Game Theory of Data-selling Ransomware

被引:0
|
作者
Li Z. [1 ]
Liao Q. [2 ]
机构
[1] Department of Economics and Management, Albion College
[2] Department of Computer Science, Central Michigan University
来源
Journal of Cyber Security and Mobility | 2021年 / 10卷 / 01期
关键词
Cybersecurity; data selling; data threat; economics; game theory; profit optimization; ransomware; 1.0; 1.5; 2.0; reputation; revenue model;
D O I
10.13052/jcsm2245-1439.1013
中图分类号
学科分类号
摘要
We are experiencing the worst years of ransomware attacks with continuing news reports on high-profile ransomware attacks on organizations such as hospitals, schools, government agencies and private businesses. Recently a few ransomware attackers have gone beyond simply encrypting files and waiting for ransom. They threaten to release the data if the victims refuse their ransom request. In this paper, we propose a hypothetical new revenue model for the ransomware, i.e., selling the stolen data rather than publishing the data for free. Through a game-theoretical analysis between attackers and victims, we contribute a novel model to understand the critical decision variables for the proposed data-selling ransomware (which we refer as “ransomware 2.0”) that sells data as well as demands ransom. We compare the role of reputation and the profitability of the data-selling ransomware with traditional ransomware (“ransomware 1.0”) that demands ransom only and the data-threat ransomware (“ransomware 1.5”) that demands ransom with the threat of releasing data for no compliance. Both theoretical modeling and simulation studies suggest that in general both ransomware 2.0 and 1.5 are more profitable than ransomware 1.0, while ransomware 2.0 is always more profitable than ransomware 1.5. Notably, common defensive measures that may work to eliminate the financial incentives of ransomware 1.0 may not work on ransomware 2.0, in particular the data backup practice and the never-pay-ransom strategy. Our findings also suggest that the uncertainties created by this new revenue model may affect attackers’ reputation and users’ willingness-to-pay, therefore, ransomware 2.0 may not always increase the profitability of attackers. Another finding of the study suggests that reputation maximization is critical in ransomware 1.0 and 1.5, but not in ransomware 2.0, where attackers could manipulate reputation for profit maximization. © 2021 River Publishers
引用
收藏
页码:65 / 96
页数:31
相关论文
共 50 条
  • [1] Preventive portfolio against data-selling ransomware-A game theory of encryption and deception
    Li, Zhen
    Liao, Qi
    COMPUTERS & SECURITY, 2022, 116
  • [2] A Game-Theoretical Model of Ransomware
    Caporusso, Nicholas
    Chea, Singhtararaksme
    Abukhaled, Raied
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018, 2019, 782 : 69 - 78
  • [3] Game Theoretic Analysis of Ransomware: A Preliminary Study
    Baksi, Rudra Prasad
    Upadhyaya, Shambhu
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 242 - 251
  • [4] To pay or not: game theoretic models of ransomware
    Cartwright, Edward
    Castro, Julio Hernandez
    Cartwright, Anna
    JOURNAL OF CYBERSECURITY, 2019, 5 (01):
  • [5] Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware
    Yin, Tongxin
    Sarabi, Armin
    Liu, Mingyan
    GAMES, 2023, 14 (02):
  • [6] Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception Architecture
    Baksi, Rudra Prasad
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS SUPPLEMENTAL VOLUME (DSN-S 2022), 2022, : 53 - 54
  • [7] A method for decrypting data infected with Hive ransomware
    Kim, Giyoon
    Kim, Soram
    Kang, Soojin
    Kim, Jongsung
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [8] Integration of Data Mining with Game Theory
    Wang, Yi
    Knowledge Enterprise: Intelligent Strategies in Product Design, Manufacturing, and Management, 2006, 207 : 275 - 280
  • [9] Research on price Stackelberg game model with probabilistic selling based on complex system theory
    Li, Qiuxiang
    Ma, Junhai
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2016, 30 (1-3) : 387 - 400
  • [10] Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory
    Liang, Xueqin
    Yan, Zheng
    Deng, Robert H.
    Zheng, Qinghua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 587 - 600