{"title":"基于外部激励的两阶段Hawkes过程的网络风险建模","authors":"Alexandre BoumezouedCREST, Yousra CherkaouiCREST, Caroline HillairetCREST","doi":"arxiv-2311.15701","DOIUrl":null,"url":null,"abstract":"With the growing digital transformation of the worldwide economy, cyber risk\nhas become a major issue. As 1 % of the world's GDP (around $1,000 billion) is\nallegedly lost to cybercrime every year, IT systems continue to get\nincreasingly interconnected, making them vulnerable to accumulation phenomena\nthat undermine the pooling mechanism of insurance. As highlighted in the\nliterature, Hawkes processes appear to be suitable models to capture contagion\nphenomena and clustering features of cyber events. This paper extends the\nstandard Hawkes modeling of cyber risk frequency by adding external shocks,\nmodelled by the publication of cyber vulnerabilities that are deemed to\nincrease the likelihood of attacks in the short term. The aim of the proposed\nmodel is to provide a better quantification of contagion effects since, while\nthe standard Hawkes model allocates all the clustering phenomena to\nself-excitation, our model allows to capture the external common factors that\nmay explain part of the systemic pattern. We propose a Hawkes model with two\nkernels, one for the endogenous factor (the contagion from other cyber events)\nand one for the exogenous component (cyber vulnerability publications). We use\nparametric exponential specifications for both the internal and exogenous\nintensity kernels, and we compare different methods to tackle the inference\nproblem based on public datasets containing features of cyber attacks found in\nthe Hackmageddon database and cyber vulnerabilities from the Known Exploited\nVulnerability database and the National Vulnerability Dataset. By refining the\nexternal excitation database selection, the degree of endogeneity of the model\nis nearly halved. We illustrate our model with simulations and discuss the\nimpact of taking into account the external factor driven by vulnerabilities.\nOnce an attack has occurred, response measures are implemented to limit the\neffects of an attack. These measures include patching vulnerabilities and\nreducing the attack's contagion. We use an augmented version of the model by\nadding a second phase modeling a reduction in the contagion pattern from the\nremediation measures. Based on this model, we explore various scenarios and\nquantify the effect of mitigation measures of an insurance company that aims to\nmitigate the effects of a cyber pandemic in its insured portfolio.","PeriodicalId":501330,"journal":{"name":"arXiv - MATH - Statistics Theory","volume":"63 10","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber risk modeling using a two-phase Hawkes process with external excitation\",\"authors\":\"Alexandre BoumezouedCREST, Yousra CherkaouiCREST, Caroline HillairetCREST\",\"doi\":\"arxiv-2311.15701\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing digital transformation of the worldwide economy, cyber risk\\nhas become a major issue. As 1 % of the world's GDP (around $1,000 billion) is\\nallegedly lost to cybercrime every year, IT systems continue to get\\nincreasingly interconnected, making them vulnerable to accumulation phenomena\\nthat undermine the pooling mechanism of insurance. As highlighted in the\\nliterature, Hawkes processes appear to be suitable models to capture contagion\\nphenomena and clustering features of cyber events. This paper extends the\\nstandard Hawkes modeling of cyber risk frequency by adding external shocks,\\nmodelled by the publication of cyber vulnerabilities that are deemed to\\nincrease the likelihood of attacks in the short term. The aim of the proposed\\nmodel is to provide a better quantification of contagion effects since, while\\nthe standard Hawkes model allocates all the clustering phenomena to\\nself-excitation, our model allows to capture the external common factors that\\nmay explain part of the systemic pattern. We propose a Hawkes model with two\\nkernels, one for the endogenous factor (the contagion from other cyber events)\\nand one for the exogenous component (cyber vulnerability publications). We use\\nparametric exponential specifications for both the internal and exogenous\\nintensity kernels, and we compare different methods to tackle the inference\\nproblem based on public datasets containing features of cyber attacks found in\\nthe Hackmageddon database and cyber vulnerabilities from the Known Exploited\\nVulnerability database and the National Vulnerability Dataset. By refining the\\nexternal excitation database selection, the degree of endogeneity of the model\\nis nearly halved. We illustrate our model with simulations and discuss the\\nimpact of taking into account the external factor driven by vulnerabilities.\\nOnce an attack has occurred, response measures are implemented to limit the\\neffects of an attack. These measures include patching vulnerabilities and\\nreducing the attack's contagion. We use an augmented version of the model by\\nadding a second phase modeling a reduction in the contagion pattern from the\\nremediation measures. Based on this model, we explore various scenarios and\\nquantify the effect of mitigation measures of an insurance company that aims to\\nmitigate the effects of a cyber pandemic in its insured portfolio.\",\"PeriodicalId\":501330,\"journal\":{\"name\":\"arXiv - MATH - Statistics Theory\",\"volume\":\"63 10\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - MATH - Statistics Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2311.15701\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - MATH - Statistics Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2311.15701","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber risk modeling using a two-phase Hawkes process with external excitation
With the growing digital transformation of the worldwide economy, cyber risk
has become a major issue. As 1 % of the world's GDP (around $1,000 billion) is
allegedly lost to cybercrime every year, IT systems continue to get
increasingly interconnected, making them vulnerable to accumulation phenomena
that undermine the pooling mechanism of insurance. As highlighted in the
literature, Hawkes processes appear to be suitable models to capture contagion
phenomena and clustering features of cyber events. This paper extends the
standard Hawkes modeling of cyber risk frequency by adding external shocks,
modelled by the publication of cyber vulnerabilities that are deemed to
increase the likelihood of attacks in the short term. The aim of the proposed
model is to provide a better quantification of contagion effects since, while
the standard Hawkes model allocates all the clustering phenomena to
self-excitation, our model allows to capture the external common factors that
may explain part of the systemic pattern. We propose a Hawkes model with two
kernels, one for the endogenous factor (the contagion from other cyber events)
and one for the exogenous component (cyber vulnerability publications). We use
parametric exponential specifications for both the internal and exogenous
intensity kernels, and we compare different methods to tackle the inference
problem based on public datasets containing features of cyber attacks found in
the Hackmageddon database and cyber vulnerabilities from the Known Exploited
Vulnerability database and the National Vulnerability Dataset. By refining the
external excitation database selection, the degree of endogeneity of the model
is nearly halved. We illustrate our model with simulations and discuss the
impact of taking into account the external factor driven by vulnerabilities.
Once an attack has occurred, response measures are implemented to limit the
effects of an attack. These measures include patching vulnerabilities and
reducing the attack's contagion. We use an augmented version of the model by
adding a second phase modeling a reduction in the contagion pattern from the
remediation measures. Based on this model, we explore various scenarios and
quantify the effect of mitigation measures of an insurance company that aims to
mitigate the effects of a cyber pandemic in its insured portfolio.