Analysing Cyber Threats: A Comprehensive Literature Review on Data-Driven Approaches

Authors

  • Ayushi Monani  Department of Computer Engineering, Dr D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India
  • Omkar Bhusnale  Department of Computer Engineering, Dr D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India
  • Kunal Borade  Department of Computer Engineering, Dr D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India
  • Rucha Madali  Department of Computer Engineering, Dr D. Y. Patil Institute of Technology, Pimpri, Pune, Maharashtra, India

DOI:

https://doi.org/10.32628/CSEIT2390351

Keywords:

Prediction model, DoS attack, Discrete probability distribution, Apriori Viterbi model, Socio-technical attacks, Cyber-attack prediction, Bayesian network, Data Science, Cybersecurity, Network attacks, Events, Literature review.

Abstract

This literature review paper aims to examine and analyze the existing research on prediction models for different types of cyber-attacks. Four key research papers have been selected as the base for this review: "A Prediction Model of DoS Attack's Distribution Discrete Probability," "Apriori Viterbi Model for Prior Detection of Socio-Technical Attacks," "Cyber Attacks Prediction Model Based on Bayesian Network," and "Applying Data Science to Cybersecurity Network Attacks & Events.” An overview of the value of prediction models in cybersecurity and their function in reducing potential threats come first in the review. The methodology section outlines the search strategy used to identify relevant literature and the selection criteria for the base papers. The subsequent sections provide an overview of the field, highlighting the historical development and key theories or frameworks related to cyber-attack prediction. The themes or subtopics identified in the literature are discussed, focusing on the discrete probability distribution model of DoS attacks, the Apriori Viterbi model for detecting socio-technical attacks, the Bayesian network-based prediction model, and the application of data science in analyzing network attacks and events. The review critically evaluates the selected papers, analyzing their methodologies, findings, and limitations. It identifies gaps, controversies, and conflicting findings in the literature, paving the way for further research in the field. The synthesis and interpretation section integrates the findings from the different studies, compares various perspectives, and discusses the implications and significance of the literature for cyber-attack prediction. In conclusion, this literature review paper provides a comprehensive analysis of prediction models for cyber-attacks, based on the selected base papers. It highlights the strengths and weaknesses of existing approaches, identifies research gaps, and offers recommendations for future studies. This review contributes to the advancement of knowledge in the field of cybersecurity and aids in the development of more effective prediction models to combat evolving cyber threats.

References

  1. JunZhaoabXudongLiuabQibenYancBoLiabMinglaiShaoabHaoPe-ngabLichaoSund https://www.sciencedirect.com/science/article/pii/S0167404820304259?ref=pdf_download&fr=RR-2&rr=74b2e83f0c4f85d
  2. https://brainyx.co/journal/journal9/
  3. https://scholar.google.com/scholar_lookup?title=The%20impact%20of%20artificial%20intelligence%20on%20autonomous%20cyber%20defense&author=Crawford&publication_year=2017
  4. https://developer.lookingglasscyber.com/reference/getdocs
  5. https://warden.cesnet.cz/en/index
  6. https://lookingglasscyber.com/solutions/scoutthreat/
  7. https://f.hubspotusercontent30.net/hubfs/7412038/Data%20Sheets/Data%20Sheet%20_scoutTHREAT%202021%20_vFINAL.pdf
  8. https://lookingglasscyber.com/resources/case-studies/
  9. https://ieeexplore.ieee.org/document/9725445/metrics#metrics
  10. https://pure.port.ac.uk/ws/portalfiles/portal/13360330/ICISSP_2019_24_CR_1_.pdf
  11. https://pyattck.readthedocs.io/_/downloads/en/latest/pdf/
  12. http://ceur-ws.org/Vol-3056/paper-05.pdf
  13. https://bi-survey.com/big-data-security-analytics
  14. https://juice-shop.herokuapp.com/#/
  15. https://github.com/greenbone/openvas-scanner
  16. https://greenbone.github.io/docs/latest/background.html
  17. https://github.com/naserdamer/SMDD-Synthetic-Face-Morphing-Attack-Detection-Development-datase

Downloads

Published

2023-06-30

Issue

Section

Research Articles

How to Cite

[1]
Ayushi Monani, Omkar Bhusnale, Kunal Borade, Rucha Madali, " Analysing Cyber Threats: A Comprehensive Literature Review on Data-Driven Approaches" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 3, pp.188-193, May-June-2023. Available at doi : https://doi.org/10.32628/CSEIT2390351