Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments

Published: 12 April 2023 Publication History

Abstract

Malware is still a widespread problem, and it is used by malicious actors to routinely compromise the security of computer systems. Consumers typically rely on a single AV product to detect and block possible malware infections, while corporations often install multiple security products, activate several layers of defenses, and establish security policies among employees. However, if a better security posture should lower the risk of malware infections, then the actual extent to which this happens is still under debate by risk analysis experts. Moreover, the difference in risks encountered by consumers and enterprises has never been empirically studied by using real-world data.
In fact, the mere use of third-party software, network services, and the interconnected nature of our society necessarily exposes both classes of users to undiversifiable risks: Independently from how careful users are and how well they manage their cyber hygiene, a portion of that risk would simply exist because of the fact of using a computer, sharing the same networks, and running the same software.
In this work, we shed light on both systemic (i.e., diversifiable and dependent on the security posture) and systematic (i.e., undiversifiable and independent of the cyber hygiene) risk classes. Leveraging the telemetry data of a popular security company, we compare, in the first part of our study, the effects that different security measures have on malware encounter risks in consumer and enterprise environments. In the second part, we conduct exploratory research on systematic risk, investigate the quality of nine different indicators we were able to extract from our telemetry, and provide, for the first time, quantitative indicators of their predictive power.
Our results show that even if consumers have a slightly lower encounter rate than enterprises (9.8% vs. 12.0%), the latter do considerably better when selecting machines with an increasingly higher uptime (89% vs. 53%). The two segments also diverge when we separately consider the presence of Adware and Potentially Unwanted Applications (PUA) and the generic samples detected through behavioral signatures: While consumers have an encounter rate for Adware and PUA that is 6 times higher than enterprise machines, those on average match behavioral signatures 2 times more frequently than the counterpart. We find, instead, similar trends when analyzing the age of encountered signatures, and the prevalence of different classes of traditional malware (such as Ransomware and Cryptominers). Finally, our findings show that the amount of time a host is active, the volume of files generated on the machine, the number and reputation of vendors of the installed applications, the host geographical location, and its recurrent infected state carry useful information as indicators of systematic risk of malware encounters. Activity days and hours have a higher influence in the risk of consumers, increasing the odds of encountering malware of 4.51 and 2.65 times. In addition, we measure that the volume of files generated on the host represents a reliable indicator, especially when considering Adware. We further report that the likelihood of encountering Worms and Adware is much higher (on average 8 times in consumers and enterprises) for those machines that already reported this kind of signature in the past.

A Combining Consumer and Enterprise Machines into A Single GLM

Table A.1 reports the odds ratios obtained by combining the two sets of machines (consumers and enterprises) with an added regressor (machine_type: 0 = consumer, 1 = enterprise) in addition to the seven already considered (active days and hours, file-request volume, reputation and number of installed vendors, geographical location, and whether or not malware has already been detected on the machine the month before).
Table A.1.
Host AttributeBin CategoryMalware familyMonthly Odds
\(\mu\) \(\sigma\)
Activity Days Ref: [0–4]4–8Any2.040.17
8–12Any2.680.40
12–16Any3.140.59
16–20Any3.630.84
20–24Any3.820.98
24–28Any3.961.10
28+Any3.971.18
Activity Hours Ref: [0–3]3–6Any1.310.09
6–9Any1.500.30
12–15Any1.090.40
15–18Any1.140.31
18–21Any1.290.39
21+Any1.890.79
18–21Adware1.581.22
21+Adware3.062.06
File-volume Activity Ref: [0–1K]1K–2KAny1.000.07
3K–4KAny1.630.32
5K–10KAny2.130.50
10K–50KAny2.980.93
50K+Any4.050.80
10K–50KAdware9.523.72
50K+Adware13.414,24
Vendors Ref: [0–20]20–40Any1.020.04
40–60Any1.130.07
60+Any1.410.08
60+Adware1.400.31
60+PUP1.600.09
Reputable vendors only Ref: NoYesAny1.000.04
YesPUP0.970.05
YesVirus0.630.03
Repeat player Ref: NoYesAny1.880.84
YesAdware8.803.24
YesVirus2.460.94
YesWorm10.132.13
Geographical location Ref: NAAFVirus13.422.07
ASVirus4.810.55
AFWorm20.522.35
ASWorm5.610.20
OCPUP0.860.17
OCTrojan1.020.09
Table A.1. Odds Ratios of Encountering Malware According to Our Regression Models

Acknowledgment

We would like to thank all the anonymous reviewers for their constructive feedback.

