[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility

Published: 08 June 2020 Publication History

Editorial Notes

The authors have requested minor, non-substantive changes to the Version of Record and, in accordance with ACM policies, a Corrected Version of Record was published on October 31, 2023. For reference purposes, the VoR may still be accessed via the Supplemental Material section on this page.
A corrigendum was issued for this paper on February 26, 2024. You can download the corrigendum from the supplemental material section of this citation page.

Abstract

Service liability interconnections among globally networked IT- and IoT-driven service organizations create potential channels for cascading service disruptions worth billions of dollars, due to modern cyber-crimes such as DDoS, APT, and ransomware attacks. A natural question that arises in this context is: What is the likelihood of a cyber-blackout?, where the latter term is defined as the probability that all (or a major subset of) organizations in a service chain become dysfunctional in a certain manner due to a cyber-attack at some or all points in the chain. The answer to this question has major implications to risk management businesses such as cyber-insurance when it comes to designing policies by risk-averse insurers for providing coverage to clients in the aftermath of such catastrophic network events. In this article, we investigate this question in general as a function of service chain networks and different cyber-loss distribution types. We show somewhat surprisingly (and discuss the potential practical implications) that, following a cyber-attack, the effect of (a) a network interconnection topology and (b) a wide range of loss distributions on the probability of a cyber-blackout and the increase in total service-related monetary losses across all organizations are mostly very small. The primary rationale behind these results are attributed to degrees of heterogeneity in the revenue base among organizations and the Increasing Failure Rate property of popular (i.i.d/non-i.i.d) loss distributions, i.e., log-concave cyber-loss distributions. The result will enable risk-averse cyber-risk managers to safely infer the impact of cyber-attacks in a worst-case network and distribution oblivious setting.

Supplementary Material

a5-pal-corrigendum (a5-pal-corrigendum.pdf)
Corrigendum to "When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility" by Pal et al., ACM Transactions on Management Information Systems, Volume 11, Issue 2.
Version of Record for "When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility" by Pal et al., ACM Transactions on Management Information Systems, Volume 11, Issue 2 (TMIS 11:2). (3386159-vor.pdf)

