Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries

被引:0
|
作者
Sufi, Fahim [1 ]
Alsulami, Musleh [2 ]
机构
[1] Monash Univ, Sch Publ Hlth & Prevent Med, Melbourne, Vic 3004, Australia
[2] Umm Al Qura Univ, Coll Comp, Dept Software Engn, Mecca 21961, Saudi Arabia
关键词
cybersecurity; mathematical modeling; clustering techniques; Gaussian Mixture Models (GMMs); Spectral Clustering; Bayesian inference; industry-specific cyber threats; temporal analysis; APT;
D O I
10.3390/math13040655
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The escalating prevalence of cyber threats across industries underscores the urgent need for robust analytical frameworks to understand their clustering, prevalence, and distribution. This study addresses the challenge of quantifying and analyzing relationships between 95 distinct cyberattack types and 29 industry sectors, leveraging a dataset of 9261 entries filtered from over 1 million news articles. Existing approaches often fail to capture nuanced patterns across such complex datasets, justifying the need for innovative methodologies. We present a rigorous mathematical framework integrating chi-square tests, Bayesian inference, Gaussian Mixture Models (GMMs), and Spectral Clustering. This framework identifies key patterns, such as 1150 Zero-Day Exploits clustered in the IT and Telecommunications sector, 732 Advanced Persistent Threats (APTs) in Government and Public Administration, and Malware with a posterior probability of 0.287 dominating the Healthcare sector. Temporal analyses reveal periodic spikes, such as in Zero-Day Exploits, and a persistent presence of Social Engineering Attacks, with 1397 occurrences across industries. These findings are quantified using significance scores (mean: 3.25 +/- 0.7) and posterior probabilities, providing evidence for industry-specific vulnerabilities. This research offers actionable insights for policymakers, cybersecurity professionals, and organizational decision makers by equipping them with a data-driven understanding of sector-specific risks. The mathematical formulations are replicable and scalable, enabling organizations to allocate resources effectively and develop proactive defenses against emerging threats. By bridging mathematical theory to real-world cybersecurity challenges, this study delivers impactful contributions toward safeguarding critical infrastructure and digital assets.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities
    Kim, Donghwa
    Ahn, Myung Kil
    Lee, Seongkee
    Lee, Donghwan
    Park, Moosung
    Shin, Dongkyoo
    IEEE ACCESS, 2023, 11 : 114187 - 114200
  • [32] Cyber Threat Analysis and Trustworthy Artificial Intelligence
    Wang, Shuangbao Paul
    Arafin, Md Tanvir
    Osuagwu, Onyema
    Wandji, Ketchiozo
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 86 - 90
  • [33] Cyber Threat Analysis in Smart Terminal Systems
    Simola, Jussi
    Poyhonen, Jouni
    Lehto, Martti
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 369 - 378
  • [34] Trustworthy Artificial Intelligence for Cyber Threat Analysis
    Wang, Shuangbao Paul
    Mullin, Paul A.
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, 2023, 542 : 493 - 504
  • [35] A Cyber-Physical Threat Analysis for Microgrids
    Rekik, Mouna
    Chtourou, Zied
    Gransart, Christophe
    Atieh, Ahmad
    2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, : 731 - 737
  • [36] On Threat Modeling and Mitigation of Medical Cyber-Physical Systems
    Almohri, Hussain
    Cheng, Long
    Yao, Danfeng
    Alemzadeh, Homa
    2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, : 114 - 119
  • [37] Threat Modeling for Cyber Range: An Ontology-Based Approach
    Gong, Lei
    Tian, Yu
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 1055 - 1062
  • [38] Cyber Security Threat Modeling for Supply Chain Organizational Environments
    Yeboah-Ofori, Abel
    Islam, Shareeful
    FUTURE INTERNET, 2019, 11 (03)
  • [39] A dataset for cyber threat intelligence modeling of connected autonomous vehicles
    Wang, Yinghui
    Ren, Yilong
    Qin, Hongmao
    Cui, Zhiyong
    Zhao, Yanan
    Yu, Haiyang
    SCIENTIFIC DATA, 2025, 12 (01)
  • [40] Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence
    Kadoguchi, Masashi
    Kobayashi, Hanae
    Hayashi, Shota
    Otsuka, Akira
    Hashimoto, Masaki
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 163 - 168