Skip to main content

Reinterpreting the Disclosure Debate for Web Infections

  • Chapter
  • First Online:
Managing Information Risk and the Economics of Security

Abstract

Internet end users increasingly face threats of compromise by visiting seemingly innocuous websites that are themselves compromised by malicious actors. These compromised machines are then incorporated into bot networks that perpetuate further attacks on the Internet. Google attempts to protect users of its search products from these hidden threats by publicly disclosing these infections in interstitial warning pages behind the results. This chapter seeks to explore the effects of this policy on the economic ecosystem of webmasters, web hosts, and attackers by analyzing the experiences and data of the StopBadware project. The StopBadware project manages the appeals process whereby websites whose infections have been disclosed by Google get fixed and unquarantined. Our results show that, in the absence of disclosure and quarantine, certain classes of webmasters and hosting providers are not incentivized to secure their platforms and websites and that the malware industry is sophisticated and adapts to this reality. A delayed disclosure policy may be appropriate for traditional software products. However, in the web infection space, silence during this period leads to further infection since the attack is already in progress. We relate specific examples where disclosure has had beneficial effects, and further support this conclusion by comparing infection rates in the U.S. where Google has high penetration to China where its market penetration rate is much lower.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Google does attempt to contact webmasters when their sites are initially added to Google’s blacklist, but there is no reliable system to ensure that webmasters receive these communications.

  2. 2.

    Some have cited the increased investment in fraud-prevention technology resulting from placing the burden of liability for ATM fraud on banks, rather than on account holders, as an example of how civil liability could be used to promote greater investment in Internet security (Anderson 2001).

References

  • Akerlof, G. A. “The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism,” The Quarterly Journal of Economics (84:3), 1970, pp. 488–500.

    Article  Google Scholar 

  • Anderson, R. “Why Information Security is Hard—An Economic Perspective,” in 17th Annual Computer Security Applications Conference (ACSAC), 2001.

    Google Scholar 

  • Anderson, R. “Open and Closed Systems are Equivalent (That Is, in an Ideal World),” in Perspectives on Free and Open Source Software, The MIT Press, 2005, pp. 127-142.

    Google Scholar 

  • Arora, A., Krishnan, R., Nandkumar, A., Telang, R., and Yang, Y. “Impact of Vulnerability Disclosureand Patch Availability: An Empirical Analysis,” in Workshop on Economics and Information Security, 2004.

    Google Scholar 

  • Arora, A., Telang, R., and Xu, H. “Optimal Policy for Software Vulnerability Disclosure,” in Workshop on Economics and Information Security, 2004.

    Google Scholar 

  • Camp, L. J., and Wolfram, C. D. “Pricing Security: Vulnerabilities as Externalities.” Economics of Information Security (12), 2004.

    Google Scholar 

  • Cavusoglu, H., Cavusoglu, H., and Zhang, J. “Economics of Security Patch Management,” in Workshop on Economics and Information Security, 2006.

    Google Scholar 

  • Choi, J.-P., Ferstman, C., and Gandal, N. “Network Security: Vulnerabilities and DisclosurePolicy,” in Workshop on Economics and Information Security, 2007.

    Google Scholar 

  • Fallows, J. “The Connection Has Been Reset,” The Atlantic Monthly. http://www.theatlantic.com/doc/200803/chinese-firewall, 2008.

  • Finjan. 2007. “Finjan Web Security Trends Report q2-2007.” http://www.finjan.com.

  • Geer, D., Bace, R., Gutmann, P., Metzger, P., Pfleeger, C. P., Quarterman, J. S., and Schneier, B. “Cyberinsecurity: The Cost of Monopology.” Computer and Communications Industry Association (CCIA), 2003.

    Google Scholar 

  • Granick, J. S. “The Price of Restricting Vulnerability Publications,” International Journal of Communications Law and Policy (9), 2005.

    Google Scholar 

  • OMurchu, L. “Honor among Thieves?” http://www.symantec.com/enterprise/security_response/ weblog/%2007/11/honour_among_thieves.html. Symantec, 2007

  • Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N. “The Ghost in the Browser Analysis of Web-based Malware,” in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets (HotBots’07), 4–4. USENIX Association, 2007.

    Google Scholar 

  • Rescorla, E. “Is Finding Security Holes a Good Idea?” IEEE Security and Privacy (3:1), 2005, pp. 14–19.

    Article  Google Scholar 

  • Schechter, S. E. “How to Buy Better Testing: Using Competition to Get the Most Security and Robustness for Your Dollar,” in Infrastructure Security Conference, 2002.

    Google Scholar 

  • StopBadware. http://www.stopbadware.org. Berkman Center for Internet and Society, 2008.

  • StopBadware. “Stopbadware.org Identifies Companies Hosting Large Numbers of Websites that Can Infect Internet Users with Badware.” http://www.stopbadware.org/home/pr 050307, 2007.

  • Swire, P.P. “Security Market: Incentives for Disclosureof Vulnerabilities,” in Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS ’05), 2005, pp. 405–405.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Day, O., Palmen, B., Greenstadt, R. (2009). Reinterpreting the Disclosure Debate for Web Infections. In: Johnson, M.E. (eds) Managing Information Risk and the Economics of Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09762-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-09762-6_9

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09761-9

  • Online ISBN: 978-0-387-09762-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics