Data-Driven Cybersecurity: The Role of Business Analytics in Risk Management and Incident Response

Authors

  • Md Imran Khan Master of Science in information studies, Trine University, USA
  • Abdul Azeem Mohammed Master of Science In Technology Management, Lindsey Wilson College, USA
  • Md Murad Hasan Master of Science In Data Analytics (Business Analytics), University Of The Potomac, USA

Keywords:

Data-Driven Cybersecurity, Business Analytics, Risk Management, Incident Response

Abstract

The evolution of cyber threats is very dynamic and thus the challenge to organizations to seek the protection of digital assets and maintain business continuity. With conventional defense mechanisms failing to respond to sophisticated patterns of attacks, the need to incorporate data analytics into the cybersecurity operations has become an important strategic demand. In this study, the issue of business analytics as a means of fortifying cybersecurity, specifically, in the domain of risk management and incident response, will be studied. It is anchored upon the Hornet 15 data, which is a freely accessible repository of network flow data that has been collected during a seven-day period by honeypots present in eight cities that are distributed across the globe. The data provide a one-of-a-kind understanding of geographical variations in the intensity of cyberattacks and their patterns, creating the possibility to investigate regional exposure to threat and deviations in traffic comprehensively. The framework of the methodology includes statistical analysis, the identification of anomalies, and making predictions with the help of Python, Excel, and Kaggle environments. Among the methods, it is possible to note the use of a combination of the Isolation Forest algorithm to identify abnormal flow patterns and of the Random Forest classifier to identify the potentially harmful traffic that can be done with a high level of accuracy. Visualization techniques, such as bar graphs or heatmaps or geospatial thread Mapping are also used to increase interpretability. The peculiarities of geographical differentiation of the attack volume, the number of different source IP addresses, or data transmission patterns are observed cities, which are shown to be at a higher threat of being attacked. The insights produced during analysis demonstrate the importance of location-based threat information and justify the implementation of region-specific protection measures. In the study, the effectiveness of incorporating the business analytics techniques in cybersecurity structures has been brought forward. Improved data visibility, live monitoring, and business decision-making are outlined to be some of the main results of such a practice. The results lead to the development of data-driven approaches to cybersecurity and yield practical guidance to companies that want to transform their ability to evaluate risks and respond to incidents.

Downloads

Download data is not yet available.

References

1. Elvas, L. B., Marreiros, C. F., Dinis, J. M., Pereira, M. C., Martins, A. L., & Ferreira, J. C. (2020). Data-driven approach for incident management in a smart city. Applied Sciences, 10(22), 8281.

https://www.mdpi.com/2076-3417/10/22/8281

2. Naseer, A., & Siddiqui, A. M. (2022, December). The effect of big data analytics in enhancing agility in cybersecurity incident response. In 2022 16th International Conference on Open Source Systems and Technologies (ICOSST) (pp. 1-8). IEEE.

https://ieeexplore.ieee.org/abstract/document/10016853

3. Galla, E. P., Rajaram, S. K., Patra, G. K., Madhavram, C., & Rao, J. (2022). AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance. Available at SSRN 4980649.

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4980649

4. Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6), 2055-2072.

https://ieeexplore.ieee.org/abstract/document/8673585

5. Akter, S., Uddin, M. R., Sajib, S., Lee, W. J. T., Michael, K., & Hossain, M. A. (2022). Reconceptualizing cybersecurity awareness capability in the data-driven digital economy. Annals of Operations Research, 1-26.

https://link.springer.com/article/10.1007/s10479-022-04844-8

6. Nwaimo, C. S., Adewumi, A., & Ajiga, D. (2022). Advanced data analytics and business intelligence: Building resilience in risk management. International Journal of Scientific Research and Applications, 6(2), 121.

