Ransomware as a Predator: Modelling the Systemic Risk to Prey

Author:

Axon Louise1ORCID,Erola Arnau1ORCID,Agrafiotis Ioannis1ORCID,Uuganbayar Ganbayar1ORCID,Goldsmith Michael1ORCID,Creese Sadie1ORCID

Affiliation:

1. Department of Computer Science, University of Oxford, UK

Abstract

The accelerated pace with which companies, governments, and institutions embrace digital transformation is creating opportunities for economic prosperity, but also increases the threat landscape. Recent orchestrated cyber-attacks have revealed the unpredictability of the harm they can cause in our society, rendering the creation of new models that capture systemic risk more critical than ever. In this article, we model the behaviour of one of the most prominent cyber-attacks: ransomware; in particular, ransomware that propagates between organisations via the Internet. We draw concepts from epidemiological models of viral propagation to reason about policies that can reduce the systemic cyber-risk to the community. To achieve this, we present a compartment-based epidemiological model of predator-prey interactions and run simulations to validate the importance of defensive controls that reduce the propagation of ransomware. Our model suggests that with specific defensive controls in place, other response policies may also become more effective. A prey policy to not pay the ransom may improve the ability of the victim population to recover; while information-sharing may reduce the number of organisations compromised if certain conditions on the speed of threat-intelligence sharing practices are met. These results indicate the validity of the approach, which we believe could be extended to explore the impacts of a broad range of attacker and defender behaviours and characteristics of the digital environment on systemic risk.

Funder

AXIS Insurance Company

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Computer Science Applications,Hardware and Architecture,Safety Research,Information Systems,Software

Reference79 articles.

1. 2017. Midyear Security Roundup: The Cost of Compromise - Security Roundup. Technical Report. Trendmicro. Retrieved from https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/the-cost-of-compromise.

2. 2020. 2020 Cyberthreat Defense Report. Technical Report. Cyber Edge Group.

3. 2020. The 2020 Ransomware Resiliency Report. Technical Report. Veritas.

4. 2020. Dealing with the SolarWinds Orion Compromise. Technical Report. National Cyber Security Centre (NCSC).

5. 2020. Mitigating Malware and Ransomware Attacks. Technical Report. National Cyber Security Centre (NCSC).

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3