Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data
From MaRDI portal
Publication:6096596
DOI10.1016/J.EJOR.2023.05.003arXiv2209.02845OpenAlexW4372194354MaRDI QIDQ6096596FDOQ6096596
Authors: Michel M. Dacorogna, Nehla Debbabi, Marie Kratz
Publication date: 15 September 2023
Published in: European Journal of Operational Research (Search for Journal in Brave)
Abstract: Cyber security and resilience are major challenges in our modern economies; this is why they are top priorities on the agenda of governments, security and defense forces, management of companies and organizations. Hence, the need of a deep understanding of cyber risks to improve resilience. We propose here an analysis of the database of the cyber complaints filed at the {it Gendarmerie Nationale}. We perform this analysis with a new algorithm developed for non-negative asymmetric heavy-tailed data, which could become a handy tool in applied fields. This method gives a good estimation of the full distribution including the tail. Our study confirms the finiteness of the loss expectation, necessary condition for insurability. Finally, we draw the consequences of this model for risk management, compare its results to other standard EVT models, and lay the ground for a classification of attacks based on the fatness of the tail.
Full work available at URL: https://arxiv.org/abs/2209.02845
Cites Work
- The jackknife and the bootstrap for general stationary observations
- Statistics of Extremes
- Extreme value theory. An introduction.
- Extremes and related properties of random sequences and processes
- Title not available (Why is that?)
- An Algorithm for Least-Squares Estimation of Nonlinear Parameters
- A method for the solution of certain non-linear problems in least squares
- A simple general approach to inference about the tail of a distribution
- Heavy-Tail Phenomena
- Title not available (Why is that?)
- Title not available (Why is that?)
- Risk assessment and risk management: review of recent advances on their foundation
- Sharp asymptotics for large portfolio losses under extreme risks
- A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
- Understanding and learning statistics by computer.
- Modeling multivariate cybersecurity risks
- Discrete game-theoretic analysis of defense in correlated cyber-physical systems
- An improved method for forecasting spare parts demand using extreme value theory
- On the heavy-tail behavior of the distributionally robust newsvendor
- Introduction to extreme value theory: applications to risk analysis and management
- Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
- Counterfactual regret minimization for integrated cyber and air defense resource allocation
- Attacker-defender model against quantal response adversaries for cyber security in logistics management: an introductory study
- Cyber claim analysis using generalized Pareto regression trees with applications to insurance
- Pricing of cyber insurance contracts in a network model
- A comprehensive model for cyber risk based on marked point processes and its application to insurance
- Modeling and pricing cyber insurance. Idiosyncratic, systematic, and systemic risks
- Cyber deterrence with imperfect attribution and unverifiable signaling
Cited In (2)
This page was built for publication: Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6096596)