7. Beka, M. M. (2021). Cyber Risk Management for data-driven enterprises (Master's thesis, Πανεπιστήμιο Πειραιώς).

https://dione.lib.unipi.gr/xmlui/handle/unipi/14695

8. Abisoye, A., & Akerele, J. I. (2021). A high-impact data-driven decision-making model for integrating cutting-edge cybersecurity strategies into public policy, governance, and organizational frameworks. Governance, and Organizational Frameworks.

https://www.researchgate.net/profile/Anfo-Pub-2/publication/389609226_A_High-Impact_Data-Driven_Decision-Making_Model_for_Integrating_Cutting-Edge_Cybersecurity_Strategies_into_Public_Policy_Governance_and_Organizational_Frameworks/links/67c9a0b6cc055043ce6e2175/A-High-Impact-Data-Driven-Decision-Making-Model-for-Integrating-Cutting-Edge-Cybersecurity-Strategies-into-Public-Policy-Governance-and-Organizational-Frameworks.pdf

9. Santini, P., Gottardi, G., Baldi, M., & Chiaraluce, F. (2019). A Data‐Driven Approach to Cyber Risk Assessment. Security and Communication Networks, 2019(1), 6716918.

https://onlinelibrary.wiley.com/doi/full/10.1155/2019/6716918

10. O’Connell, F. (2022). Data-Driven Cybersecurity: AI-Based Predictive Models for Threat Intelligence and Risk Mitigation. International Journal of AI, BigData, Computational and Management Studies, 3(1), 21-31.

http://ijaibdcms.org/index.php/ijaibdcms/article/view/37

11. Chinta, P. C. R., & Katnapally, N. (2021). Neural Network-Based Risk Assessment for Cybersecurity in Big Data-Oriented ERP Infrastructures. Neural Network-Based Risk Assessment for Cybersecurity in Big Data-Oriented ERP Infrastructures.

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5106425

12. Cooper, M. (2020). Proactive Risk Management: Utilizing AI and Big Data in Cyber Defense and Supply Chain Optimization.

https://www.researchgate.net/profile/Mason-Cooper/publication/384323215_Proactive_Risk_Management_Utilizing_AI_and_Big_Data_in_Cyber_Defense_and_Supply_Chain_Optimization/links/66f403e4869f1104c6b491b3/Proactive-Risk-Management-Utilizing-AI-and-Big-Data-in-Cyber-Defense-and-Supply-Chain-Optimization.pdf

13. Haider, B. (2020). Cybersecurity Innovations in Snowflake Databases Through AI-Driven Business Intelligence in the Cloud.

https://www.researchgate.net/profile/Bilal-Haider-17/publication/388106159_Cybersecurity_Innovations_in_Snowflake_Databases_Through_AI-_Driven_Business_Intelligence_in_the_Cloud/links/678a40751ec9f9589f47e4cd/Cybersecurity-Innovations-in-Snowflake-Databases-Through-AI-Driven-Business-Intelligence-in-the-Cloud.pdf

14. Sun, N. (2020). Data-driven cybersecurity incident prediction and discovery (Doctoral dissertation, Deakin University).

15. Afrifah, W., Epiphaniou, D. G., Ersotelos, N., & Maple, C. (2022). Barriers and opportunities in cyber risk and compliance management for data-driven supply chains.

https://scholarspace.manoa.hawaii.edu/items/67be3728-d30a-48cd-aecf-b9e67c5ed379

16. Rehman, H., & Liu, H. (2021). Proactive Cyber Defense: Utilizing AI and IoT for Early Threat Detection and Cyber Risk Assessment in Future Networks.

https://www.researchgate.net/profile/Hui-Liu-386/publication/384052025_Proactive_Cyber_Defense_Utilizing_AI_and_IoT_for_Early_Threat_Detection_and_Cyber_Risk_Assessment_in_Future_Networks/links/66e6ad1cdde50b3258746a5f/Proactive-Cyber-Defense-Utilizing-AI-and-IoT-for-Early-Threat-Detection-and-Cyber-Risk-Assessment-in-Future-Networks.pdf

17. Aslam, N., & Kuang, J. (2022). Data-Driven Approaches to Infrastructure Protection: Utilizing Big Data and Machine Learning for Cybersecurity.

https://www.researchgate.net/profile/Jiao-Kuang-2/publication/385416520_Data-Driven_Approaches_to_Infrastructure_Protection_Utilizing_Big_Data_and_Machine_Learning_for_Cybersecurity/links/67238a0edb208342dee0f108/Data-Driven-Approaches-to-Infrastructure-Protection-Utilizing-Big-Data-and-Machine-Learning-for-Cybersecurity.pdf

