Modelling cybersecurity strategies with game theory and cyber kill chain

被引:0
|
作者
Kour, Ravdeep [1 ]
Karim, Ramin [1 ]
Dersin, Pierre [1 ]
机构
[1] Lulea Univ Technol, Div Operat & Maintenance Engn, Lulea, Sweden
关键词
Game theory; Cyber kill chain; Strategic approach; Probabilities; Case study; Cybersecurity;
D O I
10.1007/s13198-025-02733-4
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Digitalisation within industries has many positive opportunities but poses many cybersecurity-related threats. Cybersecurity is a critical concern for many industries, such as railway, aviation, mining, construction, healthcare, and finance, where vital information and operational security are at risk of being compromised. Today, researchers are looking into various solutions to tackle cybersecurity risks while still retaining the desired functionality of the system. However, it is believed that these challenges can be approached by integrating game theory and the cyber kill chain (CKC), which describes the different stages of a cyberattack, to understand the complexities of cybersecurity. Thus, the primary objective of this paper is to demonstrate the application of a strategic game model within the context of cybersecurity, specifically using the cyber kill chain (CKC) model. The focus is on validating the proposed strategic game model through a case study. The case study involves a scenario where defenders select strategies such as "monitor system," "detecting system," and "respond to attack," while attackers choose various attack strategies like "monitoring attack," "scan the organization's website," and "develop malicious payloads" within the stages of the CKC. This approach aims to enhance understanding of the complex challenges and facilitate the development of effective cybersecurity solutions. This approach will help in evaluating the effectiveness of different security strategies. The proposed strategic approach uses a non-cooperative game based on mixed strategies. The authors have defined a scenario for simultaneous-move games by estimating values for various elements of the game. By analysing the behaviour of both attacker and defender, the proposed game-based model can help industries develop more effective and efficient security strategies. Further, the proposed model will provide a better understanding of the complex challenges of cybersecurity in industrial contexts. It can also be used to develop appropriate strategies to mitigate cybersecurity risks.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain
    Chomiak-Orsa, Iwona
    Rot, Artur
    Blaicke, Bartosz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE, PT II, 2019, 11684 : 406 - 416
  • [2] Cyber Secured: A Serious Game for Cybersecurity Novices
    Kletenik, Devorah
    Butbul, Alon
    Chan, Daniel
    Kwok, Deric
    LaSpina, Matthew
    SIGCSE 2020: PROCEEDINGS OF THE 51ST ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2020, : 1307 - 1307
  • [3] Using the Cybersecurity Kill Chain for Attack and Defence
    Cooper M.
    ITNOW, 2022, 64 (02) : 38 - 41
  • [4] Cyber Social Engineering Kill Chain
    Rodriguez, Rosana Montanez
    Xu, Shouhuai
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 487 - 504
  • [5] Technical Aspects of Cyber Kill Chain
    Yadav, Tarun
    Rao, Arvind Mallari
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 438 - 452
  • [6] Game Theoretical Modelling of Network/Cybersecurity
    Iqbal, Azhar
    Gunn, Lachlan J.
    Guo, Mingyu
    Babar, M. Ali
    Abbott, Derek
    IEEE ACCESS, 2019, 7 : 154167 - 154179
  • [7] Optimization of Cybersecurity Investment Strategies in the Smart Grid Using Game-Theory
    Hyder, Burhan
    Govindarasu, Manimaran
    2020 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2020,
  • [8] Cyber Kill Chain Defender for Smart Meters
    Simonov, Mikhail
    Bertone, Fabrizio
    Goga, Klodiana
    Terzo, Olivier
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 386 - 397
  • [9] Game theory modelling of retail marketing discount strategies
    Taylor, Mark
    Kwasnica, Vince
    Reilly, Denis
    Ravindran, Somasundaram
    MARKETING INTELLIGENCE & PLANNING, 2019, 37 (05) : 555 - 566
  • [10] A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
    Nagurney, Anna
    Daniele, Patrizia
    Shukla, Shivani
    ANNALS OF OPERATIONS RESEARCH, 2017, 248 (1-2) : 405 - 427