2017
DOI: 10.1177/1548512917715342
|View full text |Cite
|
Sign up to set email alerts
|

Statistical models for the number of successful cyber intrusions

Abstract: We propose several generalized linear models (GLMs) to predict the number of successful cyber intrusions (or "intrusions") into an organization's computer network, where the rate at which intrusions occur is a function of the following observable characteristics of the organization: (i) domain name server (DNS) traffic classified by their top-level domains (TLDs); (ii) the number of network security policy violations; and (iii) a set of predictors that we collectively call "cyber footprint" that is comprised o… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…For example, estimating probability distributions that model the frequency of cyber-attacks is a difficult and ongoing area of research. 56,57 One approach is to utilize the triangular distribution 58 which has the convenient property that it is simple to elicit -generally an expert is asked to provide a maximum, minimum, and most-likely value for some variable of interest. 59 Empirical data are typically not available for certain parameters such as ARO and MR, and therefore experts must be consulted to estimate them.…”
Section: Limitationsmentioning
confidence: 99%
“…For example, estimating probability distributions that model the frequency of cyber-attacks is a difficult and ongoing area of research. 56,57 One approach is to utilize the triangular distribution 58 which has the convenient property that it is simple to elicit -generally an expert is asked to provide a maximum, minimum, and most-likely value for some variable of interest. 59 Empirical data are typically not available for certain parameters such as ARO and MR, and therefore experts must be consulted to estimate them.…”
Section: Limitationsmentioning
confidence: 99%
“…Instead, we will use a counting process that has a Negative Binomial distribution at time t. The Negative Binomial distribution is often used for fitting to count data, and is well known in operational risk. The application of the negative binomial distribution to real world data is done in a cybersecurity context in Leslie et al (2018).…”
Section: A Univariate Model For Lossesmentioning
confidence: 99%
“…The key components of cyber risk are relatively well understood. The likelihood of a successful cyber attack can be empirically measured and estimated apriori with a degree of accuracy from known characteristics of a system or network (Leslie et al 2017), (Gil et al 2014). The cyber impact on a system is a topic in which assessment methods are being developed (Kott et al 2017).…”
Section: Resilience and Systemsmentioning
confidence: 99%