Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries

被引:0
|
作者
Sufi, Fahim [1 ]
Alsulami, Musleh [2 ]
机构
[1] Monash Univ, Sch Publ Hlth & Prevent Med, Melbourne, Vic 3004, Australia
[2] Umm Al Qura Univ, Coll Comp, Dept Software Engn, Mecca 21961, Saudi Arabia
关键词
cybersecurity; mathematical modeling; clustering techniques; Gaussian Mixture Models (GMMs); Spectral Clustering; Bayesian inference; industry-specific cyber threats; temporal analysis; APT;
D O I
10.3390/math13040655
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The escalating prevalence of cyber threats across industries underscores the urgent need for robust analytical frameworks to understand their clustering, prevalence, and distribution. This study addresses the challenge of quantifying and analyzing relationships between 95 distinct cyberattack types and 29 industry sectors, leveraging a dataset of 9261 entries filtered from over 1 million news articles. Existing approaches often fail to capture nuanced patterns across such complex datasets, justifying the need for innovative methodologies. We present a rigorous mathematical framework integrating chi-square tests, Bayesian inference, Gaussian Mixture Models (GMMs), and Spectral Clustering. This framework identifies key patterns, such as 1150 Zero-Day Exploits clustered in the IT and Telecommunications sector, 732 Advanced Persistent Threats (APTs) in Government and Public Administration, and Malware with a posterior probability of 0.287 dominating the Healthcare sector. Temporal analyses reveal periodic spikes, such as in Zero-Day Exploits, and a persistent presence of Social Engineering Attacks, with 1397 occurrences across industries. These findings are quantified using significance scores (mean: 3.25 +/- 0.7) and posterior probabilities, providing evidence for industry-specific vulnerabilities. This research offers actionable insights for policymakers, cybersecurity professionals, and organizational decision makers by equipping them with a data-driven understanding of sector-specific risks. The mathematical formulations are replicable and scalable, enabling organizations to allocate resources effectively and develop proactive defenses against emerging threats. By bridging mathematical theory to real-world cybersecurity challenges, this study delivers impactful contributions toward safeguarding critical infrastructure and digital assets.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] CYBER THREAT MODELING FRAMEWORK
    Raposo de Melo, Renato Carvalho
    Albuquerque, Robson de Oliveira
    Lopes de Mendonca, Fabio Lficio
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [2] Analysis of Evolutionary Algorithm based Optimization for Cyber Threat Modeling
    Wright, Joseph Grady, V
    Sevil, Hakki Erhan
    Francia, Guillermo, III
    Youssef, Tarek
    Ghosh, Tirthankar
    Hall, Gregory
    SOUTHEASTCON 2022, 2022, : 751 - 756
  • [3] Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames
    Vaseashta, Ashok
    Susmann, Philip
    Braman, Eric
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 1 - 10
  • [4] Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System
    Javaid, Ahmad Y.
    Sun, Weiqing
    Devabhaktuni, Vijay K.
    Alam, Mansoor
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 585 - 590
  • [5] Modeling Insider Threat Types in Cyber Organizations
    Santos, Eunice E.
    Santos, Eugene, Jr.
    Korah, John
    Thompson, Jeremy E.
    Murugappan, Vairavan
    Subramanian, Suresh
    Zhao, Yan
    2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,
  • [6] Cyber Security Threat Modeling of A Telesurgery System
    Al Asif, Md Rashid
    Khondoker, Rahamatullah
    2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,
  • [7] Leveraging cyber threat intelligence for a dynamic risk framework
    Riesco, R.
    Villagra, V. A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) : 715 - 739
  • [8] SmartValidator: A framework for automatic identification and classification of cyber threat data
    Islam, Chadni
    Babar, M. Ali
    Croft, Roland
    Janicke, Helge
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 202
  • [9] Cyber Security Threat Modeling for Supply Chain Organizational Environments
    Yeboah-Ofori, Abel
    Islam, Shareeful
    FUTURE INTERNET, 2019, 11 (03)
  • [10] A Proposed Cyber Threat Incident Handling Framework for Schools in South Africa
    Sonhera, N.
    Kritzinger, E.
    Loock, M.
    PROCEEDINGS OF THE SOUTH AFRICAN INSTITUTE FOR COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS CONFERENCE, 2012, : 374 - 383