References

[1]
Leyla Bilge, Yufei Han, and Matteo Dell’Amico. 2017. RiskTeller: Predicting the risk of cyber incidents. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 1299–1311.
[2]
Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. 2011. Measuring pay-per-install: The commoditization of malware distribution. In Proceedings of the USENIX Security Symposium. The Advanced Computing Systems Association.
[3]
A. Colin Cameron and Pravin K. Trivedi. 2013. Regression Analysis of Count Data, Vol. 53. Cambridge University Press.
[4]
Davide Canali, Leyla Bilge, and Davide Balzarotti. 2014. On the effectiveness of risk prediction based on users browsing behavior. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. 171–182.
[5]
Cisco. 2019. Cisco Annual Cybersecurity Report. Retrieved from https://www.cisco.com/c/dam/m/hu_hu/campaigns/security-hub/pdf/acr-2018.pdf.
[6]
John Cloonan. 2017. Advanced Malware Detection—Signatures vs. Behavior Analysis. Retrieved from https://www.infosecurity-magazine.com/opinions/malware-detection-signatures/.
[7]
Shaen Corbet and Constantin Gurdgiev. 2019. What the hack: Systematic risk contagion from cyber events. Int. Rev. Finan. Anal. 65 (2019), 101386.
[8]
Cyber Insurance and Systemic Market Risk 2018. Cyber Insurance and Systemic Market Risk. Retrieved from https:// www.eastwest.ngo/sites/default/files/ideas-files/cyber-insurance-and-systemic-market-risk.pdf.
[9]
Savino Dambra, Leyla Bilge, and Davide Balzarotti. 2020. SoK: Cyber insurance–technical challenges and a system security roadmap. In Proceedings of the IEEE Symposium on Security and Privacy (SP). 293–309.
[10]
Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge, and Davide Balzarotti. 2022. When Sally met trackers: Web tracking from the users’ perspective. In Proceedings of the 31st USENIX Security Symposium (USENIX Security’22). 2189–2206.
[11]
Is Cyber Risk Systemic? 2017. Is Cyber Risk Systemic? Retrieved from https://www.aig.ie/latest-insights/is-cyber-risk-systemic.
[12]
ISO 3166-1 1997. ISO 3166-1. Retrieved from https://en.wikipedia.org/wiki/ISO_3166-1.
[13]
Kaspersky. 2018. Kaspersky Security Bulletin 2018. Threat Predictions for 2019. Retrieved from https://bit.ly/2Wq5eIw.
[14]
Diana Kelley. 2019. Microsoft Security Intelligence Report. Retrieved from https://www.microsoft.com/security/blog/2019/02/28/microsoft-security-intelligence-report-volume-24-is-now-available.
[15]
Platon Kotzias, Leyla Bilge, and Juan Caballero. 2016. Measuring PUP prevalence and PUP distribution through pay-per-install services. In Proceedings of the 25th USENIX Security Symposium. 739–756.
[16]
Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, and Juan Caballero. 2019. Mind your own business: A longitudinal study of threats and vulnerabilities in enterprises. In Proceedings of the Network And Distributed System Security Symposium (NDSS). 739–756.
[17]
McAfee Labs. 2018. McAfee Labs Threats Report. Retrieved from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-dec-2018.pdf.
[18]
MalwareBytes labs. 2019. 2019 State of Malware. Retrieved from https://resources.malwarebytes.com/files/2019/01/Malwarebytes-Labs-2019-State-of-Malware-Report-2.pdf.
[19]
Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, and Manos Antonakakis. 2017. A lustrum of malware network communication: Evolution and insights. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society.
[20]
Fanny Lalonde Lévesque, José M. Fernandez, and Anil Somayaji. 2014. Risk prediction of malware victimization based on user behavior. In Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE). IEEE, 128–134.
[21]
Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Naghizadeh, Manish Karir, Michael Bailey, and Mingyan Liu. 2015. Cloudy with a chance of breach: Forecasting cyber security incidents. In Proceedings of the 24th USENIX Security Symposium. 1009–1024.
[22]
Yang Liu, Jing Zhang, Armin Sarabi, Mingyan Liu, Manish Karir, and Michael Bailey. 2015. Predicting cyber security incidents using feature-based characterization of network-level malicious activities. In Proceedings of the ACM International Workshop on International Workshop on Security and Privacy Analytics. 3–9.
[23]
Matplotlib. 2022. Visualization with Python. Retrieved from https://matplotlib.org/.
[24]
