Evaluating Security Systems from Statistical Perspectives Based on Censored Data: An Application to Cybersecurity | ||||
Computational Journal of Mathematical and Statistical Sciences | ||||
Articles in Press, Accepted Manuscript, Available Online from 11 July 2025 PDF (566.6 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/cjmss.2025.376922.1159 | ||||
![]() | ||||
Authors | ||||
Nagwa Mohamed1; Mahmoud Mansour ![]() | ||||
1Department of Mathematics and Computer Science, Faculty of Science, Suez University, Suez 43221, Egypt | ||||
2Department of Basic Science, Faculty of Engineering, The British University in Egypt, El Sherouk 11837, Egypt | ||||
3Department of Accounting, College of Business Administration in Hawtat bani Tamim, Prince Sattam bin Abdulaziz University, Hawtat bani Tamim 11941, Saudi Arabia | ||||
4Department of Mathematics, Faculty of Science, Helwan University, Cairo 11795, Egypt | ||||
Abstract | ||||
We propose statistical methods to estimate the geometric distribution parameter when collected data are progressively Type-II censored during time-limited trials such as a Cybersecurity experiment. Maximum likelihood estimation (MLE) and Bayesian estimators are derived while the Bayesian estimator utilizes a Beta distribution prior to estimation through simulated performance assessment. The proposed method applies to simulated login attempt data that track authentication attempts until success due to brute-force attacks. The application of progressive censoring techniques saves $70\%$ of testing duration regarding conventional approaches but preserves measurement precision. By incorporating prior knowledge, Bayesian estimation outperforms MLE in precision, especially for small samples. A simulation study establishes model reliability for different censoring scenarios while providing coverage probability evidence for accurate confidence intervals. The method is exceptional for security system design because it enables quick but precise parameter estimation. The research reveals the balancing act between the degree of censorship and accuracy levels and experimental budget constraints, providing operational benefits for Cybersecurity studies. | ||||
Keywords | ||||
Geometric distribution; Progressive Type-II censoring; Bayesian estimation; Cybersecurity applications; Login attempt modeling | ||||
Statistics Article View: 104 PDF Download: 56 |
||||