This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded-thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components. © IFIP International Federation for Information Processing 2009.
CITATION STYLE
Baiardi, F., Telmon, C., & Sgandurra, D. (2009). Modeling and managing risk in billing infrastructures. In IFIP Advances in Information and Communication Technology (Vol. 311, pp. 51–64). https://doi.org/10.1007/978-3-642-04798-5_4
Mendeley helps you to discover research relevant for your work.