data resource to database can be uploaded by both
administrator and authorized user.
The data can be uploaded with key in order to maintain the
secrecy of the data that is not released without knowledge of
user.
ACCESS DETAILS:
The access of data from the database can be given by
administrators.
Uploaded data are managed by admin and admin is the only
person to provide the rights to process the accessing details and
approve or unapproved users based on their details.
USER PERMISSIONS:
The data from any resources are allowed to access the data with
only permission from administrator.If user is access the data
with wrong attempts then, users are blocked accordingly.
If user is requested to unblock them, based on the requests and
previous activities admin is unblock users.
DATA ANALYSIS:
Data analyses are done with the help of graph.
The collected data are applied to graph in order to get the best
analysis and prediction of dataset and given data policies.
ALGORITHM:
SUPPORT VECTOR MACHINE:
“Support Vector Machine” (SVM) is a supervised machine
learning algorithm which can be used for both
classification and regression challenges.
However, it is mostly used in classification problems.
Here, it is used to classify the nine type of cyber hacking
attacks. Namely,
ADMIN:
SEQUENCE DIAGRAM:
a)User
b)Admin
COLLABORATION DIAGRAM
a)User
b)Admin
USE CASE DIAGRAM:
a)User
b)Admin
COMPONENT DIAGRAM:
a)User
b)Admin
DEPLOYMENT DIAGRAM:
a)User
b)Admin
ACTIVITY DIAGRAM:
a)User
b)Admin
DATA FLOW DIAGRAM:
a)User
b)Admin
ER DIAGRAM:
a)User
b)Admin
TESTING
UNIT TESTING:
Unit testing involves the design of test cases that validate that
the internal program logic is functioning properly.
That program inputs produce valid outputs.
INTEGRATION TESTING:
Integration tests are designed to test integrated software
components to determine if they actually run as one program.
Exposing the problems that arise from the combination of
components.
FUNCTIONAL TESTING:
Functional tests provide systematic demonstrations.
It mainly centers on valid input , invalid input , output.
SYSTEM TESTING:
System testing ensures that the entire integrated software
system meets requirements.
OUTPUT SCREENSHOTS:
USER LOGIN
USER ADDDATA
MALWARE DATA:
UNMALWARE DATA:
ADMIN LOGIN:
BREACHES ANALYSIS:
GRAPHICAL ANALYSIS
CONCLUSION
We analyzed a hacking breach dataset from the points of view
of the incidents inter-arrival time and the breach size, and
showed that they both should be modeled by stochastic
processes.
And also we classify the nine type of attacks.
FUTURE WORK
More research needs to be conducted towards understanding
the predictability of breach incidents.
The statistical models developed in this project show
satisfactory fitting and prediction accuracies. The
methodology presented in this project can be adopted or
adapted to analyze datasets of a similar nature.
REFERENCES
Z. Zhan, M. Xu, and S. Xu, “Characterizing honeypot-captured cyber
attacks: Statistical framework and case study,” IEEE Trans. Inf. Forensics
Security, vol. 8, no. 11, pp. 1775–1789, Nov. 2013.
[23] Z. Zhan, M. Xu, and S. Xu, “Predicting cyber attack rates with
extreme values,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 8,
pp. 1666–1677, Aug. 2015.
C. Peng, M. Xu, S. Xu, and T. Hu, “Modeling and predicting extreme
cyber attack rates via marked point processes,” J. Appl. Stat., vol. 44,
no. 14, pp. 2534–2563, 2017.
R. Sen and S. Borle, “Estimating the contextual risk of data breach: An
empirical approach,” J. Manage. Inf. Syst., vol. 32, no. 2, pp. 314–341,
2015.
THANK YOU