18. Husák, M. (2021, November). Towards a data-driven recommender system for handling ransomware and similar incidents. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 1-6). IEEE.

https://ieeexplore.ieee.org/abstract/document/9624774

19. Kumar, S. (2022). Securing Business Intelligence Systems with AI/ML-Driven Cybersecurity in ERP Cloud and Snowflake DB Ecosystems.

https://www.researchgate.net/profile/Samrat-Kumar-7/publication/388451903_Securing_Business_Intelligence_Systems_with_AIML-Driven_Cybersecurity_in_ERP_Cloud_and_Snowflake_DB_Ecosystems/links/6798f322207c0c20fa62bf2c/Securing-Business-Intelligence-Systems-with-AI-ML-Driven-Cybersecurity-in-ERP-Cloud-and-Snowflake-DB-Ecosystems.pdf

20. Sarker, I. H. (2021). Data science and analytics: an overview from data-driven smart computing, decision-making and applications perspective. SN Computer Science, 2(5), 377.

https://link.springer.com/article/10.1007/s42979-021-00765-8

21. Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Whitty, M. T., & Baskerville, R. L. (2021). How can organizations develop situation awareness for incident response: A case study of management practice. Computers & Security, 101, 102122.

https://www.sciencedirect.com/science/article/abs/pii/S0167404820303953

22. Zohuri, B., Bowen, P. E., Kumar, A. A. D., & Moghaddam, M. (2022). Energy Driven by Internet of Things Analytics and Artificial Intelligence. J. Energy Power Eng., 16, 24-31.

https://www.researchgate.net/profile/Akansha-Agarwal-6/publication/360073158_Energy_Driven_by_Internet_of_Things_Analytics_and_Artificial_Intelligence/links/6260416b8cb84a40ac7c7cb7/Energy-Driven-by-Internet-of-Things-Analytics-and-Artificial-Intelligence.pdf

23. Shiva, R. (2022). The Role of AI in Securing Critical Infrastructure: A Data-Driven Approach to Cyber Defense.

https://www.researchgate.net/profile/Ronaldo-Shiva/publication/388525378_The_Role_of_AI_in_Securing_Critical_Infrastructure_A_Data-Driven_Approach_to_Cyber_Defense/links/679bc49c4c479b26c9c2df46/The-Role-of-AI-in-Securing-Critical-Infrastructure-A-Data-Driven-Approach-to-Cyber-Defense.pdf

24. Vellani, K. H. (2019). Data-Driven Security. In Strategic Security Management (pp. 1-10). CRC Press.

https://www.taylorfrancis.com/chapters/edit/10.4324/9780429506611-1/data-driven-security-karim-vellani

25. Zhu, Y., Zhang, Y., Wang, J., Song, W., Chu, C. C., & Liu, G. (2019, July). From data-driven to intelligent-driven: technology evolution of network security in big data era. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 2, pp. 103-109). IEEE.

https://ieeexplore.ieee.org/abstract/document/8754176

26. Okamoto, H. (2021). The Role of Information Security Event Management (SIEM) in Enhancing Intrusion Detection and Cybersecurity Through Machine Learning Technology.

https://www.researchgate.net/profile/Hakim-Okamoto/publication/385085163_The_Role_of_Information_Security_Event_Management_SIEM_in_Enhancing_Intrusion_Detection_and_Cybersecurity_Through_Machine_Learning_Technology/links/6714ec99d796f96b8ec383de/The-Role-of-Information-Security-Event-Management-SIEM-in-Enhancing-Intrusion-Detection-and-Cybersecurity-Through-Machine-Learning-Technology.pdf

27. Girn, S. (2022, July). A data driven approach to board cybersecurity governance. In Pacific Asia Conference on Information Systems 2022. AIS.

https://opus.lib.uts.edu.au/handle/10453/159073

28. Ivanova, S. (2022). Cybersecurity Challenges and Risk Management Strategies in Digital Sports Project Platforms. International Journal of Emerging Trends in Computer Science and Information Technology, 3(2), 23-31.

