Systematically Understanding the Cyber Attack Business: A Survey

被引:64
作者
Huang, Keman [1 ]
Siegel, Michael [1 ]
Madnick, Stuart [2 ]
机构
[1] MIT, Sloan Sch Management, Cambridge, MA 02142 USA
[2] MIT, Sch Engn, Sloan Sch Management, Cambridge, MA 02142 USA
基金
中国国家自然科学基金;
关键词
Cyber attack business; cyber crime; value chain model; cyber-crime-as-a-service; hacking innovation; control point; sharing responsibility; CHALLENGES; EXPLOIT;
D O I
10.1145/3199674
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber attacks are increasingly menacing businesses. Based on the literature review and publicly available reports, this article conducts an extensive and consistent survey of the services used by the cybercrime business, organized using the value chain perspective, to understand cyber attack in a systematic way. Understanding the specialization, commercialization, and cooperation for cyber attacks helps us to identify 24 key value-added activities and their relations. These can be offered "as a service" for use in a cyber attack. This framework helps to understand the cybercriminal service ecosystem and hacking innovations. Finally, a few examples are provided showing how this framework can help to build a more cyber immune system, like targeting cybercrime control-points and assigning defense responsibilities to encourage collaboration.
引用
收藏
页数:36
相关论文
共 171 条
[1]  
Ablon Lillian, 2014, TECHNICAL REPORT, P1
[2]   SoK: Lessons Learned From Android Security Research For Appified Software Platforms [J].
Acar, Yasemin ;
Backes, Michael ;
Bugiel, Sven ;
Fahl, Sascha ;
McDaniel, Patrick ;
Smith, Matthew .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :433-451
[3]  
ALGARNI A.M., 2014, Int. J. Comput. Inf. Eng., V8, P480, DOI DOI 10.5281/ZENODO.1091516
[4]   Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks [J].
Alrwais, Sumayah ;
Liao, Xiaojing ;
Mi, Xianghang ;
Wang, Peng ;
Wang, XiaoFeng ;
Qian, Feng ;
Beyah, Raheem ;
Mccoy, Damon .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :805-823
[5]  
Alsabah Mashael, 2014, COMPUT SURV, V49, P1
[6]  
Anderson R., 2013, The Economics of Information Security and Privacy, P265
[7]  
[Anonymous], ANONYMOUS GROUP JUST
[8]  
[Anonymous], 2015, OVERVIEW EXPLOIT PAC
[9]  
[Anonymous], 2016, CISCO VISUAL NETWORK, P1
[10]  
[Anonymous], 2016, ANONYMITY PRIVACY 1