A Machine Learning-based Method for Cyber Risk Assessment

被引:2
作者
Rafaiani, Giulia [1 ]
Battaglioni, Massimo [1 ]
Compagnoni, Simone [1 ]
Senigagliesi, Linda [1 ]
Chiaraluce, Franco [1 ]
Baldi, Marco [1 ]
机构
[1] Marche Polytech Univ, Dept Informat Engn, I-60131 Ancona, Italy
来源
2023 IEEE 36TH INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, CBMS | 2023年
关键词
Cyber incidents; cyber risk assessment; machine learning;
D O I
10.1109/CBMS58004.2023.00228
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber risk assessment is one of the top priorities of modern organizations and companies, owing to the massive amount of data they process on a daily basis and to the increasing number of successful cyber attacks. The probability of occurrence of these cyber incidents can be estimated by means of statistical tools, which exploit numerical categories to compute the probability that the organization will be breached by one or more cyber attacks. However, these approaches heavily rely on experts' estimates and/or on past data, which are not always available. In this paper we show that, by exploiting machine learning tools, cyber risk can be assessed by using some easily obtainable parameters (called maturity, complexity, attractiveness) representing the cyber posture of the organization under exam. To validate the method we propose, we apply it to three organizations in the healthcare sector having different values of maturity and complexity. The results highlight how the model can be successfully used to assign each organization a class of cyber risk, even in a crucial sector such as healthcare.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 20 条
[1]   Merging Datasets of CyberSecurity Incidents for Fun and Insight [J].
Abbiati, Giovanni ;
Ranise, Silvio ;
Schizzerotto, Antonio ;
Siena, Alberto .
FRONTIERS IN BIG DATA, 2021, 3
[2]  
[Anonymous], 2014, Measuring and Managing Information Risk: A FAIR Approach
[3]  
[Anonymous], DRM DASHBOARD RANSOM
[4]  
Arvid K., 2020, INFORM SECURITY INT, V47, P203
[5]   MAGIC: A Method for Assessing Cyber Incidents Occurrence [J].
Battaglioni, Massimo ;
Rafaiani, Giulia ;
Chiaraluce, Franco ;
Baldi, Marco .
IEEE ACCESS, 2022, 10 :73458-73473
[6]  
Fraley JB, 2017, IEEE SOUTHEASTCON
[7]   Information security risk analysis model using fuzzy decision theory [J].
Henriques de Gusmao, Ana Paula ;
Camara e Silva, Lucio ;
Silva, Maisa Mendonca ;
Poleto, Thiago ;
Cabral Seixas Costa, Ana Paula .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (01) :25-34
[8]  
Hubbard DW, 2016, How to Measure Anything in Cybersecurity Risk, V1st, DOI 10.1002/9781119162315
[9]  
International Organization for Standardization (ISO), 2018, ISO 31000:2018
[10]  
International Organization for Standardization [ISO], 2018, 270002018 ISO IEC