2010
DOI: 10.1140/epjb/e2010-00120-8
|View full text |Cite
|
Sign up to set email alerts
|

Heavy-tailed distribution of cyber-risks

Abstract: With the development of the Internet, new kinds of massive epidemics, distributed attacks, virtual conflicts and criminality have emerged. We present a study of some striking statistical properties of cyber-risks that quantify the distribution and time evolution of information risks on the Internet, to understand their mechanisms, and create opportunities to mitigate, control, predict and insure them at a global scale. First, we report an exceptionnaly stable power-law tail distribution of personal identity lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

6
57
1

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 113 publications
(64 citation statements)
references
References 26 publications
6
57
1
Order By: Relevance
“…We tabulated the total number of attacks on each entity to find the top ten targets of observed attacks. These attacks have a heavy tail distribution ( Figure 14, and seem to confirm Maillart and Sornette's work [24], but lower ranked entities still create large jitters in the overall behavior.…”
Section: Fitting the Model To Datasupporting
confidence: 65%
“…We tabulated the total number of attacks on each entity to find the top ten targets of observed attacks. These attacks have a heavy tail distribution ( Figure 14, and seem to confirm Maillart and Sornette's work [24], but lower ranked entities still create large jitters in the overall behavior.…”
Section: Fitting the Model To Datasupporting
confidence: 65%
“…A set of values x follows a power law if it fits the following probability distribution (Clauset, Shalizi, & Newman, ): pxxαwhere α is the scaling exponent (also called scaling parameter), which is a constant (Maillart & Sornette, ). The scaling exponent is calculated using MLE based on running a semiparametric Monte Carlo bootstrap calculation 1,000 times—specifically, the Hill estimator (Hill, ).…”
Section: Methodsmentioning
confidence: 99%
“…where α is the scaling exponent (also called scaling parameter), which is a constant (Maillart & Sornette, 2010). The scaling exponent is calculated using MLE based on running a semiparametric Monte Carlo bootstrap calculation 1,000 times-specifically, the Hill estimator (Hill, 1975).…”
Section: Data-analytic Approachmentioning
confidence: 99%
“…Due to this dependence on the tail structure, it is relevant to analyze the cumulative distribution of cyber-risk with distribution functions that have parameters for the shape of their tails. Simulation experiments and empirical tests for data on cyber-attacks can be found in [BK06], who model correlated risk with Student-t copulas and estimate from honeynet data, and [MS09], who study the tail structure of data released through breach disclosure laws in the US.…”
Section: Insurers' Risk Aversionmentioning
confidence: 99%