Advanced AI Techniques For Cyber Hacking Breach Forecasting

Authors

  • H.fathima Assistant Professor Department of computer Applications(BCA), K.S.Rangasamy College of Arts and Science (Autonomous), Tiruchengode – 637215 Author
  • Dr.K.K.Savitha, Assistant Professor, Department of Computer Applications, Bharathiar University PG Extension and Research Centre, Erode. Author
  • Mr.S.Sakthivel Assistant Professor, Department of CS, Hindusthan College of Science and Commerce Perundurai - 638052 Author
  • T.Vadivel Assistant Professor Department of Computer Applications, K S Rangasamy College of Arts and Science, Tiruchengode, Tamil Nadu - 637 215, Author
  • Ms. M. Leelavathi Assistant Professor Sree Saraswathi Thyagaraja College, Pollachi - 642001 Author
  • VELDANDI SRIKANTH SR UNIVERSITY Author

Keywords:

AI, cyber hacking, malware attacks.

Abstract

Examining cyber event data sets is a crucial approach for enhancing our comprehension of the evolving threat landscape. This is a somewhat novel research area, and numerous investigations  are yet to be  conducted. This study presents a statistical analysis of a dataset pertaining to breach incidents during a 12-year period (2005–2017) including cyber hacking operations, including malware attacks. We demonstrate that, contrary to existing literature, both the inter-arrival periods of hacking breach incidents and the sizes of breaches should be described using stochastic processes rather than distributions, as they display autocorrelations. We offer specific stochastic process models to fit the inter-arrival periods and breach sizes, respectively. We additionally demonstrate that these models can forecast the inter-arrival intervals and the breach magnitudes. To gain deeper insights into the evolution of hacker breach incidents, we do both qualitative and quantitative trend studies on the dataset. We derive a collection of cyber security insights, indicating that the frequency of cyber intrusions is indeed growing, yet the severity of their damage remains unchanged.

DOI:  https://doi-ds.org/doilink/12.2025-65663568

Downloads

Published

2025-12-11

How to Cite

Advanced AI Techniques For Cyber Hacking Breach Forecasting. (2025). International Journal of Engineering and Science Research, 15(4), 479-492. https://ijesr.org/index.php/ijesr/article/view/1450

Similar Articles

1-10 of 540

You may also start an advanced similarity search for this article.