Abhishta Abhishta

Abhishta Abhishta
University of Twente | UT · Department of Industrial Engineering and Business Information Systems (IEBIS)

Doctor of Philosophy

About

20
Publications
7,662
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
172
Citations
Citations since 2016
20 Research Items
172 Citations
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
Introduction
I am an assistant professor of finance and cyber risk management at University of Twente. I am a member of hightech business and entrepreneurship (HBE) department at the faculty of behavioural management and social sciences (BMS). My research interests include applied finance, security economics and network security. I am interested in empirically measuring the economic impact of cyber attacks on public and private organisations.
Additional affiliations
July 2019 - present
University of Twente
Position
  • Professor (Assistant)
Education
June 2015 - December 2019
University of Twente
Field of study
  • Security Economics
May 2014 - May 2015
Thapar University
Field of study
  • Business Administration
May 2010 - May 2014
Thapar University
Field of study
  • Industrial Engineering

Publications

Publications (20)
Article
Full-text available
Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat to the availability of Internet services. The Domain Name System (DNS) is part of the core of the Internet and a crucial factor in the successful delivery of Internet services. Because of the importance of DNS, specialist service providers have sprung up in the market, t...
Article
Full-text available
Reliable availability to the internet and internet-based services is crucial in today's world. DDoS attacks pose a severe threat to the availability of such online resources-especially owing to booters-virtually everyone can execute them nowadays. In order to appropriately protect oneself against such attacks, it is essential to have a good insight...
Article
Full-text available
The use of neuroscience tools to study consumer behavior and the decision making process in marketing has improved our understanding of cognitive, neuronal, and emotional mechanisms related to marketing-relevant behavior. However, knowledge about neuroscience tools that are used in consumer neuroscience research is scattered. In this article, we pr...
Article
Full-text available
Industry 4.0 refers to the digital transformation in the manufacturing domain through new technology. Currently, it expands well beyond manufacturing, affecting many areas of life and posing implications for all types of business. This paper focuses on the relationships between Industry 4.0 and Healthcare which transitions to increased interconnect...
Poster
Full-text available
Ransomware may lead to massive economic damage to victims [13]. However, it is still unclear how attackers determine the amount of ransom. In this poster we empirically study the ransom requested by attackers in ransomware attacks. We analysed 371 ransomware attacks reported to the Dutch Police between 2019 and 2021. Our results indicate that attac...
Preprint
Full-text available
We leverage large-scale DNS measurement data on authoritative name servers to study the reactions of domain owners affected by the 2016 DDoS attack on Dyn. We use industry sources of information about domain names to study the influence of factors such as industry sector and website popularity on the willingness of domain managers to invest in high...
Technical Report
Full-text available
In dit specialistische onderzoek is gezocht naar het bestaan van online misdaadketens ofwel ‘crime chains’. Misdaadketens zijn omschreven als reeksen van verschillende type delicten die samen of in een bepaalde volgorde voorkomen en met elkaar verband houden om een gecoördineerde reeks acties uit te voeren. De huidige studie onderzoekt of er een st...
Preprint
Full-text available
We design a procedure (the complete Python code may be obtained at: https://github.com/abhishta91/antibody_montecarlo) using Monte Carlo (MC) simulation to establish the point estimators described below and confidence intervals for the base rate of occurrence of an attribute (e.g., antibodies against Covid-19) in an aggregate population (e.g., medi...
Chapter
Full-text available
Distributed denial of service (DDoS) attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack...
Thesis
Full-text available
Internet has become an important part of our everyday life. We use services like Netflix, Skype, online banking and Scopus etc. daily. We even use Internet for filing our tax returns and communicating with municipalities. This dependency on network-based technologies provides an opportunity to malicious actors in our society to remotely attack IT i...
Poster
Full-text available
Distributed Denial of Service (DDoS) attacks may lead to massive economic damages to victims. In most cases, the damage caused is dictated by the circumstances surrounding the attack (i.e. context). One of the ways of collecting information on the context of an attack can be by using the online articles written about the attack. In this poster, we...
Conference Paper
Full-text available
Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat to the availability of Internet services. The Domain Name System (DNS) is part of the core of the Internet and a crucial factor in the successful delivery of Internet services. Because of the importance of DNS, specialist service providers have sprung up in the market, t...
Preprint
Full-text available
Botnets continue to be an active threat against firms or companies and individuals worldwide. Previous research regarding botnets has unveiled information on how the system and their stakeholders operate, but an insight on the economic structure that supports these stakeholders is lacking. The objective of this research is to analyse the business m...
Article
Full-text available
Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex problem. In this article we analyze the impact of 45 d...
Conference Paper
Full-text available
DDoS attacks are increasingly used by `hackers' and `hacktivists' for various purposes. A number of on-line tools are available to launch an attack of significant intensity. These attacks lead to a variety of losses at the victim's end. We analyse the impact of Distributed Denial-of-Service (DDoS) attack announcements over a period of 5 years on th...

Network

Cited By

Projects