@conference{db37e3ba98c9438990127619a954c7b9,
title = "The work-averse cyber attacker model : theory and evidence from two million attack signatures",
abstract = "The typical cyber attacker is assumed to be all powerful and to exploit allpossible vulnerabilities. In this paper we present, and empirically validate, anovel and more realistic attacker model. The intuition of our model is that anattacker will optimally choose whether to act and weaponize a newvulnerability, or keep using existing toolkits if there are enough vulnerableusers. The model predicts that attackers may i) exploit only one vulnerabilityper software version, ii) include only vulnerabilities with low attackcomplexity, and iii) be slow at introducing new vulnerabilities into theirarsenal. We empirically test these predictions by conducting a naturalexperiment on attack data collected against more than one million real systemsfrom Symantec's WINE platform. Our analysis shows that mass attackers' fixedcosts are indeed significant and that substantial efficiency gains can be madeby individuals and organizations by accounting for this effect.",
keywords = "Cyber Security, Dynamic Programming, Malware Production, Risk management",
author = "L. Allodi and F. Massacci and J. Williams",
note = "Peer-reviewed version of the SSRN working paper; 16th Annual Workshop on the Economics of Information Security (WEIS 2017), WEIS 2017 ; Conference date: 26-06-2017 Through 27-06-2017",
year = "2017",
month = jun,
language = "English",
url = "http://weis2017.econinfosec.org",
}