How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?

Industrial Internet of Things (IIoT) networks (e.g., a smart grid industrial control system) are increasingly on the rise, especially in smart cities around the globe. They contribute to meeting the day-to-day needs (e.g., power, water, manufacturing, transportation) of the civilian society, alongsi...

Full description

Bibliographic Details
Main Authors: Pal, Ranjan, Yin, Xinlong, Sequeira, Rohan, Zeijlemaker, Sander, Kotala, Vineeth
Other Authors: Sloan School of Management
Format: Article
Language:English
Published: ACM 2023
Online Access:https://hdl.handle.net/1721.1/152616
_version_ 1826214588023046144
author Pal, Ranjan
Yin, Xinlong
Sequeira, Rohan
Zeijlemaker, Sander
Kotala, Vineeth
author2 Sloan School of Management
author_facet Sloan School of Management
Pal, Ranjan
Yin, Xinlong
Sequeira, Rohan
Zeijlemaker, Sander
Kotala, Vineeth
author_sort Pal, Ranjan
collection MIT
description Industrial Internet of Things (IIoT) networks (e.g., a smart grid industrial control system) are increasingly on the rise, especially in smart cities around the globe. They contribute to meeting the day-to-day needs (e.g., power, water, manufacturing, transportation) of the civilian society, alongside making societal businesses more efficient, productive, and profitable. However, it is also well known that IoT devices often operate on poorly configured security settings. \textcolor{blue}{This increases the chances of occurrence of (nation-sponsored) stealthy spread-based APT malware attacks in IIoT networks that might go undetected over a considerable period of time.} Such attacks usually generate a negative first-party QoS impact upon a network that spans (aggregates) space (the entire IIoT network or a sub-network) and time (duration of business disruption) and is popularly captured through a statistical cyber-loss distribution by businesses. \textcolor{blue}{In this paper, \emph{we propose, for spread-based APT malware cyber-attacks, the first rigorous and computationally efficient network theory framework (that extends beyond IIoT networks to general sensor networks) to (a) evaluate this distribution, (b) accurately approximate its computationally intractable statistical moments under arbitrary tail-shapes, and (c) tightly bound the accuracy of empirical tail risk obtained using the Conditional Value at Risk (CVaR) metric.}} \textcolor{blue}{Clearly, an accurate estimates of the latter quantities for a parameterized family of malware-based APT cyber-attacks acts as a necessary condition for cyber-risk managers (e.g., cyber-insurers) to effectively design and deploy stand-alone risk coverage policies for such attacks on IIoT networks.} These quantities will also help the C-suite of business organizations allocate appropriate investments in time and money on securing `central' adversary targets (e.g., processes, humans, hardware) within the organization to reduce first-party tail risks and improve cyber-resilience. We validate the effectiveness of our theory using trace-driven Monte Carlo simulations based upon test-bed experiments conducted in the FIT IoT-Lab.
first_indexed 2024-09-23T16:08:12Z
format Article
id mit-1721.1/152616
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T16:08:12Z
publishDate 2023
publisher ACM
record_format dspace
spelling mit-1721.1/1526162024-02-05T18:44:52Z How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network? Pal, Ranjan Yin, Xinlong Sequeira, Rohan Zeijlemaker, Sander Kotala, Vineeth Sloan School of Management Industrial Internet of Things (IIoT) networks (e.g., a smart grid industrial control system) are increasingly on the rise, especially in smart cities around the globe. They contribute to meeting the day-to-day needs (e.g., power, water, manufacturing, transportation) of the civilian society, alongside making societal businesses more efficient, productive, and profitable. However, it is also well known that IoT devices often operate on poorly configured security settings. \textcolor{blue}{This increases the chances of occurrence of (nation-sponsored) stealthy spread-based APT malware attacks in IIoT networks that might go undetected over a considerable period of time.} Such attacks usually generate a negative first-party QoS impact upon a network that spans (aggregates) space (the entire IIoT network or a sub-network) and time (duration of business disruption) and is popularly captured through a statistical cyber-loss distribution by businesses. \textcolor{blue}{In this paper, \emph{we propose, for spread-based APT malware cyber-attacks, the first rigorous and computationally efficient network theory framework (that extends beyond IIoT networks to general sensor networks) to (a) evaluate this distribution, (b) accurately approximate its computationally intractable statistical moments under arbitrary tail-shapes, and (c) tightly bound the accuracy of empirical tail risk obtained using the Conditional Value at Risk (CVaR) metric.}} \textcolor{blue}{Clearly, an accurate estimates of the latter quantities for a parameterized family of malware-based APT cyber-attacks acts as a necessary condition for cyber-risk managers (e.g., cyber-insurers) to effectively design and deploy stand-alone risk coverage policies for such attacks on IIoT networks.} These quantities will also help the C-suite of business organizations allocate appropriate investments in time and money on securing `central' adversary targets (e.g., processes, humans, hardware) within the organization to reduce first-party tail risks and improve cyber-resilience. We validate the effectiveness of our theory using trace-driven Monte Carlo simulations based upon test-bed experiments conducted in the FIT IoT-Lab. 2023-11-01T16:00:30Z 2023-11-01T16:00:30Z 2023-11-01T07:45:08Z Article http://purl.org/eprint/type/JournalArticle https://hdl.handle.net/1721.1/152616 Pal, Ranjan, Yin, Xinlong, Sequeira, Rohan, Zeijlemaker, Sander and Kotala, Vineeth. "How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?." ACM Transactions on Management Information Systems. PUBLISHER_CC en http://dx.doi.org/10.1145/3605949 ACM Transactions on Management Information Systems Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. The author(s) application/pdf ACM Association for Computing Machinery
spellingShingle Pal, Ranjan
Yin, Xinlong
Sequeira, Rohan
Zeijlemaker, Sander
Kotala, Vineeth
How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?
title How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?
title_full How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?
title_fullStr How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?
title_full_unstemmed How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?
title_short How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?
title_sort how should enterprises quantify and analyze multi party apt cyber risk in their industrial iot network
url https://hdl.handle.net/1721.1/152616
work_keys_str_mv AT palranjan howshouldenterprisesquantifyandanalyzemultipartyaptcyberriskintheirindustrialiotnetwork
AT yinxinlong howshouldenterprisesquantifyandanalyzemultipartyaptcyberriskintheirindustrialiotnetwork
AT sequeirarohan howshouldenterprisesquantifyandanalyzemultipartyaptcyberriskintheirindustrialiotnetwork
AT zeijlemakersander howshouldenterprisesquantifyandanalyzemultipartyaptcyberriskintheirindustrialiotnetwork
AT kotalavineeth howshouldenterprisesquantifyandanalyzemultipartyaptcyberriskintheirindustrialiotnetwork