Game Theory of Data-selling Ransomware

被引:0
|
作者
Li Z. [1 ]
Liao Q. [2 ]
机构
[1] Department of Economics and Management, Albion College
[2] Department of Computer Science, Central Michigan University
来源
Journal of Cyber Security and Mobility | 2021年 / 10卷 / 01期
关键词
Cybersecurity; data selling; data threat; economics; game theory; profit optimization; ransomware; 1.0; 1.5; 2.0; reputation; revenue model;
D O I
10.13052/jcsm2245-1439.1013
中图分类号
学科分类号
摘要
We are experiencing the worst years of ransomware attacks with continuing news reports on high-profile ransomware attacks on organizations such as hospitals, schools, government agencies and private businesses. Recently a few ransomware attackers have gone beyond simply encrypting files and waiting for ransom. They threaten to release the data if the victims refuse their ransom request. In this paper, we propose a hypothetical new revenue model for the ransomware, i.e., selling the stolen data rather than publishing the data for free. Through a game-theoretical analysis between attackers and victims, we contribute a novel model to understand the critical decision variables for the proposed data-selling ransomware (which we refer as “ransomware 2.0”) that sells data as well as demands ransom. We compare the role of reputation and the profitability of the data-selling ransomware with traditional ransomware (“ransomware 1.0”) that demands ransom only and the data-threat ransomware (“ransomware 1.5”) that demands ransom with the threat of releasing data for no compliance. Both theoretical modeling and simulation studies suggest that in general both ransomware 2.0 and 1.5 are more profitable than ransomware 1.0, while ransomware 2.0 is always more profitable than ransomware 1.5. Notably, common defensive measures that may work to eliminate the financial incentives of ransomware 1.0 may not work on ransomware 2.0, in particular the data backup practice and the never-pay-ransom strategy. Our findings also suggest that the uncertainties created by this new revenue model may affect attackers’ reputation and users’ willingness-to-pay, therefore, ransomware 2.0 may not always increase the profitability of attackers. Another finding of the study suggests that reputation maximization is critical in ransomware 1.0 and 1.5, but not in ransomware 2.0, where attackers could manipulate reputation for profit maximization. © 2021 River Publishers
引用
收藏
页码:65 / 96
页数:31
相关论文
共 50 条
  • [41] Data Intrusion Tolerance Model based on Game Theory for Energy Internet
    Zhu, Zhanwang
    Yuan, Yiming
    Deng, Song
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 323 - 328
  • [42] Improving Data Utility Through Game Theory in Personalized Differential Privacy
    Lei Cui
    Youyang Qu
    Mohammad Reza Nosouhi
    Shui Yu
    Jian-Wei Niu
    Gang Xie
    Journal of Computer Science and Technology, 2019, 34 : 272 - 286
  • [43] SSD-Assisted Ransomware Detection and Data Recovery Techniques
    Baek, Sungha
    Jung, Youngdon
    Mohaisen, David
    Lee, Sungjin
    Nyang, Daehun
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (10) : 1762 - 1776
  • [44] Game theory and dynamic programming in alternate games
    Espinosa-Avila E.
    Longoria P.P.
    Hernández-Quiroz F.
    Journal of Dynamics and Games, 2017, 4 (03): : 205 - 216
  • [45] Detection of Ransomware Attacks Using Processor and Disk Usage Data
    Thummapudi, Kumar
    Lama, Palden
    Boppana, Rajendra V.
    IEEE ACCESS, 2023, 11 : 51395 - 51407
  • [46] Game Theory Meets Information Security Management
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 15 - 29
  • [47] Game Theory Meets Network Security and Privacy
    Manshaei, Mohammad Hossein
    Zhu, Quanyan
    Alpcan, Tansu
    Basar, Tamer
    Hubaux, Jean-Pierre
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [48] Data Integrity: Recovering from Ransomware and Other Destructive Events
    McBride, Tim
    Townsend, Anne Palm
    Ekstrom, Michael
    Lusty, Lauren
    Sexton, Julian
    2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 140 - 140
  • [49] A game theory approach for cooperative control to improve data quality and false data detection in WSN
    Casado-Vara, Roberto
    Prieto-Castrillo, Francisco
    Corchado, Juan M.
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2018, 28 (16) : 5087 - 5102
  • [50] CONDITIONAL GAME THEORY A Generalization of Game Theory for Cooperative Multiagent Systems
    Stirling, Wynn C.
    ICAART 2011: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2, 2011, : 64 - 73