Copyright : © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed
under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-
commercial use, distribution, and reproduction in any medium, provided the original work is properly cited
International Journal of Scientific Research in Science, Engineering and Technology
Print ISSN: 2395-1990 | Online ISSN : 2394-4099 (www.ijsrset.com)
doi : https://doi.org/10.32628/IJSRSET207443
170
Predicting and Analysis of Phishing Attacks and Breaches In E-Commerce
Websites
N. Ram Mohan
1
, N. Praveen Kumar
2
1
M. Tech Scholar Department of CSE, NRI Institute of Technology Visadala (V&M), Guntur(Dt), Andhra
Pradesh, India
2
Assistant Professor Department of CSE, NRI Institute of Technology Visadala (V&M), Guntur(Dt), Andhra
Pradesh, India
Article Info
Volume 7 Issue 4
Page Number : 170-175
Publication Issue :
July-August-2020
Article History
Accepted : 01 Aug 2020
Published : 05 Aug 2020
ABSTRACT
Analyzing cyber incident data sets is an important method for deepening our
understanding of the evolution of the threat situation. This is a relatively new
research topic, and many studies remain to be done. In this paper, I reported a
statistical analysis of a breach incident data set corresponding to 12 years
(2005–2017) of cyber hacking activities that include malware attacks. I shown
that, in contrast to the findings reported in the literature, both hacking breach
incident inter-arrival times and breach sizes should be modeled by stochastic
processes, rather than by distributions because they exhibit autocorrelations.
Then, I proposed a particular stochastic process models to, respectively, fit the
inter-arrival times and the breach sizes. I also shown that these models can
predict the inter-arrival times and the breach sizes. In order to get deeper
insights into the evolution of hacking breach incidents, we conduct both
qualitative and quantitative trend analyses on the data set. I drew a set of cyber
security insights, including that the threat of cyber hacks is indeed getting
worse in terms of their frequency, but not in terms of the magnitude of their
damage.
Keywords: Hacking, Cyber-Attacks, Cyber Threats, Breach Prediction, Times
Series, Cybersecurity Data Analytics.
I. INTRODUCTION
Data breaching is an act of disseminating the highly
sensitive data which are intended to be kept secret.
Disclosing the data to the unsecured domain either
with a motive or unintentionally. It occurs when the
third-party or an unauthorized individual tries to
steal or access the data which may comprises of top
secrets, company shares, transaction details or
legal information. There are different types of data
breaching which includes phishing, denial of service
attack, malware and exfiltration. From time to time
we hear about several companies and industries
announcing that their systems have been breached.
This might happen by illegal action of the intruders.