Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment

被引:5
作者
Zhao, Yuhan [1 ]
Ge, Yunfei [1 ]
Zhu, Quanyan [1 ]
机构
[1] NYU, Dept Elect & Comp Engn, Tandon Sch Engn, Brooklyn, NY 11201 USA
来源
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2021 | 2021年 / 13061卷
基金
美国国家科学基金会;
关键词
Ransomware; Cybersecurity; Game theory; Security economics; Risk assessment; Prospect theory; Internet of Things;
D O I
10.1007/978-3-030-90370-1_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent surge in ransomware attacks has threatened many critical infrastructures such as oil pipeline systems, hospitals, and industrial Internet of Things (IoT). Ransomware is a cryptoviral extortion attack that involves two phases: the cyber infection of the malware and the financial transaction of the ransom payment. As the ransomware attackers are financially motivated, the protection of the infrastructure networked systems requires a cross-layer risk analysis that not only examines the vulnerability of the cyber system but also consolidates the economics of ransom payment. To this end, this paper establishes a two-player multi-phase and multi-stage game framework to model cyber and economic phases of a ransomware attack. We use a zero-sum Markov game to capture the multi-stage penetration of ransomware in the lateral movement. A sequential-move game is proposed to model the ransom payment interactions at the second phase. Two games are composed to form a multi-phase and multi-stage game-in-games (MPMS-GiG) that enables a holistic risk assessment of ransomware in networks and a cross-layer design of cyber defense and investment strategies to mitigate the attack. We provide a complete equilibrium characterization of ransomware game and design interdependent optimal strategies for cyber protection and ransom payment. We use prospect theory to analyze the impact of human factors on equilibrium strategies. Finally, we use a prototypical industrial IoT network as a case study to corroborate the results.
引用
收藏
页码:208 / 228
页数:21
相关论文
共 25 条
[21]   The evolution of malware [J].
Touchette F. .
Network Security, 2016, 2016 (01) :11-14
[22]   Security of smart manufacturing systems [J].
Tuptuk, Nilufer ;
Hailes, Stephen .
JOURNAL OF MANUFACTURING SYSTEMS, 2018, 47 :93-106
[23]   The rise of ransomware and emerging security challenges in the Internet of Things [J].
Yaqoob, Ibrar ;
Ahmed, Ejaz ;
Rehman, Muhammad Habib Ur ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Al-garadi, Mohammed Ali ;
Imran, Muhammad ;
Guizani, Mohsen .
COMPUTER NETWORKS, 2017, 129 :444-458
[24]  
Zahra SR, 2019, 2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), P551, DOI [10.1109/CONFLUENCE.2019.8776926, 10.1109/confluence.2019.8776926]
[25]  
Zhu QY, 2021, Arxiv, DOI arXiv:2103.05789