Maochao Xu’s research while affiliated with Illinois State University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (85)


Smart Home Cyber Insurance Pricing
  • Chapter

March 2025

·

5 Reads

·

1 Citation

Xiaoyu Zhang

·

Maochao Xu

·


A Framework for Digital Asset Risks with Insurance Applications
  • Preprint
  • File available

August 2024

·

107 Reads

The remarkable growth of digital assets, starting from the inception of Bitcoin in 2009 into a 1 trillion market in 2024, underscores the momentum behind disruptive technologies and the global appetite for digital assets. This paper develops a framework to enhance actuaries' understanding of the cyber risks associated with the developing digital asset ecosystem, as well as their measurement methods in the context of digital asset insurance. By integrating actuarial perspectives, we aim to enhance understanding and modeling of cyber risks at both the micro and systemic levels. The qualitative examination sheds light on blockchain technology and its associated risks, while our quantitative framework offers a rigorous approach to modeling cyber risks in digital asset insurance portfolios. This multifaceted approach serves three primary objectives: i) offer a clear and accessible education on the evolving digital asset ecosystem and the diverse spectrum of cyber risks it entails; ii) develop a scientifically rigorous framework for quantifying cyber risks in the digital asset ecosystem; iii) provide practical applications, including pricing strategies and tail risk management. Particularly, we develop frequency-severity models based on real loss data for pricing cyber risks in digit assets and utilize Monte Carlo simulation to estimate the tail risks, offering practical insights for risk management strategies. As digital assets continue to reshape finance, our work serves as a foundational step towards safeguarding the integrity and stability of this rapidly evolving landscape.

Download

Smart Home Cyber Insurance Pricing

August 2024

·

106 Reads

·

1 Citation

Our homes are increasingly employing various kinds of Internet of Things (IoT) devices, leading to the notion of smart homes. While this trend brings convenience to our daily life, it also introduces cyber risks. To mitigate such risks, the demand for smart home cyber insurance has been growing rapidly. However, there are no studies on analyzing the competency of smart home cyber insurance policies offered by cyber insurance vendors (i.e., insurers), where `competency' means the insurer is profitable and smart home owners are not overly charged with premiums and/or deductibles. In this paper, we propose a novel framework for pricing smart home cyber insurance, which can be adopted by insurers in practice. Our case studies show, among other things, that insurers are over charging smart home owners in terms of premiums and deductibles.


Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting

November 2023

·

60 Reads

·

9 Citations

Lecture Notes in Computer Science

·

Maochao Xu

·

Kristin M. Schweitzer

·

[...]

·

Cyber attacks are a major and routine threat to the modern society. This highlights the importance of forecasting (i.e., predicting) cyber attacks, just like weather forecasting in the real world. In this paper, we present a study on characterizing, modeling and forecasting the number of cyber attacks at an aggregate level by leveraging a high-quality, publicly-available dataset of cyber attacks against enterprise networks; the dataset is of high quality because more than 99% of the attacks were examined and confirmed by human analysts. We find that the attacks exhibit high volatilities and burstiness. These properties guide us to design statistical models to accurately forecast cyber attacksand draw useful insights.



Structural models for fog computing based internet of things architectures with insurance and risk management applications

July 2022

·

21 Reads

·

14 Citations

European Journal of Operational Research

Cybersecurity risk modeling and pricing are becoming a spotlight in actuarial science and operational research. This paper pertains to the analysis of the cybersecurity risks involved in the fog computing technology which has been intensively deployed in assorted Internet of Things (IoT) applications. To this end, a class of structural models are established to study the inherent cyber risk propagation process. Under the smart home applications, we manage to compute the compromise probabilities of individual nodes explicitly. Applications of the proposed structural models in the context of cyber insurance pricing are thoroughly explored. Finally, we propose an interval method for estimating the compromise probabilities of fog network’s elements, which can be used to efficiently identify weak nodes for cybersecurity risk management.


