To read this content please select one of the options below:

Exploratory data analysis for cybersecurity

Julián Darío Miranda-Calle (Pontifical Bolivarian University, Medellín, Colombia)
Vikranth Reddy C. (Department of Computer Science, Faculty of Engineering and Technology, Dr MGR Educational and Research Institute, Chennai, India)
Parag Dhawan (Visvesvaraya National Institute of Technology, Nagpur, India)
Prathamesh Churi (Department of Computer Engineering, Narsee Monjee Institute of Management Studies, Mumbai, India)

World Journal of Engineering

ISSN: 1708-5284

Article publication date: 17 February 2021

Issue publication date: 10 September 2021

337

Abstract

Purpose

The impact of cyberattacks all over the world has been increasing at a constant rate every year. Performing exploratory analysis helps organizations to identify, manage and safeguard the information that could be vulnerable to cyber-attacks. It encourages to the creation of a plan for security controls that can help to protect data and keep constant tabs on threats and monitor their organization’s networks for any breaches.

Design/methodology/approach

The purpose of this experimental study is to state the use of data science in analyzing data and to provide a more detailed view of the most common cybersecurity attacks, what are the most accessed logical ports, visible patterns, as well as the trends and occurrence of attacks. The data to be processed has been obtained by aggregating data provided by a company’s technology department, which includes network flow data produced by nine different types of attacks within every day user activities. This could be insightful for many companies to measure the damage caused by these breaches but also gives a foundation for future comparisons and serves as a basis for proactive measures within industry and organizations.

Findings

The most common cybersecurity attacks, most accessed logical ports and their visible patterns were found in the acquired data set. The strategies, which attackers have used with respect to time, type of attacks, specific ports, IP addresses and their relationships have been determined. The statistical hypothesis was also performed to check whether attackers were confined to perform random attacks or to any specific machines with some pattern.

Originality/value

Policies can be suggested such that if an attack is conducted on a specific machine, which can be prevented by identifying the machine, ports and duration of the attacks on which the attacker is targeting and to formulate such policies that the organization should follow to tackle these targeted attacks in the future.

Keywords

Acknowledgements

Conflict of Interest: There is no conflict of interest associated with research work.

Funding: An author receives no funding for the research.

Citation

Miranda-Calle, J.D., Reddy C., V., Dhawan, P. and Churi, P. (2021), "Exploratory data analysis for cybersecurity", World Journal of Engineering, Vol. 18 No. 5, pp. 734-749. https://doi.org/10.1108/WJE-11-2020-0560

Publisher

:

Emerald Publishing Limited

Copyright © 2021, Emerald Publishing Limited

Related articles