Game Theory of Data-selling Ransomware

被引:0
|
作者
Li Z. [1 ]
Liao Q. [2 ]
机构
[1] Department of Economics and Management, Albion College
[2] Department of Computer Science, Central Michigan University
来源
Journal of Cyber Security and Mobility | 2021年 / 10卷 / 01期
关键词
Cybersecurity; data selling; data threat; economics; game theory; profit optimization; ransomware; 1.0; 1.5; 2.0; reputation; revenue model;
D O I
10.13052/jcsm2245-1439.1013
中图分类号
学科分类号
摘要
We are experiencing the worst years of ransomware attacks with continuing news reports on high-profile ransomware attacks on organizations such as hospitals, schools, government agencies and private businesses. Recently a few ransomware attackers have gone beyond simply encrypting files and waiting for ransom. They threaten to release the data if the victims refuse their ransom request. In this paper, we propose a hypothetical new revenue model for the ransomware, i.e., selling the stolen data rather than publishing the data for free. Through a game-theoretical analysis between attackers and victims, we contribute a novel model to understand the critical decision variables for the proposed data-selling ransomware (which we refer as “ransomware 2.0”) that sells data as well as demands ransom. We compare the role of reputation and the profitability of the data-selling ransomware with traditional ransomware (“ransomware 1.0”) that demands ransom only and the data-threat ransomware (“ransomware 1.5”) that demands ransom with the threat of releasing data for no compliance. Both theoretical modeling and simulation studies suggest that in general both ransomware 2.0 and 1.5 are more profitable than ransomware 1.0, while ransomware 2.0 is always more profitable than ransomware 1.5. Notably, common defensive measures that may work to eliminate the financial incentives of ransomware 1.0 may not work on ransomware 2.0, in particular the data backup practice and the never-pay-ransom strategy. Our findings also suggest that the uncertainties created by this new revenue model may affect attackers’ reputation and users’ willingness-to-pay, therefore, ransomware 2.0 may not always increase the profitability of attackers. Another finding of the study suggests that reputation maximization is critical in ransomware 1.0 and 1.5, but not in ransomware 2.0, where attackers could manipulate reputation for profit maximization. © 2021 River Publishers
引用
收藏
页码:65 / 96
页数:31
相关论文
共 50 条
  • [21] Game Theory for Big Data Processing: Multileader Multifollower Game-Based ADMM
    Zheng, Zijie
    Song, Lingyang
    Han, Zhu
    Li, Geoffrey Ye
    Poor, H. Vincent
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (15) : 3933 - 3945
  • [22] APPLICATIONS OF GAME THEORY TO ECONOMICS
    Owen, Guillermo
    INTERNATIONAL GAME THEORY REVIEW, 2013, 15 (03)
  • [23] Combining data mining and Game Theory in manufacturing strategy analysis
    Yi Wang
    Journal of Intelligent Manufacturing, 2007, 18 : 505 - 511
  • [24] Combining data mining and Game Theory in manufacturing strategy analysis
    Wang, Yi
    JOURNAL OF INTELLIGENT MANUFACTURING, 2007, 18 (04) : 505 - 511
  • [25] A Game Theory Study of Big Data Analytics in Internet of Things
    Gao, Yuan
    Chen, Liquan
    Wu, Ge
    Li, Qianmu
    Fu, Tong
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1707 - 1716
  • [26] GAME THEORY BASED DATA FUSION FOR PRECISION AGRICULTURE APPLICATIONS
    Bruce, Lori Mann
    Reynolds, Daniel
    2016 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS), 2016, : 3563 - 3566
  • [27] Ransomware Behavior Attack Construction via Graph Theory Approach
    Rosli, Muhammad Safwan
    Abdullah, Raihana Syahirah
    Yassin, Warusia
    Faizal, M. A.
    Zaki, Wan Nur Fatihah Wan Mohd
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) : 487 - 496
  • [28] GAME THEORY AND VIDEO GAME, A NEW APPROACH OF GAME THEORY TO ANALYZE AND CONCEIVE GAME SYSTEMS
    Guadiola, Emmanuel
    Natkin, Stephane
    PROCEEDINGS OF CGAMES'2005 - 7TH INTERNATIONAL CONFERENCE ON COMPUTER GAMES: ARTIFICIAL INTELLIGENCE, ANIMATION, MOBILE, EDUCATIONAL AND SERIOUS GAMES, 2005, : 166 - 170
  • [29] Game Theory for Cyber Security and Privacy
    Do, Cuong T.
    Tran, Nguyen H.
    Hong, Choongseon
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Blasch, Erik
    Ren, Shaolei
    Pissinou, Niki
    Iyengar, Sundaraja Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (02) : 30 - 37
  • [30] Reputation, Game Theory and Entrepreneurial Sustainability
    Pineiro-Chousa, Juan
    Vizcaino-Gonzalez, Marcos
    Angeles Lopez-Cabarcos, M.
    SUSTAINABILITY, 2016, 8 (11)