https://www.ijetcsit.org/index.php/ijetcsit/article/view/63

29. Bechtsis, D., Tsolakis, N., Iakovou, E., & Vlachos, D. (2022). Data-driven secure, resilient and sustainable supply chains: gaps, opportunities, and a new generalised data sharing and data monetisation framework. International Journal of Production Research, 60(14), 4397-4417.

https://www.tandfonline.com/doi/abs/10.1080/00207543.2021.1957506

30. Yin, J., Tang, M., Cao, J., You, M., & Wang, H. (2022). Cybersecurity applications in software: data-driven software vulnerability assessment and management. In Emerging trends in cybersecurity applications (pp. 371-389). Cham: Springer International Publishing.

https://link.springer.com/chapter/10.1007/978-3-031-09640-2_17

31. Newell, A. (2021). Optimizing Cloud Infrastructure: AI/ML Solutions for Snowflake Databases and Business Intelligence.

https://www.researchgate.net/profile/Allen-Newell/publication/387996057_Optimizing_Cloud_Infrastructure_AIML_Solutions_for_Snowflake_Databases_and_Business_Intelligence/links/6786360e55274940f1263018/Optimizing-Cloud-Infrastructure-AI-ML-Solutions-for-Snowflake-Databases-and-Business-Intelligence.pdf

32. Reddy, P. S., & Pelletier, J. M. (2022, May). The pentest method for business intelligence. In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) (pp. 1117-1125). IEEE.

https://ieeexplore.ieee.org/abstract/document/9803788

33. Torres, M. A. E., Guerrero, F. T., & Budgud, A. T. (2022, December). Data-Driven Cyber Threat Intelligence: A Survey of Mexican Territory. In 2nd EAI International Conference on Smart Technology (pp. 89-110). Cham: Springer International Publishing.

https://link.springer.com/chapter/10.1007/978-3-031-07670-1_7

34. Andreassen, J., Eileraas, M., Herrera, L. C., & Noori, N. S. (2022, October). Increase: A dynamic framework towards enhancing situational awareness in cyber incident response. In International Conference on Information Technology in Disaster Risk Reduction (pp. 230-243). Cham: Springer Nature Switzerland.

https://link.springer.com/chapter/10.1007/978-3-031-34207-3_15

35. AlSadhan, T., & Park, J. S. (2021, December). Leveraging information security continuous monitoring to enhance cybersecurity. In 2021 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 753-759). IEEE.

https://ieeexplore.ieee.org/abstract/document/9799002'

36. Tseng, M. L., Bui, T. D., Lim, M. K., Fujii, M., & Mishra, U. (2022). Assessing data-driven sustainable supply chain management indicators for the textile industry under industrial disruption and ambidexterity. International Journal of Production Economics, 245, 108401.

https://www.sciencedirect.com/science/article/abs/pii/S0925527321003777

37. Lee, C. S., Cheang, P. Y. S., & Moslehpour, M. (2022). Predictive analytics in business analytics: decision tree. Advances in Decision Sciences, 26(1), 1-29.

https://www.proquest.com/openview/3453584715adbe9094f8bd061f67f64d/1?pq-origsite=gscholar&cbl=25336

38. Bachmann, N., Tripathi, S., Brunner, M., & Jodlbauer, H. (2022). The contribution of data-driven technologies in achieving the sustainable development goals. Sustainability, 14(5), 2497.

https://www.mdpi.com/2071-1050/14/5/2497

39. Crotty, J., & Daniel, E. (2022). Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment. Applied Computing and Informatics, (ahead-of-print).

https://www.emerald.com/insight/content/doi/10.1108/aci-07-2022-0178/full/html

40. Alonso, G. (2022). Leveraging Snowflake DB for AI/ML-Driven Business Intelligence and Cybersecurity in ERP Cloud Systems.

https://www.researchgate.net/profile/Gustavo-Alonso-6/publication/388452750_Leveraging_Snowflake_DB_for_AIML-Driven_Business_Intelligence_and_Cybersecurity_in_ERP_Cloud_Systems/links/6798fc868311ce680c3f1421/Leveraging-Snowflake-DB-for-AI-ML-Driven-Business-Intelligence-and-Cybersecurity-in-ERP-Cloud-Systems.pdf

