Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries

被引:0
|
作者
Sufi, Fahim [1 ]
Alsulami, Musleh [2 ]
机构
[1] Monash Univ, Sch Publ Hlth & Prevent Med, Melbourne, Vic 3004, Australia
[2] Umm Al Qura Univ, Coll Comp, Dept Software Engn, Mecca 21961, Saudi Arabia
关键词
cybersecurity; mathematical modeling; clustering techniques; Gaussian Mixture Models (GMMs); Spectral Clustering; Bayesian inference; industry-specific cyber threats; temporal analysis; APT;
D O I
10.3390/math13040655
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The escalating prevalence of cyber threats across industries underscores the urgent need for robust analytical frameworks to understand their clustering, prevalence, and distribution. This study addresses the challenge of quantifying and analyzing relationships between 95 distinct cyberattack types and 29 industry sectors, leveraging a dataset of 9261 entries filtered from over 1 million news articles. Existing approaches often fail to capture nuanced patterns across such complex datasets, justifying the need for innovative methodologies. We present a rigorous mathematical framework integrating chi-square tests, Bayesian inference, Gaussian Mixture Models (GMMs), and Spectral Clustering. This framework identifies key patterns, such as 1150 Zero-Day Exploits clustered in the IT and Telecommunications sector, 732 Advanced Persistent Threats (APTs) in Government and Public Administration, and Malware with a posterior probability of 0.287 dominating the Healthcare sector. Temporal analyses reveal periodic spikes, such as in Zero-Day Exploits, and a persistent presence of Social Engineering Attacks, with 1397 occurrences across industries. These findings are quantified using significance scores (mean: 3.25 +/- 0.7) and posterior probabilities, providing evidence for industry-specific vulnerabilities. This research offers actionable insights for policymakers, cybersecurity professionals, and organizational decision makers by equipping them with a data-driven understanding of sector-specific risks. The mathematical formulations are replicable and scalable, enabling organizations to allocate resources effectively and develop proactive defenses against emerging threats. By bridging mathematical theory to real-world cybersecurity challenges, this study delivers impactful contributions toward safeguarding critical infrastructure and digital assets.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Analysis of mathematical modeling in particular clustering process of mixed data
    Xu Yuanyuan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1760 - 1764
  • [22] Cyber Threat Detection and Application Analysis
    Yang, Shuangmao
    Wang, Ji
    Zhang, Jing
    Li, Hao
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 46 - 49
  • [23] Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification
    Ellerhold, Christian
    Schnagl, Johann
    Schreck, Thomas
    PROCEEDINGS OF THE 2023 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2023, 2023, : 17 - 29
  • [24] Correlation of Cyber Threat Intelligence Data Across Global Honeypots
    Thom, Jay
    Shah, Yash
    Sengupta, Shamik
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 766 - 772
  • [25] Threat Modeling of Cyber-Physical Systems in Practice
    Jamil, Ameerah-Muhsinah
    Ben Othmane, Lotfi
    Valani, Altaz
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2021), 2022, 13204 : 3 - 19
  • [26] Cyber Threat Trees for Large System Threat Cataloging and Analysis
    Ongsakorn, P.
    Turney, K.
    Thornton, M.
    Nair, S.
    Szygenda, S.
    Manikas, T.
    2010 IEEE INTERNATIONAL SYSTEMS CONFERENCE, 2010, : 610 - 615
  • [27] Mathematical Modeling of Quality and Productivity in Industries: A Review
    Illa, I. Nur
    Sin, Tan Chan
    Fathullah, G. M.
    Rosmaini, A.
    GREEN DESIGN AND MANUFACTURE: ADVANCED AND EMERGING APPLICATIONS, 2018, 2030
  • [28] CHEMICAL INDUSTRIES EFFLUENTS MATHEMATICAL-MODELING
    MELIKHOV, IV
    BOZHEVOLNOV, VE
    FIRSOVA, LP
    KHIMICHESKAYA PROMYSHLENNOST, 1989, (12): : 883 - 887
  • [29] Cyber threat intelligence framework using advanced malware forensics
    Keim Y.
    Mohapatra A.K.
    International Journal of Information Technology, 2022, 14 (1) : 521 - 530
  • [30] SmartValidator: A framework for automatic identification and classification of cyber threat data
    Islam, Chadni
    Babar, M. Ali
    Croft, Roland
    Janicke, Helge
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 202