A Metric to Assess Cyberattacks

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 782)


The field of cybersecurity has grown exponentially in the past few years with the level of cyberattacks and defenses that have had a major impact on government, industry, and personal behavior. However, analysis of such attacks has tended to be more qualitative than quantitative, undoubtedly because the latter is often extremely difficult. This paper will present a metric for the analysis of certain types of cyberattacks and present examples where it can be calculated with considerable precision.


Cybersecurity Metric Public-key cryptosystems RSA Attack/defense scenario Behavioral cybersecurity Human factors in cybersecurity 


  1. 1.
    Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–32 (1987)CrossRefGoogle Scholar
  2. 2.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). Scholar
  3. 3.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Patterson, W.: Lecture Notes for CSCI 654: Cybersecurity I. Howard University, September 2016Google Scholar
  5. 5.
    Pomerance, C.: A tale of two sieves. Not. AMS 43(12), 1473–1485 (1996)MathSciNetzbMATHGoogle Scholar
  6. 6.
    Wolfram Corporation: Wolfram Mathematica 11.0: Some Notes on Internal Implementation, Champaign-Urbana, IL (2014)Google Scholar
  7. 7.
    Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Howard UniversityWashington, DCUSA
  2. 2.University of BueaBueaCameroon

Personalised recommendations