41. Ahsan, M., Nygard, K. E., Gomes, R., Chowdhury, M. M., Rifat, N., & Connolly, J. F. (2022). Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. Journal of Cybersecurity and Privacy, 2(3), 527-555.

https://www.mdpi.com/2624-800X/2/3/27

42. Andrade, R. O., & Yoo, S. G. (2019). Cognitive security: A comprehensive study of cognitive science in cybersecurity. Journal of Information Security and Applications, 48, 102352.

https://www.sciencedirect.com/science/article/abs/pii/S2214212618307804

43. Tambare, P., Meshram, C., Lee, C. C., Ramteke, R. J., & Imoize, A. L. (2021). Performance measurement system and quality management in data-driven Industry 4.0: A review. Sensors, 22(1), 224.

httpswww.mdpi.com/1424-8220/22/1/224

44. Kenzie, F. (2021). Integrating Artificial Intelligence with Database Technologies: A New Frontier in Cybersecurity.

https://www.researchgate.net/profile/Florence-Kenzie/publication/385410698_IntegrKara, M. E., Fırat, S. Ü. O., & Ghadge, A. (2020). A data mining-based framework for supply chain risk management. Computers & Industrial Engineering, 139, 105570.ating_Artificial_Intelligence_with_Database_Technologies_A_New_Frontier_in_Cybersecurity/links/67235415db208342dee09ba5/Integrating-Artificial-Intelligence-with-Database-Technologies-A-New-Frontier-in-Cybersecurity.pdf

45. Wang, K., Guo, X., & Yang, D. (2022). Research on the effectiveness of cyber security awareness in ICS risk assessment frameworks. Electronics, 11(10), 1659.

https://www.mdpi.com/2079-9292/11/10/1659

46. Kara, M. E., Fırat, S. Ü. O., & Ghadge, A. (2020). A data mining-based framework for supply chain risk management. Computers & Industrial Engineering, 139, 105570.

https://www.sciencedirect.com/science/article/abs/pii/S0360835218306156

47. Olayinka, O. H. (2022). Ethical implications and governance of AI models in business analytics and data science applications. International Journal of Engineering Technology Research & Management.

https://www.researchgate.net/profile/Olayinka-Olalekan/publication/390348655_ETHICAL_IMPLICATIONS_AND_GOVERNANCE_OF_AI_MODELS_IN_BUSINESS_ANALYTICS_AND_DATA_SCIENCE_APPLICATIONS/links/67edc90a03b8d7280e1e20dd/ETHICAL-IMPLICATIONS-AND-GOVERNANCE-OF-AI-MODELS-IN-BUSINESS-ANALYTICS-AND-DATA-SCIENCE-APPLICATIONS.pdf

48. Mihailescu, M. I., & Nita, S. L. (2022, September). Towards Data Science for Cybersecurity: Machine Learning Advances as Glowing Perspective. In Proceedings of SAI Intelligent Systems Conference (pp. 26-48). Cham: Springer International Publishing.

https://link.springer.com/chapter/10.1007/978-3-031-16078-3_2

49. Owen, A., & Ajeigbe, K. (2021). Addressing Cybersecurity in AI-Enhanced Manufacturing Systems.

https://www.researchgate.net/profile/Kolade-Ajeigbe-2/publication/390366806_Addressing_Cybersecurity_in_AI-Enhanced_Manufacturing_Systems/links/67ebd0e476d4923a1aeb7011/Addressing-Cybersecurity-in-AI-Enhanced-Manufacturing-Systems.pdf

50. Ali, F. (2021). Revolutionizing Cloud Computing with AI/ML for Business Intelligence, ERP Cloud, and Snowflake DB Security Enhancements.

https://www.researchgate.net/profile/Farman-Ali-41/publication/388448709_Revolutionizing_Cloud_Computing_with_AIML_for_Business_Intelligence_ERP_Cloud_and_Snowflake_DB_Security_Enhancements/links/6798bf6b8311ce680c3ecb1a/Revolutionizing-Cloud-Computing-with-AI-ML-for-Business-Intelligence-ERP-Cloud-and-Snowflake-DB-Security-Enhancements.pdf

