Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data
From MaRDI portal
Publication:6096596
Abstract: Cyber security and resilience are major challenges in our modern economies; this is why they are top priorities on the agenda of governments, security and defense forces, management of companies and organizations. Hence, the need of a deep understanding of cyber risks to improve resilience. We propose here an analysis of the database of the cyber complaints filed at the {it Gendarmerie Nationale}. We perform this analysis with a new algorithm developed for non-negative asymmetric heavy-tailed data, which could become a handy tool in applied fields. This method gives a good estimation of the full distribution including the tail. Our study confirms the finiteness of the loss expectation, necessary condition for insurability. Finally, we draw the consequences of this model for risk management, compare its results to other standard EVT models, and lay the ground for a classification of attacks based on the fatness of the tail.
Cites work
- scientific article; zbMATH DE number 1026574 (Why is no real title available?)
- scientific article; zbMATH DE number 5204924 (Why is no real title available?)
- scientific article; zbMATH DE number 5242364 (Why is no real title available?)
- A comprehensive model for cyber risk based on marked point processes and its application to insurance
- A method for the solution of certain non-linear problems in least squares
- A simple general approach to inference about the tail of a distribution
- A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
- An Algorithm for Least-Squares Estimation of Nonlinear Parameters
- An improved method for forecasting spare parts demand using extreme value theory
- Attacker-defender model against quantal response adversaries for cyber security in logistics management: an introductory study
- Counterfactual regret minimization for integrated cyber and air defense resource allocation
- Cyber claim analysis using generalized Pareto regression trees with applications to insurance
- Cyber deterrence with imperfect attribution and unverifiable signaling
- Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
- Discrete game-theoretic analysis of defense in correlated cyber-physical systems
- Extreme value theory. An introduction.
- Extremes and related properties of random sequences and processes
- Heavy-Tail Phenomena
- Introduction to extreme value theory: applications to risk analysis and management
- Modeling and pricing cyber insurance. Idiosyncratic, systematic, and systemic risks
- Modeling multivariate cybersecurity risks
- On the heavy-tail behavior of the distributionally robust newsvendor
- Pricing of cyber insurance contracts in a network model
- Risk assessment and risk management: review of recent advances on their foundation
- Sharp asymptotics for large portfolio losses under extreme risks
- Statistics of Extremes
- The jackknife and the bootstrap for general stationary observations
- Understanding and learning statistics by computer.
Cited in
(2)
This page was built for publication: Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6096596)