References

[1]
Carlo Acerbi. 2002. Spectral measures of risk: A coherent representation of subjective risk aversion. Journal of Banking 8 Finance 26, 7 (2002), 1505--1518.
[2]
Franklin Allen and Douglas Gale. 2000. Financial contagion. Journal of Political Economy 108, 1 (2000), 1--33.
[3]
Per Bak, Kan Chen, José Scheinkman, and Michael Woodford. 1993. Aggregate fluctuations from independent sectoral shocks: Self-organized criticality in a model of production and inventory dynamics. Ricerche Economiche 47, 1 (1993), 3--30.
[4]
Richard E. Barlow and Frank Proschan. 1975. Statistical Theory of Reliability and Life Testing: Probability Models. Technical Report. Florida State Univ Tallahassee.
[5]
Richard S. Betterley. 2015. Cyber/privacy insurance market survey-2015. Advisen Annual Report.
[6]
Lawrence Blume, David Easley, Jon Kleinberg, Robert Kleinberg, and Éva Tardos. 2011. Which networks are least susceptible to cascading failures? In IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS’11). IEEE, 393--402.
[7]
Krishna Chinthapalli. 2017. The hackers holding hospitals to ransom. BMJ: British Medical Journal (Online) 357 (2017).
[8]
Fan Chung and Linyuan Lu. 2002. Connected components in random graphs with given expected degree sequences. Annals of Combinatorics 6, 2 (2002), 125--145.
[9]
Andrew Coburn, Eireann Leverett, and Gordon Woo. 2018. Solving Cyber Risk: Protecting Your Company and Society. Wiley.
[10]
John Cotter and Kevin Dowd. 2006. Extreme spectral risk measures: An application to futures clearinghouse margin requirements. Journal of Banking 8 Finance 30, 12 (2006), 3469--3485.
[11]
Steven N. Durlauf. 1993. Nonergodic economic growth. The Review of Economic Studies 60, 2 (1993), 349--366.
[12]
Larry Eisenberg and Thomas H. Noe. 2001. Systemic risk in financial systems. Management Science 47, 2 (2001), 236--249.
[13]
F. J. Fabozzi and H. M. Markowitz. 2002. The Theory and Practice of Investment Management. John Wiley 8 Sons.
[14]
Catherine Forbes, Merran Evans, Nicholas Hastings, and Brian Peacock. 2011. Statistical Distributions. John Wiley 8 Sons.
[15]
Xavier Freixas, Bruno M. Parigi, and Jean-Charles Rochet. 2000. Systemic risk, interbank relations, and liquidity provision by the central bank. Journal of Money, Credit and Banking (2000), 611--638.
[16]
Prasanna Gai and Sujit Kapadia. 2010. Contagion in financial networks. In Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences. The Royal Society, rspa20090410.
[17]
Ayalvadi Ganesh, Laurent Massoulié, and Don Towsley. 2005. The effect of network topology on the spread of epidemics. In 24th Annual Joint Conference of the IEEE Computer and Communications Societies. (INFOCOM’05), Vol. 2. IEEE, 1455--1466.
[18]
Jianxi Gao, Sergey V. Buldyrev, H. Eugene Stanley, and Shlomo Havlin. 2012. Networks formed from interdependent networks. Nature Physics 8, 1 (2012), 40.
[19]
Paul Glasserman and H. Peyton Young. 2016. Contagion in financial networks. Journal of Economic Literature 54, 3 (2016), 779--831.
[20]
Mark Granovetter. 1978. Threshold models of collective behavior. American Journal of Sociology 83, 6 (1978), 1420--1443.
[21]
Andy Greenberg. 2017. How an entire nation became Russia’s test lab for cyberwar. Wired, June 20 (2017). https://thehill.com/opinion/technology/380948-when-nation-states-hack-the-private-sector-for-intellectual-property.
[22]
Andy Greenberg. 2018. The untold story of NotPetya, the most devastating cyberattack in history. Wired, August 22 (2018). https://www.theregister.co.uk/2017/05/12/nhs_hospital_shut_down_due_to_cyber_attack/.
[23]
Steve Grobman. 2018. When nation-states hack the private sector for intellectual property. https://thehill.com/opinion/technology/380948-when-nation-states-hack-the-private-sector-for-intellectual-property.
[24]
Kat Hall. 2017. UK hospital meltdown after ransomware worm uses NSA vuln to raid IT. https://www.theregister.co.uk/2017/05/12/nhs_hospital_shut_down_due_to_cyber_attack/.
[25]
Annette Hoffman. 2007. Internalizing externalities of loss prevention through insurance monopoly. Geneva Risk and Insurance Review 32 (2007).
[26]
Glyn A. Holton. 2003. Value-at-Risk. Academic Press.
[27]
Norman L. Johnson, Samuel Kotz, and N. Balakrishnan. 1995. Continuous Univariate Distributions, vol. 2 of Wiley series in probability and mathematical statistics: Applied probability and statistics. Wiley, New York.
[28]
Mohammad Mahdi Khalili, Parinaz Naghizadeh, and Mingyan Liu. 2018. Designing cyber insurance policies: The role of pre-screening and security interdependence. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2226--2239.
[29]
Jocelyn Krystlik. 2017. With GDPR, preparation is everything. Computer Fraud 8 Security 2017, 6 (2017), 5--8.
[30]
Richard La. 2018a. Influence of clustering on cascading failures in interdependent systems. IEEE Transactions on Network Science and Engineering (2018).
[31]
Richard J. La. 2016. Interdependent security with strategic agents and cascades of infection. IEEE/ACM Transactions on Networking 24, 3 (2016), 1378--1391.
[32]
Richard J. La. 2018b. Cascading failures in interdependent systems: Impact of degree variability and dependence. IEEE Transactions on Network Science and Engineering 5, 2 (2018), 127--140.
[33]
Risk Management Solutions, Inc. 2016. Managing Cyber Insurance Accumulation Risk.
[34]
Marc Lelarge and Jean Bolot. 2009. Economic incentives to increase security in the Internet: The case for insurance. In IEEE INFOCOM 2009. IEEE, 1494--1502.
[35]
Jan Lorenz, Stefano Battiston, and Frank Schweitzer. 2009. Systemic risk in a unifying framework for cascading processes on networks. The European Physical Journal B 71, 4 (2009), 441.
[36]
Albert W. Marshall and Ingram Olkin. 1974. Majorization in multivariate distributions. The Annals of Statistics 2, 6 (1974), 1189--1200.
[37]
Albert W. Marshall, Ingram Olkin, and Barry C. Arnold. 1979. Inequalities: Theory of Majorization and Its Applications. Vol. 143. Springer.
[38]
Pascal Millaire. 2017. 3 reasons why the insurance industry will never be the same after the Mirai ddos attack. Advisen's 2017 Cyber Guide.
[39]
Michael Molloy and Bruce Reed. 1995. A critical point for random graphs with a given degree sequence. Random Structures 8 Algorithms 6, 2–3 (1995), 161--180.
[40]
Michael Molloy and Bruce Reed. 1998. The size of the giant component of a random graph with a given degree sequence. Combinatorics, Probability and Computing 7, 3 (1998), 295--305.
[41]
Vincenzo Morabito. 2017. The security of blockchain systems. In Business Innovation Through Blockchain. Springer, 61--78.
[42]
Stephen Morris. 2000. Contagion. The Review of Economic Studies 67, 1 (2000), 57--78.
[43]
Mark Newman. 2018. Networks. Oxford University Press.
[44]
Mark E. J. Newman, Steven H. Strogatz, and Duncan J. Watts. 2001. Random graphs with arbitrary degree distributions and their applications. Physical Review E 64, 2 (2001), 026118.
[45]
Ranjan Pal, Leana Golubchik, Konstantinos Psounis, and Tathagatha Bandyopadhyay. 2019. On robust estimated of correlated risks in cyber-insured IT firms: A first look at optimal AI-based estimated under small data. ACM TMIS 10, 3 (2019).
[46]
Ranjan Pal and Leana Golubchik. 2010. Analyzing self-defense investments in internet security under cyber-insurance coverage. In 2010 IEEE 30th International Conference on Distributed Computing Systems. IEEE, 339--347.
[47]
Ranjan Pal, Leana Golubchik, and Konstantinos Psounis. 2011. Aegis a novel cyber-insurance model. In International Conference on Decision and Game Theory for Security. Springer, 131--150.
[48]
Ranjan Pal, Leana Golubchik, Konstantinos Psounis, and Pan Hui. 2014. Will cyber-insurance improve network security? A market analysis. In INFOCOM, 2014 Proceedings IEEE. IEEE, 235--243.
[49]
Ranjan Pal, Leana Golubchik, Konstantinos Psounis, and Pan Hui. 2017. Security pricing as enabler of cyber-insurance a first look at differentiated pricing markets. IEEE Transactions on Dependable and Secure Computing (2017).
[50]
Ranjan Pal, Leana Golubchik, Konstantinos Psounis, and Pan Hui. 2018. Improving cyber-security via profitable insurance markets. ACM SIGMETRICS Performance Evaluation Review 45, 4 (2018), 7--15.
[51]
Alison DeNisco Rayome. 2017. 33% of businesses hit by DDoS attack in 2017, double that of 2016. TechRepublic (Nov. 2017). https://www.techrepublic.com/article/33-of-businesses-hit-by-ddos-attack-in-2017-double-that-of-2016/.
[52]
Jordan Robertson and Michael Riley. 2018. The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies. Bloomberg Businessweek 4 (2018).
[53]
Leonard C. G. Rogers and Luitgard A. M. Veraart. 2013. Failure and rescue in an interbank network. Management Science 59, 4 (2013), 882--898.
[54]
Eyal Ronen, Adi Shamir, Achi-Or Weingarten, and Colin O’Flynn. 2017. IoT goes nuclear: Creating a ZigBee chain reaction. In IEEE Symposium on Security and Privacy (SP’17). IEEE, 195--212.
[55]
AWS Sales. 2018. Case Studies 8 Customer Success - Amazon Web Services (AWS).
[56]
Nikhil Shetty, Galina Schwartz, Mark Felegyhazi, and Jean Walrand. 2010. Competitive cyber-insurance and internet security. In Economics of Information Security and Privacy. Springer, 229--247.
[57]
Symantec. 2016. Attackers target both large and small businesses. https://seekingalpha.com/article/4224061-why-sold-apple-stock.
[58]
Thom Tracy. 2016. Apple Stock: Analyzing 5 Key Customers (AAPL).
[59]
Duncan J. Watts. 2002. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences 99, 9 (2002), 5766--5771.
[60]
Zack Whittaker. 2016. Mirai botnet attack hits thousands of home routers, throwing users offline.
[61]
Wikipedia Contributors. 2018. 2007 cyberattacks on Estonia. Wikipedia (2018).
[62]
Benjamin Wootton. 2017. Who’s using Amazon web services? Contingo (2017).

