Abstract
This chapter summarizes the results of a study analyzing 2 years of data provided by Symantec, monitoring over 4M host machines per year and a total of over 20B telemetry reports from these hosts. By focusing on 44 countries for which at least 500 hosts were monitored per year, we are able to provide a comprehensive analysis of the cyber-vulnerability of countries according to two measures: number of attacks per machine in a given country, and percentage of machines in the country that are attacked. We provide an analysis of the cyber-vulnerability of these countries according to these measures, identifying the most vulnerable and the least vulnerable nations from a cyber-vulnerability perspective.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Mezzour G, Carley KM, Carley LR (2015) “An empirical study of global malware encounters.” In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security. ACM, 2015
Bilge L, Dumitras T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: ACM Conference on Computer and Communications Security, pp 833–844
Symantec Corp (2013) Four years of DarkSeoul cyberattacks against South Korea continue on anniversary of Korean War. Technical report http://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war
Gantz JF et al (2013) International Data Corporation. The dangerous world of counterfeit and pirated software. Technical report http://www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/idc030513.pdf
Federal Bureau of Investigation (2013) Consumer alert: Pirated software may contain malware. Technical report https://www.fbi.gov/news/stories/2013/august/pirated-software-may-contain-malware
Business Software Alliance. Shadow market—2011 BSA global software piracy study, 2012. 9th edition, http://globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Piracy_Study-Standard.pdf
McAfee Labs (2013) McAfee threats report: First quarter 2013. Technical report http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2013.pdf
McAfee Labs (2014) McAfee threats report August 2014. Technical report. http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2014.pdf
Symantec Corp (2014) Symantec internet security threat report 2014 appendix. Technical report http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_appendices_v19_221284438.en-us.pdf
Symantec Corp (2014) Symantec internet security threat report 2014. Technical report http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf.
Chiacu D (2014) Homeland security struggles to tempt, retain cyber talent. In: Reuters, Apr 26, 2014 http://www.reuters.com/article/2014/04/26/us-usa-cybersecurity-dhs-idUSBREA3P05O20140426
Hennessey K, O’Brien C (2014) Cybersecurity guidelines for companies are unveiled by white house. In: Los Angeles Times, Feb. 12, 2014 http://articles.latimes.com/2014/feb/12/business/la-fi-cyber-security-20140213
Subrahmanian VS, Mannes A, Sliva A, Shakarian J, Dickerson J (2012) Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, Aug 2012, Springer, Switzerland
Subrahmanian VS, Mannes A, Roul A, Raghavan RK (2013) Indian Mujahideen: Computational Analysis and Public Policy, Springer, Nov 2013
Ovelgonne M, Dumitras T, Prakash BA, Subrahmanian VS, Wang B (2015) Understanding the Relationship between Human Behavior and Susceptibility to Cyber-Attacks: A Data-Drive Approach, submitted to a technical journal, Feb 2015. Currently being revised
Kang C, Park N, Prakash A, Serra E, Subrahmanian VS (2015) Ensemble Models for Data-Drive Prediction of Malware Infections, to appear in: Proc. 9th ACM International Conference on Web Science and Data Mining (WSDM), San Francisco, Feb 2016
Matsubara Y, Sakurai Y, van Panhuis WG, Faloutsos C (2014) FUNNEL: automatic mining of spatially coevolving epidemics. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining pp 105–114 ACM, Aug 2014
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Subrahmanian, V.S., Ovelgönne, M., Dumitras, T., Prakash, B.A. (2015). Introduction. In: The Global Cyber-Vulnerability Report. Terrorism, Security, and Computation. Springer, Cham. https://doi.org/10.1007/978-3-319-25760-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-25760-0_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25758-7
Online ISBN: 978-3-319-25760-0
eBook Packages: Computer ScienceComputer Science (R0)