SIG SEC - Information Security and Privacy

Loading...

Media is loading
 

Paper Type

ERF

Paper Number

1227

Description

This study attempts to mitigate DoS attacks by combining structured and unstructured data. It comprises three modules. Specifically, our cyber-risk assessment module uses input such as DDoS attack characteristics: attack intensity and duration; Massively Multiplayer Online Gaming (MMOG) platform characteristics: vulnerability counts, severity, trends, and effect of cybersecurity spending, along with web articles. Following this, we calculate the expected loss resulting from a DDoS attack on a gaming company. We conclude by suggesting cyber-risk mitigation strategies such as self-protection (technology, compliance, and legal deterrence), self-insurance, or cyber-insurance.

Comments

SIG SEC

Share

COinS
 
Aug 10th, 12:00 AM

Cyber-risk assessment and mitigation of DDoS attacks using semi-structured data models

This study attempts to mitigate DoS attacks by combining structured and unstructured data. It comprises three modules. Specifically, our cyber-risk assessment module uses input such as DDoS attack characteristics: attack intensity and duration; Massively Multiplayer Online Gaming (MMOG) platform characteristics: vulnerability counts, severity, trends, and effect of cybersecurity spending, along with web articles. Following this, we calculate the expected loss resulting from a DDoS attack on a gaming company. We conclude by suggesting cyber-risk mitigation strategies such as self-protection (technology, compliance, and legal deterrence), self-insurance, or cyber-insurance.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.