Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

نویسندگان

  • Abhishta
  • Reinoud Joosten
  • Lambert J. M. Nieuwenhuis
چکیده

Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex problem. In this article we analyze the impact of 45 different DDoS attack announcements on victim firm’s stock prices using three different approaches and compare the results. We show that the assumption of cumulative abnormal returns being normally distributed leads to overestimation/underestimation of the impact. We solve this problem by using an empirical distribution of cumulative abnormal returns for hypothesis testing. Finally, we demonstrate the impact of DDoS attack announcements in each of the cases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Impact of Official Publication of Information in Tehran Stock Exchange on Shares Prices: A GMM Approach

Released information in stock markets plays an important role in making decisions by agents like brokers, investors and other market activists. Rational decision-making in these markets will be possible if relevant and significant information is being released on-time. Otherwise, transparency and equality in the market is compromised. This study aims to respond to the question of whether offici...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

Investigating the Effect of Oil Price Shocks on Stock and Gold Prices During Periods of Decline and Increase in Oil Prices

This paper presents a differentiated approach for assessing the effect of oil price changes on gold price and the stock index, during upward and downward movements, using the Markov Switching Bayesian VAR model to analyze data for Iran over the period 2009 to 2016.  We study the non-linear relationship between the price of oil and gold and the stock market index during periods of price decrease...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JoWUA

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2017