Logotipo ImpactU
Autor

Exploratory data analysis for cybersecurity

Acceso Cerrado

Abstract:

Purpose The impact of cyberattacks all over the world has been increasing at a constant rate every year. Performing exploratory analysis helps organizations to identify, manage and safeguard the information that could be vulnerable to cyber-attacks. It encourages to the creation of a plan for security controls that can help to protect data and keep constant tabs on threats and monitor their organization’s networks for any breaches. Design/methodology/approach The purpose of this experimental study is to state the use of data science in analyzing data and to provide a more detailed view of the most common cybersecurity attacks, what are the most accessed logical ports, visible patterns, as well as the trends and occurrence of attacks. The data to be processed has been obtained by aggregating data provided by a company’s technology department, which includes network flow data produced by nine different types of attacks within every day user activities. This could be insightful for many companies to measure the damage caused by these breaches but also gives a foundation for future comparisons and serves as a basis for proactive measures within industry and organizations. Findings The most common cybersecurity attacks, most accessed logical ports and their visible patterns were found in the acquired data set. The strategies, which attackers have used with respect to time, type of attacks, specific ports, IP addresses and their relationships have been determined. The statistical hypothesis was also performed to check whether attackers were confined to perform random attacks or to any specific machines with some pattern. Originality/value Policies can be suggested such that if an attack is conducted on a specific machine, which can be prevented by identifying the machine, ports and duration of the attacks on which the attacker is targeting and to formulate such policies that the organization should follow to tackle these targeted attacks in the future.

Tópico:

Network Security and Intrusion Detection

Citaciones:

Citations: 9
9

Citaciones por año:

Altmétricas:

Paperbuzz Score: 0
0

Información de la Fuente:

SCImago Journal & Country Rank
FuenteWorld Journal of Engineering
Cuartil año de publicaciónNo disponible
Volumen18
Issue5
Páginas734 - 749
pISSNNo disponible
ISSN1708-5284

Enlaces e Identificadores:

Artículo de revista