Pau, Louis-François (2009): Business and social evaluation of denial of service attacks in view of scaling economic counter-measures. Forthcoming in:
Preview |
PDF
MPRA_paper_16115.pdf Download (97kB) | Preview |
Abstract
This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative example is provided for a denial of service on a corporate data centre. The needed data collection methodologies are categorized by classes of targets. The use of the method is explained in the context of legal or policy driven dissuasive, retaliation or compensation/ restoration actions. A concrete set of deployment cases in the communications service and transport industries is discussed. The conclusion includes policy recommendations as well as information exchange requirements.
Item Type: | MPRA Paper |
---|---|
Original Title: | Business and social evaluation of denial of service attacks in view of scaling economic counter-measures |
Language: | English |
Keywords: | Cyberwar; Denial of service; Business implications; Social implications; Mobile communications; Insurance |
Subjects: | C - Mathematical and Quantitative Methods > C5 - Econometric Modeling H - Public Economics > H5 - National Government Expenditures and Related Policies > H56 - National Security and War O - Economic Development, Innovation, Technological Change, and Growth > O3 - Innovation ; Research and Development ; Technological Change ; Intellectual Property Rights |
Item ID: | 16115 |
Depositing User: | L-F Pau |
Date Deposited: | 08 Jul 2009 02:38 |
Last Modified: | 03 Oct 2019 18:28 |
References: | 1. Lech J. Janczewski, Andrew M. Colarik (Editors) (2007), Cyber Warfare and Cyber Terrorism,Boca Raton: Idea Group Inc (IGI), ISBN 1591409918, 9781591409915 2. O. Sami Saydjari (2004), Cyber defence: art to science, Communications of the ACM, Vol 47, Issue 3 (March), 52-57 3. Scott Dynes, Eva Andrijcic, M. Eric Johnson (2006), Costs to the U.S. Economy of Information Infrastructure Failures: Estimates from Field Studies and Economic Data, Proceedings of the Fifth Workshop on the Economics of Information Security, Cambridge: Cambridge University 4. Lawrence D. Bodin, Lawrence A. Gordon , Martin P. Loeb (2005), Evaluating information security investments using the analytic hierarchy process, Communications of the ACM, Volume 48 , Issue 2 (February) , 78 - 83 5. Jay P. Kesan_ Rupterto P. Majuca, William J. Yurcik (2004), The Economic Case for Cyber insurance, University of Illinois College of Law and Economics Working Papers, Paper no 2, http://law.bepress.com/uiuclwps/papers/art2 6. Huseyin Cavusoglu (2008), Economics of information security, in: L. Jean Camp and Stephen Lewis (Editors), Advances in Information Security, Vol.12, Springer, US, 978-1-4020-8089-0 (Print) 978-1-4020-8090-6 (Online) 7. Marco Benini & Sabrina Sicaria (2008), Risk assessment in practice: A real case study, Computer communications, Vol 31, no 15, 3691-3699 8. Bruce H. Kobayashi (2005), An Economic Analysis of the Private and Social Costs of the Provision of Cyber security and other Public Security Goods, George Mason University School of Law, Working Paper Series, Paper no 26, http://law.bepress.com/gmulwps/gmule/art26 9. T. Dubendorfer, A. Wagner & B. Plattner (2004), An economic damage model for large-scale Internet attacks, in Proceedings 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE) , 14-16 June, 223- 228, ISBN: 0-7695-2183-5 10. Meiring de Villiers (2007), Distributed Denial of Service: Law, Technology & Policy, Sydney: University of New South Wales Faculty of Law Research Series, Paper no 3, http://law.bepress.com/unswwps/flrps/art3 11. Valer Bocan & Vladimir Cretu (2005), Mitigating Denial of Service Threats in GSM Networks, The First International Conference on Availability in GSM networks, Department of Computer Science and Engineering, Politechnica University of Timisoara, http://www.dataman.ro 12. O. Vasicek (1977), An equilibrium characterization of the term structure, Journal of financial economics, Vol 5, no 2, 177-188 13. K.C. Butler, D.L. Domian (1991), Risk, diversification and investment horizon, Journal of portfolio management, Vol 17 ,Spring, 41-47 14. D. Ventre (2007), La guerre de l’information, Paris : Lavoisier, ISBN: 978-2-7462-1883-3 15. J. Kizza, F. Migga Kizza (2008), Securing the information infrastructure, Cyber Tech Publishing, ISBN: 978-1-59904-379-1 16. T. Shimeall, P. Williams, C. Dunlevy (2001), Countering cyber-war, NATO Review, Vol 49, no 4, Winter, 16-28 17. Jason Fritz (2008), How China will use cyber warfare to leapfrog in military competitiveness , Culture Mandala, Vol. 8, No. 1, October, 28-80 18. H. Axlerod & D. Jay (1999), Crime and punishment in cyberspace: Dealing with law enforcement and the courts, Paper presented at the SIGUCCS Conference, Denver Colorado 19. M. Erbschloe (2001), Information warfare: How to survive cyber attacks, Berkeley, California: Osborne/McGraw Hill 20. Shari Lawrence Pfleeger, Daniela Golinelli, Robin Beckman, Sarah K. Cotton, Robert H. Anderson, Anil Bamezai, Christopher R. Corey, Megan Zander-Cotugno, John L. Adams, Ronald Euller, Paul Steinberg, Rachel Rue, Martin C. Libicki & Michael Webber (2008), Cyber security Economic Issues : Corporate Approaches and Challenges to Decision making, Rand Corp. Research brief RB-9365-1 21. M. Godelier & H. Dawod (Editors) (2004), Guerre et paix, Special issue, Thema, Paris: CNRS, March, www.cnrs.fr/presse |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/16115 |