首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Contagion in cyber security attacks
Authors:Adrian Baldwin  Iffat Gheyas  Christos Ioannidis  David Pym  Julian Williams
Institution:1.HP Labs,Bristol,United Kingdom;2.Birmingham City University,Birmingham,United Kingdom;3.University of Bath,Somerset,United Kingdom;4.University College London,London,United Kingdom;5.University of Durham,Durham,United Kingdom
Abstract:Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s corporate network infrastructure. To this end, we develop and estimate a vector equation system of threats to 10 important IP services, using industry standard SANS data on threats to various components of a firm’s information system over the period January 2003 – February 2011. Our results reveal strong evidence of contagion between such attacks, with attacks on ssh and Secure Web Server indicating increased attack activity on other ports. Security managers who ignore such contagious inter-relationships may underestimate the underlying risk to their systems’ defence of security attributes, such as sensitivity and criticality, and thus delay appropriate information security investments.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号