Ghita Mezzour, Kathleen M. Carley, and L. Richard Carley. 2015. An empirical study of global malware encounters. In Proceedings of the Symposium and Bootcamp on the Science of Security. 1–11.
[25]
Ghita Mezzour, L. Carley, and Kathleen M. Carley. 2014. Global mapping of cyber attacks. Retrieved from SSRN 2729302 (2014).
[26]
Carina Mood. 2010. Logistic regression: Why we cannot do what we think we can do, and what we can do about it. Eur. Sociol. Rev. 26, 1 (2010), 67–82.
[27]
Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, and Henry M. Levy. 2006. A crawler-based study of spyware in the web. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
[28]
Numpy. 2022. The fundamental package for scientific computing with Python. Retrieved from https://numpy.org/.
[29]
Pandas. 2022. Python data analysis library. Retrieved from https://pandas.pydata.org/.
[30]
PurpleSec. 2019. The Ultimate List of Cyber Security Statistics for 2019. Retrieved from https://purplesec.us/resources/cyber-security-statistics/.
[31]
Quantifying Systemic Cyber Risk 2018. Quantifying Systemic Cyber Risk. Retrieved from http://web.stanford.edu/csimoiu/doc/Global_CRQ_Network_Report.pdf.
[32]
Sasha Romanosky, Lilian Ablon, Andreas Kuehn, and Therese Jones. 2017. Content analysis of cyber insurance policies: How do carriers write policies and price cyber risk? Retrieved from SSRN 2929137 (2017).
[33]
Armin Sarabi, Parinaz Naghizadeh, Yang Liu, and Mingyan Liu. 2015. Prioritizing security spending: A quantitative analysis of risk distributions for different business profiles. In Proceedings of the Workshop on the Economics of Information Security.
[34]
Scikit-learn. 2022. Machine Learning in Python. Retrieved from https://scikit-learn.org/stable/.
[35]
Mahmood Sharif, Jumpei Urakawa, Nicolas Christin, Ayumu Kubota, and Akira Yamada. 2018. Predicting impending exposure to malicious content from user behavior. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1487–1501.
[36]
StatCounter. 2022. Desktop Operating System Market Share Worldwide. Retrieved from https://gs.statcounter.com/os-market-share/desktop/worldwide.
[37]
Susan Moore and Emma Keen. 2018. Gartner Forecasts Worldwide Information Security Spending to Exceed $124 Billion in 2019. Retrieved from https://gtnr.it/2zQUueM.
[38]
Symantec. 2019. Internet Security Threat Report. Retrieved from https://docs.broadcom.com/doc/istr-24-executive-summary-en.
[39]
Olivier Thonnard, Leyla Bilge, Anand Kashyap, and Martin Lee. 2015. Are you at risk? Profiling organizations and individuals subject to targeted attacks. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 13–31.
[40]
OMERS Ventures. 2019. Cybersecurity: Industry Overview, Market Map, Global Investments. Retrieved from https:// bit.ly/2L52hbn.
[41]
W3techs. 2022. Usage statistics of operating systems for websites. Retrieved from https://w3techs.com/technologies/overview/operating_system.
[42]
Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, and Ari Juels. 2014. An epidemiological study of malware encounters in a large enterprise. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1117–1130.

Cited By

View all
  • (2024)A Case-Control Study to Measure Behavioral Risks of Malware Encounters in OrganizationsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.345696019(9419-9432)Online publication date: 1-Jan-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Privacy and Security
ACM Transactions on Privacy and Security  Volume 26, Issue 2
May 2023
335 pages
ISSN:2471-2566
EISSN:2471-2574
DOI:10.1145/3572849
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 April 2023
Online AM: 03 October 2022
Accepted: 26 September 2022
Revised: 08 August 2022
Received: 09 August 2021
Published in TOPS Volume 26, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Systemic risk
  2. systematic risk
  3. cyber-risk assessment
  4. consumer malware
  5. enterprise malware

Qualifiers

  • Research-article

Funding Sources

  • European Research Council (ERC)
  • European Unions Horizon 2020 research and innovation programme

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)95
  • Downloads (Last 6 weeks)7
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Case-Control Study to Measure Behavioral Risks of Malware Encounters in OrganizationsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.345696019(9419-9432)Online publication date: 1-Jan-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media