TY - GEN
T1 - How many down? Toward understanding systematic risk in networks
AU - Johnson, Benjamin
AU - Laszka, Aron
AU - Grossklags, Jens
N1 - Publisher Copyright:
Copyright © 2014 ACM.
PY - 2014/6/4
Y1 - 2014/6/4
N2 - The systematic risk of a networked system depends to a large extent on its topology. In this paper, we explore this dependency using a model of risk propagation from the literature on interdependent security games. Our main area of focus is on the number of nodes that go down after an attack takes place. We develop a simulation algorithm to study the effects of such attacks on arbitrary topologies, and apply this simulation to scale-free networks. We investigate by graphical illustration how the outcome distribution of such networks exhibits correlation effects that increase the likelihood of losing more nodes at once - an effect having direct applications to cyber-insurance.
AB - The systematic risk of a networked system depends to a large extent on its topology. In this paper, we explore this dependency using a model of risk propagation from the literature on interdependent security games. Our main area of focus is on the number of nodes that go down after an attack takes place. We develop a simulation algorithm to study the effects of such attacks on arbitrary topologies, and apply this simulation to scale-free networks. We investigate by graphical illustration how the outcome distribution of such networks exhibits correlation effects that increase the likelihood of losing more nodes at once - an effect having direct applications to cyber-insurance.
UR - http://www.scopus.com/inward/record.url?scp=84984863583&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84984863583&partnerID=8YFLogxK
U2 - 10.1145/2590296.2590308
DO - 10.1145/2590296.2590308
M3 - Conference contribution
AN - SCOPUS:84984863583
T3 - ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
SP - 495
EP - 500
BT - ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
PB - Association for Computing Machinery, Inc
T2 - 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014
Y2 - 4 June 2014 through 6 June 2014
ER -