Submit your paper : editorIJETjournal@gmail.com
Paper Title : Modeling and Predicting Cyber Hacking Breaches
ISSN : 2395-1303
Year of Publication : 2022
MLA Style: -Dr. P. Shanmuga Priya, K. Sai Vineela, D. Keerthi, M. Hema Haritha Modeling and Predicting Cyber Hacking Breaches , Volume 8 - Issue 5 September - October 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org
APA Style: -Dr. P. Shanmuga Priya, K. Sai Vineela, D. Keerthi, M. Hema Haritha Modeling and Predicting Cyber Hacking Breaches , Volume 8 - Issue 5 September - October 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org
Modeling and predicting cyber hacking breaches is a vital, however difficult, problems. during this paper, we tend to initiate the study of modeling and predicting cyber hacking breaches. In this study we tend to plan a theoretical account model to predict each hacking breach incident lay to rest arrival times and breach sizes, here we'll use each qualitative and quantitative analysis on the information set.
 P. R. Clearinghouse. Privacy Rights Clearinghouse’s Chronology of Data Breaches. Accessed:Nov.2017.[Online]. Available:https://www.privacyrights.org/data-breaches.  ITR Center. Data Breaches Increase 40 Percent in 2016, Finds New Report From fraud Resource Center and CyberScout. Accessed: Nov. 2017.[Online].Available: http://www.idtheftcenter.org/ 2016databreaches.html.  C. R. Center. Cybersecurity Incidents. Accessed: Nov. 2017. [Online]. Available: https://www.opm.gov/cybersecurity/cybersecurity-incidents.  K. Scarfone, P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” NIST Special Publication800-94, Feb. 2007.  NetDiligence. The 2016 Cyber Claims Study. Accessed: Nov. 2017. [Online]. Available: https://netdiligence.com/wp-content/uploads/2016/ 10/P02_NetDiligence2016-Cyber-Claims-Study-ONLINE.pdf.  M. Eling and W. Schnell, “What can we realize cyber risk and cyber risk insurance?” J. Risk Finance, vol. 17, no. 5, pp. 474–491, 2016.  T. Maillart and D. Sornette, “Heavy-tailed distribution of cyber-risks,” Eur. Phys. J. B, vol. 75, no. 3, pp. 357–364, 2010.  R. B. Security. Datalossdb. Accessed: Nov. 2017.[Online].Available: https://blog.datalossdb.org.  F.Y. Leu, J.C. Lin, M.C. Li, C.T Yang, P.C Shih, “Integrating Grid with Intrusion Detection,” Proc. 19thInternational Conference on Advanced Information Networking and Applications, pp. 304-309, 2005.  White paper, “Intrusion Detection: A Survey,” ch.2, DAAD19-01, NSF, 2002.
— Cyber risk analysis, Hacking breach, breach prediction, knowledge breach cyber threats, analysis, cyber security knowledge analytics and statistic.