Cited By

View all

Index Terms

  1. When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Management Information Systems
      ACM Transactions on Management Information Systems  Volume 11, Issue 2
      Research Commentary
      June 2020
      115 pages
      ISSN:2158-656X
      EISSN:2158-6578
      DOI:10.1145/3398026
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 June 2020
      Online AM: 07 May 2020
      Accepted: 01 February 2020
      Revised: 01 September 2019
      Received: 01 November 2018
      Published in TMIS Volume 11, Issue 2

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Service network
      2. cyber-blackout
      3. systemic risk

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)29
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Cyber-Insurance MarketEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1636(524-529)Online publication date: 8-Jan-2025
      • (2024)Disposable identities: Solving web trackingJournal of Information Security and Applications10.1016/j.jisa.2024.10382184(103821)Online publication date: Aug-2024
      • (2023)A Mathematical Theory to Price Cyber-Cat Bonds Boosting IT/OT SecurityProceedings of the Winter Simulation Conference10.5555/3643142.3643196(648-659)Online publication date: 10-Dec-2023
      • (2023)How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSsACM Transactions on Cyber-Physical Systems10.1145/35683996:4(1-31)Online publication date: 6-Jan-2023
      • (2022)Cyber-Insurance MarketEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1636-1(1-6)Online publication date: 26-Mar-2022
      • (2021)Cyber (re-)insurance policy writing is NP-hard in IoT societiesProceedings of the Winter Simulation Conference10.5555/3522802.3522835(1-12)Online publication date: 13-Dec-2021
      • (2021)Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and LikesACM Transactions on Management Information Systems10.1145/344663512:2(1-36)Online publication date: 25-May-2021
      • (2021)CYBER (RE-)INSURANCE POLICY WRITING IS NP-HARD IN IOT SOCIETIES2021 Winter Simulation Conference (WSC)10.1109/WSC52266.2021.9715524(1-12)Online publication date: 12-Dec-2021
      • (2021) Aggregate Cyber-Risk Management in the IoT Age: Cautionary Statistics for (Re)Insurers and Likes IEEE Internet of Things Journal10.1109/JIOT.2020.30392548:9(7360-7371)Online publication date: 1-May-2021

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media