Author:
Miranda-Calle Julián Darío,Reddy C. Vikranth,Dhawan Parag,Churi Prathamesh
Abstract
Purpose
The impact of cyberattacks all over the world has been increasing at a constant rate every year. Performing exploratory analysis helps organizations to identify, manage and safeguard the information that could be vulnerable to cyber-attacks. It encourages to the creation of a plan for security controls that can help to protect data and keep constant tabs on threats and monitor their organization’s networks for any breaches.
Design/methodology/approach
The purpose of this experimental study is to state the use of data science in analyzing data and to provide a more detailed view of the most common cybersecurity attacks, what are the most accessed logical ports, visible patterns, as well as the trends and occurrence of attacks. The data to be processed has been obtained by aggregating data provided by a company’s technology department, which includes network flow data produced by nine different types of attacks within every day user activities. This could be insightful for many companies to measure the damage caused by these breaches but also gives a foundation for future comparisons and serves as a basis for proactive measures within industry and organizations.
Findings
The most common cybersecurity attacks, most accessed logical ports and their visible patterns were found in the acquired data set. The strategies, which attackers have used with respect to time, type of attacks, specific ports, IP addresses and their relationships have been determined. The statistical hypothesis was also performed to check whether attackers were confined to perform random attacks or to any specific machines with some pattern.
Originality/value
Policies can be suggested such that if an attack is conducted on a specific machine, which can be prevented by identifying the machine, ports and duration of the attacks on which the attacker is targeting and to formulate such policies that the organization should follow to tackle these targeted attacks in the future.
Subject
Electrical and Electronic Engineering,Mechanical Engineering,Mechanics of Materials,Geotechnical Engineering and Engineering Geology,Civil and Structural Engineering
Reference28 articles.
1. 15 Alarming Cyber Security Facts and Stats (2020), available at: www.cybintsolutions.com/cyber-security-facts-stats/ (accessed 19 September 2020).
2. Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence;SOCA,2020
3. Analysis of a cyber defense exercise using exploratory sequential data analysis,2011
4. Data wrangling in database systems: purging of dirty data;Data,2020
5. Exploratory data analysis of a unified host and network dataset,2019
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献