Building a social dimensional threat model from current and historic events of cyber attacks

Anup Sharma, Robin A. Gandhi, William Mahoney, William Sousan, Qiuming Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

The volume of cyber attacks has increased tremendously in the recent years. Many of these cyber attacks can be linked to current and historic events in the social, political, economic, and cultural (SPEC) dimensions in the human world. In this paper, we analyze the expression of such cyber attacks in news media and publications based on past social events, explore the factors in social dimension that triggered the cyber attacks, and map these factors to concepts in a cyber attack domain model. The goal of this research is to gain a better understanding of the likelihood of cyber attacks upon social disturbances in the human world. Such insight would allow predictions to be made about an impending cyber attack, the means and methods with which such attacks could be carried out, the potential victims, and the time and duration of the attacks. In our future work, we aim to utilize our models to provide early warnings such that necessary defenses can be built up before cyber attacks occur in response to disturbances in the SPEC dimensions.

Original languageEnglish (US)
Title of host publicationProceedings - SocialCom 2010
Subtitle of host publication2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust
Pages981-986
Number of pages6
DOIs
StatePublished - 2010
Event2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010 - Minneapolis, MN, United States
Duration: Aug 20 2010Aug 22 2010

Publication series

NameProceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust

Conference

Conference2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010
CountryUnited States
CityMinneapolis, MN
Period8/20/108/22/10

Keywords

  • Attack factors
  • Cyber attack
  • Likelihood analysis
  • Social
  • Threat model

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Fingerprint Dive into the research topics of 'Building a social dimensional threat model from current and historic events of cyber attacks'. Together they form a unique fingerprint.

Cite this