Applying Generic AcciMap to a DDOS Attack on a Western-European Telecom Operator

Hans Wienen*, Faiza Allah Bukhsh, E. Vriezekolk, Roel J. Wieringa

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
58 Downloads (Pure)

Abstract

After a large incident on a telecommunications network, the operator typically executes an incident analysis to prevent future incidents. Research suggests that these analyses are done ad hoc, without a structured approach. In this paper, we conduct an investigation of a large incident according to the AcciMap method. We find that this method can be applied to telecommunications networks with a few small changes; we find that such a structured approach yields many more actionable recommendations than a more focused approach and we find that both the onset of an incident and the resolution phase merit their own analysis. We also find that such an analysis costs a lot of effort and we propose a more efficient approach to using this method. An unexpected outcome was that AcciMap may also be very useful for analyzing crisis organizations.
Original languageEnglish
Title of host publicationProceedings of the 16th ISCRAM Conference 2019
Pages528-535
Number of pages8
Publication statusPublished - May 2019
Event16th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2019 - Universitat Politècnica de València, Valencia, Spain
Duration: 19 May 201922 May 2019
Conference number: 16
https://iscram2019.webs.upv.es/

Conference

Conference16th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2019
Abbreviated titleISCRAM 2019
Country/TerritorySpain
CityValencia
Period19/05/1922/05/19
Internet address

Keywords

  • Telecommunications
  • AcciMap
  • Accident Analysis
  • Incident Analysis

Fingerprint

Dive into the research topics of 'Applying Generic AcciMap to a DDOS Attack on a Western-European Telecom Operator'. Together they form a unique fingerprint.

Cite this