Abstract
The systematic risk of a networked system depends to a large extent on its topology. In this paper, we explore this dependency using a model of risk propagation from the literature on interdependent security games. Our main area of focus is on the number of nodes that go down after an attack takes place. We develop a simulation algorithm to study the effects of such attacks on arbitrary topologies, and apply this simulation to scale-free networks. We investigate by graphical illustration how the outcome distribution of such networks exhibits correlation effects that increase the likelihood of losing more nodes at once - an effect having direct applications to cyber-insurance.
Original language | English (US) |
---|---|
Title of host publication | ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security |
Publisher | Association for Computing Machinery, Inc |
Pages | 495-500 |
Number of pages | 6 |
ISBN (Electronic) | 9781450328005 |
DOIs | |
State | Published - Jun 4 2014 |
Event | 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014 - Kyoto, Japan Duration: Jun 4 2014 → Jun 6 2014 |
Publication series
Name | ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security |
---|
Other
Other | 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014 |
---|---|
Country | Japan |
City | Kyoto |
Period | 6/4/14 → 6/6/14 |
Fingerprint
All Science Journal Classification (ASJC) codes
- Software
- Computer Networks and Communications
- Computer Science Applications
- Information Systems
Cite this
}
How many down? Toward understanding systematic risk in networks. / Johnson, Benjamin; Laszka, Aron; Grossklags, Jens.
ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, 2014. p. 495-500 (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
TY - GEN
T1 - How many down? Toward understanding systematic risk in networks
AU - Johnson, Benjamin
AU - Laszka, Aron
AU - Grossklags, Jens
PY - 2014/6/4
Y1 - 2014/6/4
N2 - The systematic risk of a networked system depends to a large extent on its topology. In this paper, we explore this dependency using a model of risk propagation from the literature on interdependent security games. Our main area of focus is on the number of nodes that go down after an attack takes place. We develop a simulation algorithm to study the effects of such attacks on arbitrary topologies, and apply this simulation to scale-free networks. We investigate by graphical illustration how the outcome distribution of such networks exhibits correlation effects that increase the likelihood of losing more nodes at once - an effect having direct applications to cyber-insurance.
AB - The systematic risk of a networked system depends to a large extent on its topology. In this paper, we explore this dependency using a model of risk propagation from the literature on interdependent security games. Our main area of focus is on the number of nodes that go down after an attack takes place. We develop a simulation algorithm to study the effects of such attacks on arbitrary topologies, and apply this simulation to scale-free networks. We investigate by graphical illustration how the outcome distribution of such networks exhibits correlation effects that increase the likelihood of losing more nodes at once - an effect having direct applications to cyber-insurance.
UR - http://www.scopus.com/inward/record.url?scp=84984863583&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84984863583&partnerID=8YFLogxK
U2 - 10.1145/2590296.2590308
DO - 10.1145/2590296.2590308
M3 - Conference contribution
AN - SCOPUS:84984863583
T3 - ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
SP - 495
EP - 500
BT - ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
PB - Association for Computing Machinery, Inc
ER -