Dynamic Awareness and Strategic Adaptation in Cybersecurity: A Game-Theory Approach

被引:1
作者
Kostelic, Katarina [1 ]
机构
[1] Juraj Dobrila Univ Pula, Fac Econ & Tourism Dr Mijo Mirkovic, Dept Math Stat & Informat, Preradoviceva 1-1, Pula 52100, Croatia
来源
GAMES | 2024年 / 15卷 / 02期
关键词
awareness; game theory; cybersecurity; attacks; strategies;
D O I
10.3390/g15020013
中图分类号
F [经济];
学科分类号
02 ;
摘要
Awareness and human factors are becoming ever more important in cybersecurity, particularly in the context of small companies that may need more resources to deal with cybersecurity effectively. This paper introduces a theoretical framework for game analysis of the role of awareness in strategic interactions between the manager and a hacker. A computable approach is proposed based on Bayesian updating to model awareness in a cybersecurity context. The process of gaining awareness considers the manager's perception of the properties of the hacker's actions, game history, and common knowledge. The role of awareness in strategy choices and outcomes is analyzed and simulated, providing insights into decision-making processes for managers and highlighting the need to consider probabilistic assessments of threats and the effectiveness of countermeasures. The accuracy of the initial frequencies plays a significant role in the manager's success, with aligned frequencies leading to optimal results. Inaccurate information on prior frequencies still outperforms complete uncertainty, emphasizing the value of any available intelligence. However, the results suggest that other awareness modeling approaches are necessary to enhance the manager's agility and adaptiveness when the prior frequencies do not reflect the immediate attacker's type, indicating the need for improved intelligence about cyber-attacks and examinations of different awareness modeling approaches.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Aggarwal P., 2018, Int. J. Cyber Situational Aware, V3, P11, DOI [10.22619/IJCSA.2018.100118, DOI 10.22619/IJCSA.2018.100118]
  • [2] Aggarwal P., 2020, HDB COMPUTER NETWORK, P949, DOI [DOI 10.1007/978-3-030-22277-239, DOI 10.1007/978-3-030-22277]
  • [3] Aggarwal P., 2016, ADV HUMAN FACTORS CY, V501, DOI 10.1007/978-3-319-41932-9_8
  • [4] HackIT: A Human-in-the-Loop Simulation Tool for Realistic Cyber Deception Experiments
    Aggarwal, Palvi
    Gautam, Aksh
    Agarwal, Vaibhav
    Gonzalez, Cleotilde
    Dutt, Varun
    [J]. ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2020, 960 : 109 - 121
  • [5] Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence
    Alahmari, Abdulmajeed
    Duncan, Bob
    [J]. 2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
  • [6] [Anonymous], 2023, Hiscox Cyber Readiness Report
  • [7] [Anonymous], 2023, Tessian
  • [8] [Anonymous], 2021, Real and Famous Cases of Social Engineering Attacks
  • [9] Antunes M., 2021, Journal of Cybersecurity and Privacy, V1, P219
  • [10] Berry Christine T., 2018, International Journal of Business Continuity and Risk Management, V8, P1