Game Theory of Data-selling Ransomware

被引:0
|
作者
Li Z. [1 ]
Liao Q. [2 ]
机构
[1] Department of Economics and Management, Albion College
[2] Department of Computer Science, Central Michigan University
来源
Journal of Cyber Security and Mobility | 2021年 / 10卷 / 01期
关键词
Cybersecurity; data selling; data threat; economics; game theory; profit optimization; ransomware; 1.0; 1.5; 2.0; reputation; revenue model;
D O I
10.13052/jcsm2245-1439.1013
中图分类号
学科分类号
摘要
We are experiencing the worst years of ransomware attacks with continuing news reports on high-profile ransomware attacks on organizations such as hospitals, schools, government agencies and private businesses. Recently a few ransomware attackers have gone beyond simply encrypting files and waiting for ransom. They threaten to release the data if the victims refuse their ransom request. In this paper, we propose a hypothetical new revenue model for the ransomware, i.e., selling the stolen data rather than publishing the data for free. Through a game-theoretical analysis between attackers and victims, we contribute a novel model to understand the critical decision variables for the proposed data-selling ransomware (which we refer as “ransomware 2.0”) that sells data as well as demands ransom. We compare the role of reputation and the profitability of the data-selling ransomware with traditional ransomware (“ransomware 1.0”) that demands ransom only and the data-threat ransomware (“ransomware 1.5”) that demands ransom with the threat of releasing data for no compliance. Both theoretical modeling and simulation studies suggest that in general both ransomware 2.0 and 1.5 are more profitable than ransomware 1.0, while ransomware 2.0 is always more profitable than ransomware 1.5. Notably, common defensive measures that may work to eliminate the financial incentives of ransomware 1.0 may not work on ransomware 2.0, in particular the data backup practice and the never-pay-ransom strategy. Our findings also suggest that the uncertainties created by this new revenue model may affect attackers’ reputation and users’ willingness-to-pay, therefore, ransomware 2.0 may not always increase the profitability of attackers. Another finding of the study suggests that reputation maximization is critical in ransomware 1.0 and 1.5, but not in ransomware 2.0, where attackers could manipulate reputation for profit maximization. © 2021 River Publishers
引用
收藏
页码:65 / 96
页数:31
相关论文
共 50 条
  • [31] Principal-Agent Theory, Game Theory, and the Precautionary Principle
    Hausken, Kjell
    DECISION ANALYSIS, 2019, 16 (02) : 105 - 127
  • [32] Information Theory in Game Theory
    Khouzani, M. H. R.
    Malacaria, Pasquale
    ENTROPY, 2018, 20 (11)
  • [33] Improving Data Utility Through Game Theory in Personalized Differential Privacy
    Cui, Lei
    Qu, Youyang
    Nosouhi, Mohammad Reza
    Yu, Shui
    Niu, Jian-Wei
    Xie, Gang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (02) : 272 - 286
  • [34] The World of Game Theory and Game Theory of the World: A Personal Journey
    Aumann, Robert J.
    REVUE ECONOMIQUE, 2023, 74 (04): : 655 - 659
  • [35] A game theory based framework for materialized view selection in data warehouses
    Azgomi, Hossein
    Sohrabi, Mohammad Karim
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2018, 71 : 125 - 137
  • [36] A data trading scheme based on blockchain and game theory in federated learning
    Zhang, Jiqun
    Zhang, Shengli
    Zhang, Gaojun
    Liao, Guofu
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 278
  • [37] Crime data optimization using neutrosophic logic based game theory
    Remani, Naga Venkata Jagan Mohan
    Naresh, Vankamamidi S.
    Reddi, Sivaranjani
    Kumar, Kadali Dileep
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15)
  • [38] GAME THEORY APPLIED TO BIG DATA ANALYTICS IN GEOSCIENCES AND REMOTE SENSING
    Bruce, Lori Mann
    2013 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS), 2013, : 4094 - 4097
  • [39] Researches on Data Correctness and Completeness in Cloud Computing Based on Game Theory
    Yu, Yonghong
    Wu, Li
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2069 - +
  • [40] Game Theory Based Correlated Privacy Preserving Analysis in Big Data
    Wu, Xiaotong
    Wu, Taotao
    Khan, Maqbool
    Ni, Qiang
    Dou, Wanchun
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 643 - 656