51. Bitomsky, L., Bürger, O., Häckel, B., & Töppel, J. (2020). Value of data meets IT security–assessing IT security risks in data-driven value chains. Electronic Markets, 30, 589-605.

https://link.springer.com/article/10.1007/s12525-019-00383-6

52. Treacy, S. (2022). Ensuring compliance in the digital era: A knowledge-based dynamic capabilities framework wheel for data-driven organisations. International Journal of Business Analytics and Intelligence, 10(2), 25.

https://www.proquest.com/openview/407d7e39071535c9ec9fbf381bc5adba/1?pq-origsite=gscholar&cbl=2043514

53. Bousdekis, A., Lepenioti, K., Apostolou, D., & Mentzas, G. (2021). A review of data-driven decision-making methods for industry 4.0 maintenance applications. Electronics, 10(7), 828.

https://www.mdpi.com/2079-9292/10/7/828

54. Neshenko, N. (2021). Illuminating Cyber Threats for Smart Cities: A Data-Driven Approach for Cyber Attack Detection with Visual Capabilities (Doctoral dissertation, Florida Atlantic University).

https://www.proquest.com/openview/344d68ce2e79f1b35824f71a1e688158/1?pq-origsite=gscholar&cbl=18750&diss=y

55. Debar, H. Security Operations & Incident Management Knowledge Area Issue.

https://smiitcyberai.com/resources/docs/Security_Operations__Incident_Management_issue_1.0.pdf

56. Strohmeier, M., Pavur, J., Martinovic, I., & Lenders, V. (2021). Studying neutrality in cyber-space: a comparative geographical analysis of honeypot responses. In Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers 16 (pp. 186-203). Springer International Publishing.

https://link.springer.com/chapter/10.1007/978-3-030-93200-8_11

57. Lenders, V. (2022). Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses. In Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers (Vol. 13139, p. 186). Springer Nature.

58. Samtani, S., Abate, M., Benjamin, V., & Li, W. (2019). Cybersecurity as an industry: A cyber threat intelligence perspective. In The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 1-20). Palgrave Macmillan, Cham.

https://link.springer.com/rwe/10.1007/978-3-319-90307-1_8-1

59. Koroniotis, N., Moustafa, N., Schiliro, F., Gauravaram, P., & Janicke, H. (2020). A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access, 8, 209802-209834.

https://ieeexplore.ieee.org/abstract/document/9252856

60. Bhardwaj, A. (2021). Cybersecurity incident response against advanced persistent threats (APTs). Security Incidents & Response Against Cyber Attacks, 177-197.

https://link.springer.com/chapter/10.1007/978-3-030-69174-5_9

61. Boeding, M., Boswell, K., Hempel, M., Sharif, H., Lopez Jr, J., & Perumalla, K. (2022). Survey of cybersecurity governance, threats, and countermeasures for the power grid. Energies, 15(22), 8692.

https://www.mdpi.com/1996-1073/15/22/8692

62. Wang, C., & Zhu, H. (2022). Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security. IEEE Transactions on Information Forensics and Security, 17, 2703-2718.

https://ieeexplore.ieee.org/abstract/document/9830760

63. Solomon, A., Michaelshvili, M., Bitton, R., Shapira, B., Rokach, L., Puzis, R., & Shabtai, A. (2022). Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowledge-Based Systems, 246, 108709.

https://www.sciencedirect.com/science/article/abs/pii/S0950705122003276

64. Dataset Link: https://www.kaggle.com/datasets/saurabhshahane/honeypot-15

Downloads

Published

2023-08-29

How to Cite

Khan, M. I., Mohammed, A. A., & Hasan, M. M. (2023). Data-Driven Cybersecurity: The Role of Business Analytics in Risk Management and Incident Response. American Journal of Economics and Business Management, 6(8), 202–232. Retrieved from https://globalresearchnetwork.us/index.php/ajebm/article/view/2861

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.