TY - GEN
T1 - Building a social dimensional threat model from current and historic events of cyber attacks
AU - Sharma, Anup
AU - Gandhi, Robin A.
AU - Mahoney, William
AU - Sousan, William
AU - Zhu, Qiuming
PY - 2010
Y1 - 2010
N2 - The volume of cyber attacks has increased tremendously in the recent years. Many of these cyber attacks can be linked to current and historic events in the social, political, economic, and cultural (SPEC) dimensions in the human world. In this paper, we analyze the expression of such cyber attacks in news media and publications based on past social events, explore the factors in social dimension that triggered the cyber attacks, and map these factors to concepts in a cyber attack domain model. The goal of this research is to gain a better understanding of the likelihood of cyber attacks upon social disturbances in the human world. Such insight would allow predictions to be made about an impending cyber attack, the means and methods with which such attacks could be carried out, the potential victims, and the time and duration of the attacks. In our future work, we aim to utilize our models to provide early warnings such that necessary defenses can be built up before cyber attacks occur in response to disturbances in the SPEC dimensions.
AB - The volume of cyber attacks has increased tremendously in the recent years. Many of these cyber attacks can be linked to current and historic events in the social, political, economic, and cultural (SPEC) dimensions in the human world. In this paper, we analyze the expression of such cyber attacks in news media and publications based on past social events, explore the factors in social dimension that triggered the cyber attacks, and map these factors to concepts in a cyber attack domain model. The goal of this research is to gain a better understanding of the likelihood of cyber attacks upon social disturbances in the human world. Such insight would allow predictions to be made about an impending cyber attack, the means and methods with which such attacks could be carried out, the potential victims, and the time and duration of the attacks. In our future work, we aim to utilize our models to provide early warnings such that necessary defenses can be built up before cyber attacks occur in response to disturbances in the SPEC dimensions.
KW - Attack factors
KW - Cyber attack
KW - Likelihood analysis
KW - Social
KW - Threat model
UR - http://www.scopus.com/inward/record.url?scp=78649244400&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78649244400&partnerID=8YFLogxK
U2 - 10.1109/SocialCom.2010.145
DO - 10.1109/SocialCom.2010.145
M3 - Conference contribution
AN - SCOPUS:78649244400
SN - 9780769542119
T3 - Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust
SP - 981
EP - 986
BT - Proceedings - SocialCom 2010
T2 - 2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010
Y2 - 20 August 2010 through 22 August 2010
ER -