Power Laws for Cyber Crime Richard Overill & Jantje Silomon Department of Informatics King’s College London.

Slides:



Advertisements
Similar presentations
Dinei Florencio and Cormac Herley WEIS’ We are curious about sex We are curious about politics We are curious about cybercrime And we satisfy some.
Advertisements

Forecasting Computer Crime Complaints Adnan Omar Ada Kwanbunbumpen David Alijani.
Authorship Ethics Requirements in Medical Journals William Gardner, PhD Center for Innovation in Pediatric Practice Columbus Children’s Research Institute.
Strategic Centre for Organised Crime Partnerships and engagement with communities.
User Perception and Acceptance of Biometrics M. Angela Sasse Professor of Human-Centred Technology Department of Computer Science University College London,
A partnership approach to tackling Cybercrime Prof Bernard Silverman Home Office Chief Scientific Adviser.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Cyber Crime & Cyber Terrorism Dr Richard Overill Department of Informatics King’s College London
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Theorems on divergent sequences. Theorem 1 If the sequence is increasing and not bounded from above then it diverges to +∞. Illustration =
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Computer Crime By FUNG Wai-keung Hong Kong Police.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
Introduction to Royal Holloway, University of London Professor Paul Hogg, Vice Principal for Research and Dean of Science.
Lecture No.1 By M Fahad Siddiqi Lecture (Finance) IBMS.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Richard E Overill & Jantje A M Silomon Department of Informatics, King’s College London K P Chow & Y W Law Department of Computer Science, University of.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
Does Inequality Matter in China? Lina Song University of Nottingham.
The Economics of Cybersecurity Allan Friedman Research Director, Center for Technology Innovation Fellow, Governance Studies Brookings Institution
The Economic Challenges Confronting Low-Skilled Older Workers Richard W. Johnson Urban Institute May 14, 2009.
Quantification of Digital Forensic Hypotheses Using Probability Theory Richard E Overill & Jantje A M Silomon King’s College London Kam-Pui Chow & Hayson.
Joseph Richardson Senior Fellow, ICC ICC Survey of CERT Capacity in Africa July 2010.
Building Stronger Communities, Building Stronger Choruses Fundraising General Session.
Planning Personal Finances. Personal Financial Planning SPENDING SAVING INVESTING So you can have the kind of life you want as well as financial security.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Hurdles in implementation of cyber security in India.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
A threat to global security and economy Koushik Mannepalli CMPE 294.
Computer crimes.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.
Reading 1 Fight against cybercrime 板块:教学设计 —— 课件 Unit 4.
PHYSICAL INVESTMENT, HEALTH INVESTMENT AND ECONOMIC COMPETITIVENESS IN AFRICA By Abiodun O. Folawewo and Adeniyi Jimmy Adedokun Department of Economics,
The International System after 9/11  The American strategic thinking post- 9/11  Re-evaluation of the UN international system  Transatlantic tensions.
By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 
NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.
Scottish Policing 2011 – Risks To Communities & Information-Sharing Russell Scott Visiting Academic Edinburgh Napier University Serious Organised Crime.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Business Continuity Planning Securing the Enterprise by Juanita Ellis Sponsored by WITI- Women In Technology International.
WAR, POWER-LAWS & MLE Miles D. Townes The George Washington University Draft, links, and STATA do-files available at
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Students’ Perceived Ethical Severity of e-Learning Security Attacks
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
Liberty International Underwriters
Chapter 2 Applications of the Derivative
CSI Survey 2007 Tiffany Gorman
IST 243 Enthusiastic Study/snaptutorial.com
CYBER CRIME Matthew Purchase.
SCC Student Household Income Level (Fall 2012 to Fall 2016)
Threat landscape financial sector
CSI/FBI 2007, 2009, 2010/11 Key findings.
US Growth Since 1790 This short series of slides illustrates the importance of compounding, or doubling time, in economic growth. Because of compounding,
Measuring Economic Growth-GDP
Forensic and Investigative Accounting
Detective Inspector Les Charlton – Nottinghamshire Police
Continuous Probability Distributions Solved Problems
SCC Student Household Income Level (Fall 2011 to Fall 2015)
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

Power Laws for Cyber Crime Richard Overill & Jantje Silomon Department of Informatics King’s College London

Power Laws Characterise a multitude of processes which produce a large number of small events but a small number of large events: p(x) = C x -α log p(x) = log C - α log x A log-log plot is a straight line with gradient -α the exponent α characterises the power law in a phenomenological sense.

Previous Work L F Richardson (1948/60) –“fatal quarrels” L-E Cederman (2003) –wars A Clauset et al. (2005/7) –terrorism in G7: α = 1.7 N F Johnson et al. (2005/6) –old wars, new wars R Coelho et al. (2008) –low-medium UK incomes: α =

Cyber Crime Dataset 11 years ( ) of US CSI (Computer Security Institute) annual average financial loss data over 12 e-crime categories. Corrected for US$ inflation. Cleaned to remove internal inconsistencies. Kolmogorov-Smirnov test for divergence as x  data points representing 6737 incidents. Minus-one jack-knife re-sampling provides uncertainty bounds on α.

Double Power Law for Cyber Crimes

Results & Conclusions A double power regime appears to be in operation: α L = 1.7 ± 0.1; r 2 L = (over 92 points) α R = 3.1 ± 0.3; r 2 R = (over 7 points) x X = $2.858M ± exponent of ~1.7 shared with incidence of terrorism in G7 nations. exponent of ~3.1 shared with distribution of low-medium UK incomes.

Conjectures Heists below ~$2.85M are characterised by a pre-planned, opportunistic, ‘ambush’ strategy. Heists above ~$2.85M (financial fraud and IP theft) are characterised by an economic infrastructure (Serious Organised Cybercrime) R Overill & J Silomon, Single and Double Power Laws for Cyber Crimes, J Information Warfare 10 (3) 29 – 36 (December 2011).