Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries

被引:0
|
作者
Sufi, Fahim [1 ]
Alsulami, Musleh [2 ]
机构
[1] Monash Univ, Sch Publ Hlth & Prevent Med, Melbourne, Vic 3004, Australia
[2] Umm Al Qura Univ, Coll Comp, Dept Software Engn, Mecca 21961, Saudi Arabia
关键词
cybersecurity; mathematical modeling; clustering techniques; Gaussian Mixture Models (GMMs); Spectral Clustering; Bayesian inference; industry-specific cyber threats; temporal analysis; APT;
D O I
10.3390/math13040655
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The escalating prevalence of cyber threats across industries underscores the urgent need for robust analytical frameworks to understand their clustering, prevalence, and distribution. This study addresses the challenge of quantifying and analyzing relationships between 95 distinct cyberattack types and 29 industry sectors, leveraging a dataset of 9261 entries filtered from over 1 million news articles. Existing approaches often fail to capture nuanced patterns across such complex datasets, justifying the need for innovative methodologies. We present a rigorous mathematical framework integrating chi-square tests, Bayesian inference, Gaussian Mixture Models (GMMs), and Spectral Clustering. This framework identifies key patterns, such as 1150 Zero-Day Exploits clustered in the IT and Telecommunications sector, 732 Advanced Persistent Threats (APTs) in Government and Public Administration, and Malware with a posterior probability of 0.287 dominating the Healthcare sector. Temporal analyses reveal periodic spikes, such as in Zero-Day Exploits, and a persistent presence of Social Engineering Attacks, with 1397 occurrences across industries. These findings are quantified using significance scores (mean: 3.25 +/- 0.7) and posterior probabilities, providing evidence for industry-specific vulnerabilities. This research offers actionable insights for policymakers, cybersecurity professionals, and organizational decision makers by equipping them with a data-driven understanding of sector-specific risks. The mathematical formulations are replicable and scalable, enabling organizations to allocate resources effectively and develop proactive defenses against emerging threats. By bridging mathematical theory to real-world cybersecurity challenges, this study delivers impactful contributions toward safeguarding critical infrastructure and digital assets.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement
    Chen, Zheng-Shao
    Vaitheeshwari, R.
    Wu, Eric Hsiao-Kuang
    Lin, Ying-Dar
    Hwang, Ren-Hung
    Lin, Po-Ching
    Lai, Yuan-Cheng
    Ali, Asad
    IEEE ACCESS, 2024, 12 : 141851 - 141865
  • [42] A Framework for Threat-driven Cyber Security Verification of IoT Systems
    Kulik, Tomas
    Tran-Jorgensen, Peter W. V.
    Boudjadar, Jalil
    Schultz, Carl
    2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2018, : 89 - 97
  • [43] "I Know What You Did Before": General Framework for Correlation Analysis of Cyber Threat Incidents
    Kim, Daegeon
    Woo, JiYoung
    Kim, Huy Kang
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 782 - 787
  • [44] STIXGEN - A novel framework for Automatic Generation of Structured Cyber Threat Information
    Iqbal, Zafar
    Anwar, Zahid
    Mumtaz, Rafia
    2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, : 241 - 246
  • [45] AI-Based Holistic Framework for Cyber Threat Intelligence Management
    Spyros, Arnolnt
    Koritsas, Ilias
    Papoutsis, Angelos
    Panagiotou, Panos
    Chatzakou, Despoina
    Kavallieros, Dimitrios
    Tsikrika, Theodora
    Vrochidis, Stefanos
    Kompatsiaris, Ioannis
    IEEE ACCESS, 2025, 13 : 20820 - 20846
  • [46] A Cyber Attack Modeling and Impact Assessment Framework
    Kotenko, Igor
    Chechulin, Andrey
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [47] Detecting Insider Threat via a Cyber-Security Culture Framework
    Georgiadou, Anna
    Mouzakitis, Spiros
    Askounis, Dimitris
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (04) : 706 - 716
  • [48] A Framework for Cyber Threat Intelligence Extraction from Raw Log Data
    Landauer, Max
    Skopik, Florian
    Wurzenberger, Markus
    Hotwagner, Wolfgang
    Rauber, Andreas
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 3200 - 3209
  • [49] TIMFuser: A multi-granular fusion framework for cyber threat intelligence
    Ma, Chunyan
    Jiang, Zhengwei
    Zhang, Kai
    Ling, Zhiting
    Jiang, Jun
    You, Yizhe
    Yang, Peian
    Feng, Huamin
    COMPUTERS & SECURITY, 2025, 148
  • [50] Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform
    Gong, Seonghyeon
    Lee, Changhoon
    ELECTRONICS, 2021, 10 (03) : 1 - 19