Kox, Henk L.M. (2013): Cybersecurity in the perspective of Internet traffic growth.
This is the latest version of this item.
Preview |
PDF
MPRA_paper_47994.pdf Download (898kB) | Preview |
Abstract
Private and public concern about digital security, cybercrime and data privacy is growing the last few years. If Internet-related markets are flexible enough to cope with security concerns, given time, one would expect that - per unit of Internet traffic - the number and costs of cybersecurity incidents fall over time. This paper is a first attempt to assess empirically whether overall Internet traffic growth has grown faster than the number of cybersecurity incidents. The conclusion is that, overall, the Internet has over time has become a safer place when measured by the number of security incidents per unit of transmitted data. The implication is that the current surge in reported cyberincidents is primarily driven by the growth in scale and pervasiveness of Internet communication exchange. There are a number of caveats that should be taken into account, but for this more consistent and reliable cybersecurity statistics would be required than are available at present.
Item Type: | MPRA Paper |
---|---|
Original Title: | Cybersecurity in the perspective of Internet traffic growth |
Language: | English |
Keywords: | Internet traffic, cybersecurity, time trend safety Internet |
Subjects: | L - Industrial Organization > L8 - Industry Studies: Services > L86 - Information and Internet Services ; Computer Software L - Industrial Organization > L9 - Industry Studies: Transportation and Utilities > L96 - Telecommunications N - Economic History > N7 - Transport, Trade, Energy, Technology, and Other Services |
Item ID: | 47994 |
Depositing User: | Henk L.M. Kox |
Date Deposited: | 05 Jul 2013 04:06 |
Last Modified: | 30 Sep 2019 20:07 |
References: | Anderson, R., R. Böhme, R. Clayton and T. Moore, 2008, Security economics and the Internal Market, report commissioned by European Network and Information Security Agency (ENISA), Heraklion. APWG, 2008-2012, Global Phishing Survey - Trends and Domain Name Use (twice per year), APWG, Internet Policy Committee, Lexington MA. Ash, T.G., 2013, If Big Brother came back he‟d be a public-private partnership, The Guardian, 27 June 2013. Berthold, S., R. Böhme, and S. Köpsell, 2009, Data retention and anonymity services, In: V. Matyas et al. (eds.), The Future of Identity in the Information Society, Springer, Boston, 92–106. Black, P., K. Scarfone and M. Souppaya, 2008, Cybersecurity metrics and measures, in J. Voeller (ed.), Handbook of Science and Technology for Homeland Security, John Wiley and Sons, London. Böhme, R. and R. Köpsell, 2010, Trained to Accept? A Field Experiment on Consent Dialogs, paper presented at CHI 2010 (April 10-15, 2010, Atlanta, Georgia, USA), (http://dmrussell.net/CHI2010/docs/p2403.pdf). CAIDA, 2011, Annual report for 2011, Cooperative Association for Internet Data Analysis, University of California, Supercomputer Centre (http://www.caida.org/home/about/annualreports/2011/#topology). Chee, F., N. Taylor and S. de Castell, 2012, Re-Mediating Research Ethics: End-User License Agreements in Online Games, Bulletin of Science Technology Society, 32 (6), 497-506. Cisco, 2012, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011–2016, White Paper, www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.pdf. Cukier, K. and V. Mayer-Schoenberger, 2013, The Rise of Big Data -How It's Changing the Way We Think About the World, Foreign Affairs, 92(4), May June, Dean, D., S. DiGrande, D. Field, A. Lundmark, J. O'Day, J. Pineda and P. Zwillenberg, 2012, The Internet Economy in the G-20: The $4.2 Trillion Growth Opportunity, Boston Consulting Group. EC, 2012, Cybersecurity, Special Eurobarometer #390, TNS Opinion and Social, at the request of European Commission DG Home Affairs, coordinated by DG COMM, Brussels. ENISA, 2013, Threat landscape: responding to the evolving threat environment, European Network and Information Security Agency, Heraklion. Frei, S., B. Plattner, and B. Tramell, 2010, Modelling