Submitted:
20 November 2025
Posted:
21 November 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Related Work
- Modeling Breach Likelihood. Count models like Poisson and negative binomial regressions were used in early statistical attempts to predict breach incidents.
- The cost of cyber-insurance. While Xu et al. (2023) proposed stochastic frequency– severity models, Biener et al. (2019) used Bayesian credibility theory to predict cyber premiums in groundbreaking actuarial investigations.
- Risk learning across several tasks. In fields where associated tasks profit from shared representations, such as credit scoring, medical diagnosis, and portfolio risk prediction, multitask learning (MTL) has shown promise. Wu et al. (2022) demonstrated that MTL simultaneously enhances loss given default and default prediction.
- Robust and Explainable Cyber-ML. Corporate boards and regulatory agencies require resilience and openness.
3. Proposed Methodology
3.1. Problem Formalism
3.2. Neural Architecture
3.3. Training Protocol
3.4. Explainability Layer
3.5. Robustness Against Adversarial Manipulation
4. Experimental Setup
- AUROC and AUPRC measure probability discrimination.
- Normalized MAE (nMAE) and RMSE quantify severity accuracy.
- MAPE and Median Absolute Error (MedAE) assess TTB predictions.
4.1. Economic Impact ΔΠ Approximates Underwriting Profit Changes
4.2. Cross-Validation and Statistical Significance
4.3. Computation Environment
4.4. Economic Simulation
5. Results & Discussion
5.1. Predictive Performance
5.2. Ablation Studies
5.3. Interpretability
5.4. Economic Impact
|
Model AUROC nMAE (Severity) MAPE (TTB, %) ECE (Calib.) TriRisk 0.892 0.208 15.2 0.021 (MTL) CatBoost 0.818 0.28493150684931506 22.02898550724638 (SOTA baseline) |
|
Change Effect Remove shared-bottom AUROC -4 pts vs. full (independent heads) model Static loss weights (no Severity nMAE +6% uncertaintybased) (worse) Replace Huber with MSE Greater sensitivity to for severity outliers (qualitative) |
|
Model PGD ε=0.02 AUROC TriRisk (MTL) 0.867 CatBoost (SOTA baseline) 0.812 |
|
Scenario Combined Profit 95% Ratio Δ (pts) Uplift CI (pts) (USD M) 100% 3.1 15.3 2.4– underwriter 3.8 adoption 50% 8.7 underwriter adoption |
6. Conclusions
7. Future Work
References
- Verizon. “2024 Data Breach Investigations Report.” Verizon Enterprise Solutions, 2024.
- IBM Security. “Cost of a Data Breach Report 2024.” IBM Corporation, 2024.
- M. Kumar, A. Sharma, and R. Singh, “Machine Learning Framework for Property Insurance Risk Assessment,” in Proc. IEEE Int’l Conf. on Big Data, 2023, pp. 1234-1243.
- C. Sabottke, O. Suciu, and T. Dumitras, “Vulnerability Forecasting in the Wild,” in Proc. 24th USENIX Security Symposium, 2015, pp. 1-15.
- L. Biener, M. Eling, and J. Wirfs, “Insurability of Cyber Risk: An Empirical Analysis,” The Geneva Papers on Risk and Insurance, vol. 44, no. 4, pp. 690-732, 2019.
- J. Wu, F. Yang, and S. Chen, “Multi-Task Credit Scoring Using Neural Networks,” IEEE Trans. Knowledge and Data Engineering, vol. 34, no. 1, pp. 1-14, Jan. 2022.
- H. Haslum, J. Shamsi, and Y. Kim, “Explainable Machine Learning for Cyber-Attack Prediction,” Computers & Security, vol. 135, 2024. [8] C. Xu, A. Deng, and Y. Ma, “Pricing Cyber Insurance with Machine Learning,” Risk Analysis, vol. 43, no. 1, pp. 25-42, 2023.
- I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and Harnessing Adversarial Examples,” arXiv preprint arXiv:1412.6572, 2015.
- A. Kendall and Y. Gal, “Multi-Task Learning Using Uncertainty to Weigh Losses for Scene Geometry and Semantics,” in Proc. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), 2018, pp. 7482-7491.
- CISA. “Known Exploited Vulnerabilities Catalog.” Cybersecurity and Infrastructure Security Agency, 2024. (Accessed Jul. 31, 2025).
- E. Bergstra, J. Bardenet, Y. Bengio, and B. Kégl, “Algorithms for Hyper-Parameter Optimization,” in Proc. Advances in Neural Information Processing Systems 24 (NeurIPS), 2011. [13] European Union, “EU Artificial Intelligence Act,” Regulation (EU) 2024/1234, 2024.
- New York Department of Financial Services, “Cybersecurity Regulation (23 NYCRR 500),” 2023.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).