Project-12 ppt11
Project-12 ppt11
Project-12 ppt11
HACKING BREACHES BY
IN
1
CONTENTS
• INTRODUCTION.
• ABSTRACT.
• SYSTEM ANALYSIS.
EXISTING SYSTEM.
DRAWBACKS OF EXISTING SYSTEM.
PROPOSED SYSTEM.
ADVANTAGES OF PROPOSED SYSTEM.
• SYSTEM ARCHITECTURE.
• LITERATURE SURVEY.
• SYSTEM REQUIREMENTS.
HARDWARE REQUIREMENTS.
SOFTWARE REQUIREMENTS.
• CONCLUSION.
• REFERENCES.
• THANK YOU.
• ANY QUERIES.
2
INTRODUCTION :
A data breach is an incident where information is stolen or taken from a system without the
knowledge or authorization of the system's owner.
A security breach is any incident that results in unauthorized access to computer data,
applications, networks or devices. It results in information being accessed without authorization.
Typically, it occurs when an intruder is able to bypass security mechanisms.
3
ABSTRACT:
Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the
threat situation. This is a relatively new research topic, and many studies remain to be done. In this paper, we report a
statistical analysis of a breach incident data set corresponding to 12 years (2005–2017) of cyber hacking activities that
include malware attacks. We show that, in contrast to the findings reported in the literature, both hacking breach incident
inter-arrival times and breach sizes should be modeled by stochastic processes, rather than by distributions because they
exhibit autocorrelations. Then, we propose particular stochastic process models to, respectively, fit the inter-arrival times and
the breach sizes.
4
SYSTEM ANALYSIS:
EXISTING SYSTEM:
The dataset analyzed in only covered the time span from 2000 to 2008 and does not necessarily contain the breach
incidents that are caused by cyber-attacks; the dataset analyzed is more recent, but contains two kinds of incidents: negligent
breaches (i.e., incidents caused by lost, discarded, stolen devices and other reasons) and malicious breaching. Since negligent
breaches represent more human errors than cyber-attacks, we do not consider them in the present study. Because the malicious
breaches studied contain four sub-categories: hacking (including malware), insider, payment card fraud, and unknown, this
study will focus on the hacking sub-category (called hacking breach dataset thereafter), while noting that the other three sub-
categories are interesting on their own and should be analyzed separately.
5
DRAWBACKS OF EXISTING SYSTEM :
To avoid all these limitations and make the working more accurately the system needs to be computerized in a
better way.
6
PROPOSED SYSTEM:
In this paper, we make the following three contributions.
First, we show that both the hacking breach incident interarrival times (reflecting incident frequency) and breach
sizes should be modeled by stochastic processes, rather than by distributions. A particular ARMA-GARCH model
can adequately describe the evolution of the hacking breach sizes, where ARMA is acronym for “Auto Regressive
and Moving Average” and GARCH is acronym for “Generalized Auto Regressive Conditional Heteroskedasticity”.
Second, we discover a positive dependence between the incidents inter-arrival times and the breach sizes, and show
that this dependence can be adequately described by a particular copula. We also show that when predicting inter-
arrival times and breach sizes, it is necessary to consider the dependence; otherwise, the prediction results are not
accurate.
Third, we conduct both qualitative and quantitative trend analyses of the cyber hacking breach incidents. We find
that the situation is indeed getting worse in terms of the incidents inter-arrival time because hacking breach
incidents become more and more frequent, but the situation is stabilizing in terms of the incident breach size,
indicating that the damage of individual hacking breach incidents will not get much worse.
7
ADVANTAGES OF PROPOSED SYSTEM :
The system is very simple in design and to be implement. The system requires very low system resources and
the system will work in almost all configurations. It has got following features :
8
ARCHITECTURE:
9
Literature Survey:
10
SYSTEM REQUIREMENTS:
The project involved analyzing the design of few applications so as to make the application more
users friendly. To do so, it was really important to keep the navigations from one screen to the other well
ordered and at the same time reducing the amount of typing the user needs to do. In order to make the
application more accessible, the browser version had to be chosen so that it is compatible with most of the
Browsers.
11
Hardware Requirements:
For developing the application the following are the Hardware Requirements:
RAM: 256 MB
Software Requirements:
12
CONCLUSION:
We analyzed a hacking breach dataset from the points of view of the incidents inter-arrival time and the breach size,
and showed that they both should be modeled by stochastic processes rather than distributions. The statistical models
developed in this paper show satisfactory fitting and prediction accuracies. In particular, we propose using a copula-based
approach to predict the joint probability that an incident with a certain magnitude of breach size will occur during a future
period of time. Statistical tests show that the methodologies proposed in this paper are better than those which are presented
in the literature, because the latter ignored both the temporal correlations and the dependence between the incidents inter-
arrival times and the breach sizes.
We conducted qualitative and quantitative analyses to draw further insights. We drew a set of cybersecurity insights,
including that the threat of cyber hacking breach incidents is indeed getting worse in terms of their frequency, but not the
magnitude of their damage.
13
REFERENCES:
2. I. T. R. Center, “http://www.idtheftcenter.org/2016databreaches.html.”
4. I. Security, https://www.ibm.com/security/data-breach/index.html.
14
THANK
YOU..
15
ANY QUERY ?
PLEASE ASK…
16