Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure and platforms. This dissertation looks at how intermediary behavior and incentives can be understood from measurements—such as incident data and network logs. The question is answered through a literature review, four empirical studies, and two reflection chapters. The studies researched the role of ISPs in mitigating botnets, the success of anti-botnet initiatives in Conficker cleanup, vulnerabilities in the certificate authority ecosystem, and IS...
The Internet has developed into an important economic, military, academic, and social resource. It ...
Today's cybercriminals must carefully manage their network resources to evade detection and maintai...
Abstract—Botnets are the most common vehicle of cyber-crim-inal activity. They are used for spamming...
Research in the field of information security economics has clarified how attacker and defender ince...
Part 3: Ph.D. Student Workshop — Security ManagementInternational audienceISPs form a centralized po...
In the field of cybersecurity, the top-level management make use of metrics to decide if the organiz...
Cyber-crime is a large problem for society. OftenA botnet is used to for cybercrime. An infected mac...
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet Service Provi...
This article examines the role of Internet Service Providers (ISPs) in combating botnets. The first ...
Large-scale Internet attacks are pervasive. A broad spectrum of actors from organized gangs of crimi...
Achieving computer security requires both rigorous empirical measurement and models to understand cy...
The economics of information security has recently become a thriving and fast-moving discipline. Sys...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
Internet insecurity is a worldwide problem that has generated a multitude of costs for businesses, g...
The Internet has developed into an important economic, military, academic, and social resource. It ...
Today's cybercriminals must carefully manage their network resources to evade detection and maintai...
Abstract—Botnets are the most common vehicle of cyber-crim-inal activity. They are used for spamming...
Research in the field of information security economics has clarified how attacker and defender ince...
Part 3: Ph.D. Student Workshop — Security ManagementInternational audienceISPs form a centralized po...
In the field of cybersecurity, the top-level management make use of metrics to decide if the organiz...
Cyber-crime is a large problem for society. OftenA botnet is used to for cybercrime. An infected mac...
For the mitigation of compromised Internet of Things (IoT) devices we rely on Internet Service Provi...
This article examines the role of Internet Service Providers (ISPs) in combating botnets. The first ...
Large-scale Internet attacks are pervasive. A broad spectrum of actors from organized gangs of crimi...
Achieving computer security requires both rigorous empirical measurement and models to understand cy...
The economics of information security has recently become a thriving and fast-moving discipline. Sys...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
Internet insecurity is a worldwide problem that has generated a multitude of costs for businesses, g...
The Internet has developed into an important economic, military, academic, and social resource. It ...
Today's cybercriminals must carefully manage their network resources to evade detection and maintai...
Abstract—Botnets are the most common vehicle of cyber-crim-inal activity. They are used for spamming...