Interdependency Analysis in Security Investment against Strategic Attacks

被引:26
作者
Ezhei, Mansooreh [1 ]
Ladani, Behrouz [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Dept Software Engn, Esfahan, Iran
关键词
Security investment; Strategic attack; Interdependency; Differential game; GAME; RISKS;
D O I
10.1007/s10796-018-9845-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security investment is of high importance in management of IT infrastructure. There are many researches focused on game theoretical modeling and analysis of security investment of interdependent firms against potential security attacks. However, these studies usually are not concerned with dynamic and strategic nature of attacks which are increasingly important features of today's cyber systems. Strategic attackers are those who are able to substitute their investments among targets over time by shifting investments towards poorly protected targets in order to obtain more potential financial gains. In this paper we try to analyze the effects of interdependency in security investment of firms against strategic attackers. Note that although there are a limited number of works that consider the strategic nature of attack, they model the defenders as a set of isolated nodes. Hence the positive externality caused by interconnection of the firms is not considered in these models. We consider both the attackers' actual strategic behaviors (that causes negative externality via the possibility of substituting the target) as well as structural effects of the networked firms (that leads to positive externality via attack propagation). We propose a differential game among the networked firms in which attackers act strategically. In the proposed game, by employing a linear substitution model for characterizing the process of target selection by the attacker, the open-loop Nash solutions are highlighted in an analytical form. The analytical results show how interconnectivity between firms and the strategic behavior of the attacker determines the firms' incentives for security investment. It is shown that overinvestment or underinvestment could occur depending on the degree of interdependency among the given firms. Accordingly we designed mechanisms to encourage the firms to invest at a socially optimal level. The achieved results in this paper helps security designers to better formulate their policies in tackling strategic attackers.
引用
收藏
页码:187 / 201
页数:15
相关论文
共 26 条
[1]   Security of interdependent and identical networked control systems [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Sastry, S. Shankar .
AUTOMATICA, 2013, 49 (01) :186-192
[2]  
[Anonymous], 2012, INT C FIN CRYPT DAT
[3]  
Bagchi K., 2003, COMMUN ASSOC INF SYS, V12, P684
[4]  
Bhatt S. C., 2011, INT J ADV RES COMPUT, P2
[5]  
Camp L. J., 2000, ISW 2000. Information Survivability Workshop. Third Information Survivability Workshop - ISW-2000. `Research Directions and Research Collaborations to Protect the Global Information Society', P31
[6]   Decision-theoretic and game-theoretic approaches to IT security investment [J].
Cavusoglu, Huseyin ;
Raghunathan, Srinivasan ;
Yue, Wei T. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) :281-304
[7]   Information sharing vs. privacy: A game theoretic analysis [J].
Ezhei, Mansooreh ;
Ladani, Behrouz Tork .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :327-337
[8]   An economic mechanism to manage operational security risks for inter-organizational information systems [J].
Fang, Fang ;
Parameswaran, Manoj ;
Zhao, Xia ;
Whinston, Andrew B. .
INFORMATION SYSTEMS FRONTIERS, 2014, 16 (03) :399-416
[9]   Information Security Investment When Hackers Disseminate Knowledge [J].
Gao, Xing ;
Zhong, Weijun ;
Mei, Shue .
DECISION ANALYSIS, 2013, 10 (04) :352-368
[10]  
Geer D, 2003, COMPUTER COMMUNICATI