Skip to main content

How the Public Views Strategies Designed to Reduce the Threat of Botnets

  • Conference paper
Trust and Trustworthy Computing (Trust 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6101))

Included in the following conference series:

Abstract

Botnets pose a growing threat to the nation’s critical digital infrastructure and general level of cybersecurity. Several strategies for reducing the threat of botnets have been outlined in the cyber security literature. These strategies typically call for both Internet Service Providers (ISPs) and home Internet users to adopt a greater share of the responsibility for overall security. However, to date no study has attempted to determine how accepting the public would be of these strategies. This study takes the first step in filling that gap. The results of this pilot survey suggest that, in general, individuals would be willing to spend additional time each month meeting security requirements set by their ISPs. The results also suggest that although only 50% of respondents would be willing to pay their ISP more per month to protect themselves from cyber threats, more people would be willing to do so if they perceived ISPs as being effective or very effective at reducing such threats. The findings provide important guidance for policy makers and ISPs seeking to gain support for such strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Homeland Security News Wire (HSNW): U.S. Cybercrime Losses Double (2010), http://homelandsecuritynewswire.com/us-cybercrime-losses-double (as obtained on April 7, 2010)

  2. U.S. Government Accountability Office. Report to Congressional Requestors. Cybercrime. Public and Private Entities Face Challenges in Addressing Cyber Threats. GAO-07-705 (2007), http://www.gao.gov/new.items/d07705.pdf (as obtained on April 12, 2010)

  3. The White House. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (2009), http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf (as obtained on April 12, 2010)

  4. Arbor Networks: 2009 Worldwide Infrastructure Security Report (2010), http://www.arbornetworks.com/report (as obtained on February 21, 2010)

  5. Swartz, J.: Cybersecurity CEO Keeps Watch Over Threat. USA Today, July 23, p. 6B (2007)

    Google Scholar 

  6. Anderson, R., Bohme, R., Clayton, R., Moore, T.: Analyzing Barriers and Incentives for Network and Information Security in the Internal Market for e-Communication (2008), http://www.enisa.europa.eu/act/sr/reports/econ-sec (as obtained on February 21, 2010)

  7. Lichtman, D., Posner, E.: Holding Internet Service Providers Accountable. University of Chicago John M. Olin Law and Economist Working Paper No. 217 (2006), http://www.law.uchicago.edu/files/files/217-dgl-eap-isp.pdf (as obtained on April 12, 2010)

  8. Baker, S., Shaun, W., Ivanov, G.: In the Crossfire: Critical Infrastructure in the Age of CyberWar (2010), http://csis.org/event/crossfire-critical-infrastructure-age-cyber-war (as obtained on February 21, 2010)

  9. Buskirk, E.: Denial-of-Service Attack Knocks Twitter Offline (2009), http://www.wired.com/epicenter/2009/08/twitter-apparently-down/ (as obtained on February 21, 2010)

  10. Swabey, P.: The New Cybercriminals (2010), http://www.growthbusiness.co.uk/channels/growth-strategies/technology-in-business/1147068/the-new-cybercriminals.thtml (as obtained on February 21, 2010)

  11. Symantec: Symantec Global Internet Security Threat Report: Trends for 2008 (2009), http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_Internet_security_threat_report_xiv_04-2009.en-us.pdf (as obtained on February 21, 2009)

  12. British Broadcasting Company (BBC): BBC Team Exposes Cyber Crime Risk, http://news.bbc.co.uk/2/hi/programmes/click_online/7932816.stm (as obtained on February 22, 2009) (last updated March 12, 2009)

  13. iDefense: Distributed Denial of Service and Botnet Attacks (2006), http://complianceandprivacy.com/WhitePapers/iDefense_DDoS_20060428.pdf (as obtained on February 21, 2010)

  14. Cranton, T.: Cracking Down on Botnets (2009), http://microsoftontheissues.com/cs/blogs/mscorp/archive/2010/02/24/cracking-down-on-botnets.aspx (as obtained on April 07, 2010)

  15. Wash, R.: Mental Models of Home Computer Security. Presented at the Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, July 23-25 (2008)

    Google Scholar 

  16. Beautement, A., Sasse, A.: The Economics of User Effort in Information Security. Computer Fraud & Security 2009(10), 8–12 (2009), http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VNT-4XMCXV1-8&_user=775537&_coverDate=10%2F31%2F2009&_rdoc=1&_fmt=high&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1292011789&_rerunOrigin=google&_acct=C000042938&_version=1&_urlVersion=0&_userid=775537&md5=d0b7627564e032d681962cdb844a7afb (as obtained April 12, 2010)

    Article  Google Scholar 

  17. Evers, J.: ISPs Versus the Zombies. Cnet News.com (July 19, 2005), http://news.cnet.com/ISPs-versus-the-zombies/2100-7349_3-5793719.html (as obtained on February 21, 2010)

  18. Huang, Y., Xianjun, G., Whinston, A.: Defeating DDoS Attacks by Fixing the Incentive Chain. ACM Transactions on Internet Technology article 5, 7(1), 1–5 (2007), http://portal.acm.org/citation.cfm?doid=1189740.1189745 (as obtained on April 30, 2009)

    Article  Google Scholar 

  19. Richards, J.: Make Firms Bear the Cost to Improve Information Security, says Schneier. Computer Weekly (May 22, 2007), http://www.computerweekly.com/Articles/2007/05/22/223959/make-firms-bear-the-cost-toimprove-information-security-says-schneier.htm (as obtained on February 21, 2010)

  20. Robinson, N., Potoglou, D., Woo Kim, C., Burge, P., Warnes, P.: Security, at What Cost? Quantifying People’s Trade-offs across Liberty, Privacy and Security (2010), http://www.rand.org/pubs/technical_reports/2010/RAND_TR664.pdf (as obtained on April 9, 2010)

  21. Marasculio, M., McSweeny, M.: Nonparametric and Distribution-Free Methods for the Social Sciences. Waldsworth Publishing Company, Belmont (1977)

    Google Scholar 

  22. National Cyber Security Alliance (NCSA) and Symantec. 2009 NCSA/Symantec Home User Study (2009), http://www.staysafeonline.org/files/pdfs/2009HomeUserStudy/Home%20User%20Study%20FINAL.pdf (as obtained on April 12, 2010)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rowe, B., Wood, D., Reeves, D. (2010). How the Public Views Strategies Designed to Reduce the Threat of Botnets. In: Acquisti, A., Smith, S.W., Sadeghi, AR. (eds) Trust and Trustworthy Computing. Trust 2010. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13869-0_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13868-3

  • Online ISBN: 978-3-642-13869-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics