Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : V. S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash

Erschienen in: The Global Cyber-Vulnerability Report

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter summarizes the results of a study analyzing 2 years of data provided by Symantec, monitoring over 4M host machines per year and a total of over 20B telemetry reports from these hosts. By focusing on 44 countries for which at least 500 hosts were monitored per year, we are able to provide a comprehensive analysis of the cyber-vulnerability of countries according to two measures: number of attacks per machine in a given country, and percentage of machines in the country that are attacked. We provide an analysis of the cyber-vulnerability of these countries according to these measures, identifying the most vulnerable and the least vulnerable nations from a cyber-vulnerability perspective.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mezzour G, Carley KM, Carley LR (2015) “An empirical study of global malware encounters.” In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security. ACM, 2015 Mezzour G, Carley KM, Carley LR (2015) “An empirical study of global malware encounters.” In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security. ACM, 2015
2.
Zurück zum Zitat Bilge L, Dumitras T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: ACM Conference on Computer and Communications Security, pp 833–844 Bilge L, Dumitras T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: ACM Conference on Computer and Communications Security, pp 833–844
13.
Zurück zum Zitat Subrahmanian VS, Mannes A, Sliva A, Shakarian J, Dickerson J (2012) Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, Aug 2012, Springer, Switzerland Subrahmanian VS, Mannes A, Sliva A, Shakarian J, Dickerson J (2012) Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, Aug 2012, Springer, Switzerland
14.
Zurück zum Zitat Subrahmanian VS, Mannes A, Roul A, Raghavan RK (2013) Indian Mujahideen: Computational Analysis and Public Policy, Springer, Nov 2013 Subrahmanian VS, Mannes A, Roul A, Raghavan RK (2013) Indian Mujahideen: Computational Analysis and Public Policy, Springer, Nov 2013
15.
Zurück zum Zitat Ovelgonne M, Dumitras T, Prakash BA, Subrahmanian VS, Wang B (2015) Understanding the Relationship between Human Behavior and Susceptibility to Cyber-Attacks: A Data-Drive Approach, submitted to a technical journal, Feb 2015. Currently being revised Ovelgonne M, Dumitras T, Prakash BA, Subrahmanian VS, Wang B (2015) Understanding the Relationship between Human Behavior and Susceptibility to Cyber-Attacks: A Data-Drive Approach, submitted to a technical journal, Feb 2015. Currently being revised
16.
Zurück zum Zitat Kang C, Park N, Prakash A, Serra E, Subrahmanian VS (2015) Ensemble Models for Data-Drive Prediction of Malware Infections, to appear in: Proc. 9th ACM International Conference on Web Science and Data Mining (WSDM), San Francisco, Feb 2016 Kang C, Park N, Prakash A, Serra E, Subrahmanian VS (2015) Ensemble Models for Data-Drive Prediction of Malware Infections, to appear in: Proc. 9th ACM International Conference on Web Science and Data Mining (WSDM), San Francisco, Feb 2016
17.
Zurück zum Zitat Matsubara Y, Sakurai Y, van Panhuis WG, Faloutsos C (2014) FUNNEL: automatic mining of spatially coevolving epidemics. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining pp 105–114 ACM, Aug 2014 Matsubara Y, Sakurai Y, van Panhuis WG, Faloutsos C (2014) FUNNEL: automatic mining of spatially coevolving epidemics. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining pp 105–114 ACM, Aug 2014
Metadaten
Titel
Introduction
verfasst von
V. S. Subrahmanian
Michael Ovelgönne
Tudor Dumitras
B. Aditya Prakash
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-25760-0_1

Premium Partner