the Security Ecosystem - The Dynamics of (In)Security, paper presented at WEIS 2010 conference, ETH Zürich (http://www.techzoom.net/security-ecosystem). Frei. S., 2009, Security econometrics: the dynamics of (in)security, PhD dissertation, ETH, Zürich. GOVCERT.NL, 2011, Cybersecuritybeeld Nederland 2011, Ministerie van Veiligheid en Justitie, Den Haag. Graham-Rowe, D., 2007, Mapping the Internet, MIT Technology Review, 19 June, (http://www.technologyreview.com/news/408104/mapping-the-Internet/), accessed April 09, 2013.. Heninger, N., Z. Durumeric, E. Wustrow and J. Halderman, 2012, Mining your Ps and Qs: detection of widespread weak keys in network devices, Proc. 21st USENIX Security Symposium, Aug. 2012 () Kosinski, M., D. Stillwell and T. Graepel, 2013, Private traits and attributes are predictable from digital records of human behavior, Proceedings of the National Academy of Sciences of the United States of America, (published online before print, March 11, 2013: doi: 10.1073/pnas.1218772110 ). Kox, H. (2013), Analysing the effect of cybersecurity with a gravity model of Internet traffic, MPRA Paper, Munich (forthcoming). Moore, T, and R. Anderson, 2011, Economics and Internet security: a survey of recent analytical, empirical and behavioural research, WP TR-03-11, Computer Science Group, Harvard University, Cambridge MA. Moore, T., R. Clayton and R. Anderson, 2009, The economics of online crime, Journal of Economic Perspectives, 23(3), 3-20. NCSC, 2012, Cybersecuritybeeld Nederland2012, Nationaal Cyber Security Centrum, Den Haag. Odlyzko, A., 2004, Internet traffic growth: sources and implications, mimeo, University of Minnesota, Minneapolis, MN. OECD, 2012, Proactive policy measures by Internet service providers against botnets, OECD Digital Economy Papers #199, OECD, Paris. OECD, 2011, National strategies and policies for digital identity management in OECD countries, DSTI/ICCP/REG(2010)3/FINAL, DSTI, Working Party on Information Security and Privacy, Paris. OECD, 2008, Malicious software (malware): a security threat to the Internet economy, DSTI/ICCP/REG (2007)5/Final, OECD, Paris Panagiotis, T., 2010, Measurement frameworks and metrics for resilient networks and services: challenges and recommendations, ENISA European Network and Information Security Agency, Heraklion. Prince, M., 2013, The DDoS That Almost Broke the Internet, CloudFlare blog, March 27, 2013 (http://blog.cloudflare.com/the-ddos-that-almost-broke-the-Internet). Rasmussen. R and G. Aaron, 2012, Global Phishing Survey: Trends and Domain Name Use 1H2012, APWG, Lexington MA. Rao, J. and D. Reily, 2012, The economics of spam, Journal of Economic Perspectives, 26(3), 87-110. Rogers, M. and D. Ruppersberger, 2012, Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE, U.S. House of Representatives, 112th Congress, Washington DC. Security.nl, 2012, Onderzoeker vindt 23 SCADA-lekken in 4 uur, October 28, 2012 (https://www.security.nl/artikel/44099/1/Onderzoeker_vindt_23_SCADA-lekken_in_4_uur.html). Symantec, 2001-2012, Annual and Quarterly Symantec Internet Security Threat Reports, Symantec Corp. (e.g. 2007: http://eval.symantec.com/mktginfo/enterprise/white_papers/ent-whitepaper_Internet_security_threat_report_xi_03_2007.en-us.pdf) Van Eeten, M. and J. Bauer, 2008, Economics of malware: security decisions, incentives and externalities, STI Working Paper DSTI/DOC(2008)1, OECD, Paris. Verizon, 2008-2012, Annual Data Breach Investigations Report (DBIR): study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-Crime Unit, and United States Secret Service, (2012: http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?__ct_return=1). Weller, D. and B. Woodcock, 2013, Internet traffic exchange: market developments and policy challenges, DSTI/ICCP/CISP(2011)2/Final, OECD, Paris. |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/47994 |
Available Versions of this Item
-
Cybersecurity in the perspective of Internet traffic growth. (deposited 29 Jun 2013 04:41)
- Cybersecurity in the perspective of Internet traffic growth. (deposited 05 Jul 2013 04:06) [Currently Displayed]