Determination of Ransomware Payment based on Bayesian Game Models

March 2022

·

39 Reads

·

6 Citations

Computers & Security

Ransomware has emerged as one of the most concerned cyber risks in recent years, which has caused millions of dollars monetary loss over the world. It typically demands a certain amount of ransom payment within a limited timeframe to decrypt the encrypted victim’s files. This paper explores whether the ransomware should be paid in a novel game-theoretic model from the perspective of Bayesian game. In particular, the new model analyzes the ransom payment strategies within the framework of incomplete information for both hacker and victim. Our results show that there exist pure and randomized Bayesian Nash equilibria under some mild conditions for the hacker and victim. The sufficient conditions that when the ransom should be paid are presented when an organization is compromised by the ransomware attack. We further study how the costs and probabilities of cracking or recovering affect the expected payoffs of the hacker and the victim in the equilibria. In particular, it is found that the backup option for computer files is not always beneficial, which actually depends on the related cost. Moreover, it is discovered that fake ransomware may be more than expected because of the potential high payoffs. Numerical examples are also presented for illustration.


Ensuring confidentiality and availability of sensitive data over a network system under cyber threats

October 2021

·

73 Reads

·

14 Citations

Reliability Engineering & System Safety

The online storage of sensitive data enjoys many benefits such as flexibility, cost-savings, scalability, and convenience but it also poses a big concern on the data confidentiality and availability. To ensure the confidentiality and availability of sensitive data over a network system, the data partition technique is often employed. We study the optimal data partition strategy over an arbitrary network under cyber threats. Both the outside attack and the risk propagation (i.e., inside attack) are considered for the data partition. The data breach probability and retrieve probability are discussed under both limited and unlimited risk propagation for various scenarios. It is discovered that the risk propagation can have much more impact on the optimal partition strategy than that of outside attacks, and the unlimited risk propagation leads to more severer cyber risk. The network topology significantly impacts the partition strategy which hints that the network topology should never be overlooked in practice. The corruption due to compromise can lead to different partition strategies. An optimal partition model is developed for determining the optimal strategy and the pareto non-dominated solutions are recommended for practical use.


Multivariate Dependence among Cyber Risks based on L-hop Propagation

September 2021

·

30 Reads

·

13 Citations

Insurance Mathematics and Economics

Dependence among cyber risks has been an essential and challenging component of risk management. The current study characterizes cyber dependence from both qualitative and quantitative perspectives based on L-hop propagation model. From the qualitative side, it is shown that cyber risks always possess positive association based on the proposed risk propagation model. From the quantitative side, an explicit formula for computing the fundamental dependence measure of covariance is provided for an arbitrary network. In particular, we study the impacts of factors—especially external and internal compromise probabilities, propagation depth, and network topologies—on dependence among cyber risks. We conclude by presenting some examples and applications.


Modeling multivariate cyber risks: deep learning dating extreme value theory

June 2021

·

43 Reads

·

11 Citations

Modeling cyber risks has been an important but challenging task in the domain of cyber security, which is mainly caused by the high dimensionality and heavy tails of risk patterns. Those obstacles have hindered the development of statistical modeling of the multivariate cyber risks. In this work, we propose a novel approach for modeling the multivariate cyber risks which relies on the deep learning and extreme value theory. The proposed model not only enjoys the high accurate point predictions via deep learning but also can provide the satisfactory high quantile predictions via extreme value theory. Both the simulation and empirical studies show that the proposed approach can model the multivariate cyber risks very well and provide satisfactory prediction performances.


Citations (65)


... On the other hand, home insurance premiums are evolving with technological advancements and demographic changes. The rise of smart home technology has led to concerns about the potential overpricing of cyber insurance for homeowners (Zhang et al., 2024). Moreover, longevity and housing risk management in retirement underscore the necessity of home insurance in financial planning for long-term security (Michaud & St-Amour, 2023). ...

Reference:

Unraveling the Retirement Spending Habits in Siquijor, Philippines: Promoting Support Policies for Retirees
Smart Home Cyber Insurance Pricing

... It is important to build metrics to quantify the impact of IDS (in)correctness on the trustworthiness of the results, in a fashion similar to [7]. In particular, it would be exciting to establish a systematic quantitative methodology that can be seamlessly incorporated into the Cybersecurity Dynamics framework [66,62] to enable not only reactive defenses but more importantly proactive and adaptive defenses [32,63,65,61,64,23,72,73,33,24], by possibly leveraging data-driven cyber threats forecasting techniques [53,15,45,60,44,59,69,68]. ...

Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting
  • Citing Chapter
  • November 2023

Lecture Notes in Computer Science

... For example, Sun et al. (2021) developed a frequency-severity actuarial model for aggregated enterprise-level breach data to inform ratemaking and underwriting in insurance. Similarly, Sun et al. (2023) discussed a multivariate frequency-severity framework for healthcare data breaches, utilizing a vine copula approach to model dependence among the number of affected individuals at the state level. For a recent review of cyber risk modeling in insurance and actuarial science, please refer to He et al. (2024). ...

A multivariate frequency-severity framework for healthcare data breaches
  • Citing Article
  • March 2023

The Annals of Applied Statistics

... Additionally, the approach highlights that, if implemented on a large scale, it could create new business opportunities for the insurance market. Zhang et al. [94] investigate cyber insurance pricing in IoT applications, with a particular focus on smart home systems. The study reveals that the probability of compromise of network nodes influences the values of insurance premiums. ...

Structural models for fog computing based internet of things architectures with insurance and risk management applications
  • Citing Article
  • July 2022

European Journal of Operational Research

... [48,98,173] examined how organizations could be motivated to combat ransomware attacks, but did not suggest efective countermeasures against data exiltration. Other studies in this category ( [44,49,64,65,71,86,102,107,191,226,228,232]) all focused on the socioeconomic efects of crypto-ransomware encryption, making them less relevant to more recent ransomware performing data exiltration. ...

Determination of Ransomware Payment based on Bayesian Game Models
  • Citing Article
  • March 2022

Computers & Security

... To quantify the cyber contagion on the network structure, as a special case of bond percolation contagion model, [29][30][31] proposed one-hop and multi-hop risk contagion models to capture the depth of risk contagion. [29] proposed L-hop percolation on networks by considering that a node can be deleted (or failed) because it is chosen or because it is within some L-hop distance of a chosen node. ...

Multivariate Dependence among Cyber Risks based on L-hop Propagation
  • Citing Article
  • September 2021

Insurance Mathematics and Economics

... DL (one of the ML methods) and extreme value theory have been applied in modeling and predicting multivariate cyber risks [6]. Automatic diagnosis of COVID-19-associated pneumonia was studied based on chest X-ray (CXR) and computed tomography (CT) scan images. ...

Modeling multivariate cyber risks: deep learning dating extreme value theory
  • Citing Article
  • June 2021

... These elements are essential for managing and reducing risks to an acceptable level, ensuring the organization's information security aligns with its risk management objectives. The literature highlights the challenges of current ISRM standards, which often rely on static principles that may not adequately address the dynamic nature of modern cyber threats [5,7,15]. Experts recommend adopting a more dynamic and emergent approach to risk management, integrating both technical and social aspects to effectively manage cyber threats [16]. ...

Ensuring confidentiality and availability of sensitive data over a network system under cyber threats
  • Citing Article
  • October 2021

Reliability Engineering & System Safety

... First, it is important to study the evolution of PFs exploited by malicious websites (e.g., [48,46,47,62,63]), online social networks, and other kinds of attacks. Second, it is important to study mathematical, statistical, and machine learning models to forecast the evolution of PFs, as well as PTechs and PTacs, in a fashion similar to [54,14,55,13,44,65,45,64,74,73]. The resulting forecasting capability would allow us to design adaptive and proactive defense mechanisms (e.g., leveraging the anticipated exploitation of PFs, PTechs, and PTacs by attackers). ...

Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study

ICST Transactions on Security and Safety

... As a result, investor confidence in such companies declines, the share price and hence the market value of the company falls, and share price volatility increases. There is usually a negative market reaction immediately after the attack [19]; the markets do not wait for the effects of such attacks to be determined. These are all negative phenomena. ...

Data Breach CAT Bonds: Modeling and Pricing
  • Citing Article
  • May 2021

North American Actuarial Journal