Show simple item record

dc.contributor.authorPal, Ranjan
dc.contributor.authorYin, Xinlong
dc.contributor.authorSequeira, Rohan
dc.contributor.authorZeijlemaker, Sander
dc.contributor.authorKotala, Vineeth
dc.date.accessioned2023-11-01T16:00:30Z
dc.date.available2023-11-01T16:00:30Z
dc.identifier.urihttps://hdl.handle.net/1721.1/152616
dc.description.abstractIndustrial Internet of Things (IIoT) networks (e.g., a smart grid industrial control system) are increasingly on the rise, especially in smart cities around the globe. They contribute to meeting the day-to-day needs (e.g., power, water, manufacturing, transportation) of the civilian society, alongside making societal businesses more efficient, productive, and profitable. However, it is also well known that IoT devices often operate on poorly configured security settings. \textcolor{blue}{This increases the chances of occurrence of (nation-sponsored) stealthy spread-based APT malware attacks in IIoT networks that might go undetected over a considerable period of time.} Such attacks usually generate a negative first-party QoS impact upon a network that spans (aggregates) space (the entire IIoT network or a sub-network) and time (duration of business disruption) and is popularly captured through a statistical cyber-loss distribution by businesses. \textcolor{blue}{In this paper, \emph{we propose, for spread-based APT malware cyber-attacks, the first rigorous and computationally efficient network theory framework (that extends beyond IIoT networks to general sensor networks) to (a) evaluate this distribution, (b) accurately approximate its computationally intractable statistical moments under arbitrary tail-shapes, and (c) tightly bound the accuracy of empirical tail risk obtained using the Conditional Value at Risk (CVaR) metric.}} \textcolor{blue}{Clearly, an accurate estimates of the latter quantities for a parameterized family of malware-based APT cyber-attacks acts as a necessary condition for cyber-risk managers (e.g., cyber-insurers) to effectively design and deploy stand-alone risk coverage policies for such attacks on IIoT networks.} These quantities will also help the C-suite of business organizations allocate appropriate investments in time and money on securing `central' adversary targets (e.g., processes, humans, hardware) within the organization to reduce first-party tail risks and improve cyber-resilience. We validate the effectiveness of our theory using trace-driven Monte Carlo simulations based upon test-bed experiments conducted in the FIT IoT-Lab.en_US
dc.publisherACMen_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/3605949en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titleHow Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?en_US
dc.typeArticleen_US
dc.identifier.citationPal, Ranjan, Yin, Xinlong, Sequeira, Rohan, Zeijlemaker, Sander and Kotala, Vineeth. "How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?." ACM Transactions on Management Information Systems.
dc.contributor.departmentSloan School of Management
dc.relation.journalACM Transactions on Management Information Systemsen_US
dc.identifier.mitlicensePUBLISHER_CC
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2023-11-01T07:45:08Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2023-11-01T07:45:09Z
mit.licensePUBLISHER_POLICY
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record