Abstract

In this article, we look at the potential relationship between the cost of IT security breaches and port-scan records - specifically, we postulate that the irregular movement of port-scan records is quite similar to stock exchange price dynamics, which have been partially satisfied with stochastic movement and Poisson arrival processing. By intuition, stochastic process methodology can emulate an enterprise's information IT security situation. Our proposed generic approach provides a reasonable procedure to estimate and evaluate IT security risk through data mining of port-scan logs

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.