2016
DOI: 10.1287/isre.2016.0677
|View full text |Cite
|
Sign up to set email alerts
|

When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security

Abstract: We study operational and managerial problems arising in the context of security monitoring where sessions, rather than raw individual events, are monitored to prevent attacks. The objective of the monitoring problem is to maximize the benefit of monitoring minus the monitoring cost. The key trade-off in our model is that as more sessions are monitored, the attack costs should decrease. However, the monitoring cost would likely increase with the number of sessions being monitored. A key step in solving the prob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 43 publications
0
15
0
Order By: Relevance
“…The authors propose how to improve connectivity of cyber networks. Ji et al (2016) discuss how big data analysis and optimization tools can be used to tackle advanced cyberattacks. Bensoussan et al (2020) reveal that intrusion prevention is a crucial point for overcoming cyber-security risk.…”
Section: Related Literaturementioning
confidence: 99%
“…The authors propose how to improve connectivity of cyber networks. Ji et al (2016) discuss how big data analysis and optimization tools can be used to tackle advanced cyberattacks. Bensoussan et al (2020) reveal that intrusion prevention is a crucial point for overcoming cyber-security risk.…”
Section: Related Literaturementioning
confidence: 99%
“…Second, the model shows that scholars have been interested in cybercriminals and our ability to monitor and detect them from both within and outside the firm (Ji et al, 2016;Siering et al, 2021). Included in this research are studies that provide guidance for darknet research (Benjamin et al, 2019;Ebrahimi et al, 2020) and for the analysis of cybercriminal Internet Relay Chat (IRC) communities (Benjamin et al, 2016), as well as studies focused on the influence of peer monitoring on employee information security policy (ISP) violations (Yazdanmehr and Wang, 2021).…”
Section: Published Topics Of Interestmentioning
confidence: 99%
“…Second, the model shows that scholars have been interested in cybercriminals and our ability to monitor and detect them from both within and outside the firm (Ji et al. , 2016; Siering et al.…”
Section: Published Topics Of Interestmentioning
confidence: 99%
“…Mookerjee et al (2011) study the maintenance of detection systems while accounting for the potential dissemination of attack knowledge. Ji et al (2016) examine how extensively monitoring should be conducted in the interest of minimizing the monitoring cost and security incident cost. Ogut et al (2008) examine various waiting-time policies to minimize the utilization of costly human agents associated with the investigation of IDS alarms.…”
Section: Literature Reviewmentioning
confidence: 99%