Modeling and Predicting Cyber Hacking Breaches

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Help | Advanced Search

Computer Science > Cryptography and Security

Title: a survey on ethical hacking: issues and challenges.

Abstract: Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of penetration tests. The objective of penetration tests is to make existing systems and their corresponding data more secure, efficient and resilient. In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap. In fact, any identified exploitable vulnerability will be used to conduct attacks on systems, devices, or personnel. This growing problem should be solved and mitigated to reach better resistance against these attacks. Moreover, the advantages and limitations of penetration tests are also listed. The main issue of penetration tests that it is efficient to detect known vulnerabilities. Therefore, in order to resist unknown vulnerabilities, a new kind of modern penetration tests is required, in addition to reinforcing the use of shadows honeypots. This can also be done by reinforcing the anomaly detection of intrusion detection/prevention system. In fact, security is increased by designing an efficient cooperation between the different security elements and penetration tests.

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

Bibtex formatted citation.

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

IMAGES

  1. Panel 4: What Types Of Research Papers Should We Be Writing?

    ieee research paper on hacking

  2. Business paper: Ieee research paper format 2020

    ieee research paper on hacking

  3. Download IEEE Research papers free

    ieee research paper on hacking

  4. Download IEEE Research papers free

    ieee research paper on hacking

  5. IEEE Paper Format

    ieee research paper on hacking

  6. Ieee Paper Review Format / Paper ieee / The institute of electrical and electronics engineers

    ieee research paper on hacking

VIDEO

  1. How to Download IEEE Research Paper Free By Prof Abhijit Kalbande

  2. Ethical Hacking ve Capture the Flag Yarışmaları Tanıtımı (CTF101.1)

  3. Online Workshop on AI-Enhanced Scientific Writing

  4. 😈Hacking questions paper 😈#treandig #viral #hackingcourse #hacking_or_secutiy

  5. How to download IEEE research papers for free ||How to download IEEE paper free without access ||

  6. ঘর সাজানোর Amazing paper craft 🤑 #youtubeshorts #shorts #papercraft

COMMENTS

  1. Ethical Hacking: Importance, Controversies and ... - IEEE Xplore

    With the ongoing digitalisation of the modern world and our quest to digitalise and automate everything, issues related to cybersecurity such as data breaches, security breaches etc., will be in the spotlight. Therefore, ethical hacking and its importance in the future can't be undermined. Ethical hacking technology has spread to almost all fields of the life and especially to all paths of ...

  2. Modeling and Predicting Cyber Hacking Breaches | IEEE ...

    Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively new research topic, and many studies remain to be done. In this paper, we report a statistical analysis of a breach incident data set corresponding to 12 years (2005-2017) of cyber hacking activities that include malware attacks. We show that ...

  3. Digging Deeper into Data Breaches: An Exploratory Data ...

    Also if we look at hacking breaches targeting BSOs organisations, we note that there is a significant increase from 2013 to 2017 and a sharp decrease in 2018. 6 H. Hammouchi et al. / Procedia Computer Science 00 (2018) 000–000 (a) Overall trend of the evolution of Hacking breach (b) The evolution of hacking breaches by organization type ...

  4. Research communities in cyber security vulnerability ...

    Research shows a clear division between papers focusing on attack graphs and attack trees. Thus, authors write about attack graphs or trees, and seldom acknowledge the existence of the other. Research argues that attack graphs and trees are graph-based representations of a cyberattack.

  5. A Survey on Ethical Hacking: Issues and Challenges

    Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps ...