Game of information security investment: Impact of attack types and network vulnerability

被引:48
作者
Wu, Yong [1 ,2 ]
Feng, Gengzhong [1 ,3 ]
Wang, Nengmin [1 ,3 ]
Liang, Huigang [4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Management, Xian 710049, Shaanxi, Peoples R China
[2] City Univ Hong Kong, Dept Syst Engn & Engn Management, Hong Kong, Hong Kong, Peoples R China
[3] Minist Educ Proc Control & Efficiency Engn, Key Lab, Xian 710049, Shaanxi, Peoples R China
[4] E Carolina Univ, Coll Business, Dept Management Informat Syst, Greenville, NC 27858 USA
关键词
Information security investment; Attack types; Network vulnerability; Game theory; Economic incentives; ECONOMICS; RISKS;
D O I
10.1016/j.eswa.2015.03.033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The level of firms' information security investment has recently become a critical issue in the management of IT infrastructure. Prior studies have not considered attack types and firms interconnection simultaneously when investigating the optimisation of such investment. Using game theory, we demonstrate that the optimal security investment level of an interconnected firm against targeted attacks is different from that against opportunistic attacks. Our model shows that not all information security risks are worth fighting against. As the potential loss increases, it is unadvisable to increase the security investment proportionately. Firms should increase investments with intrinsic vulnerability when facing target attacks, but focus on those systems that fall into the midrange of intrinsic vulnerability when facing opportunistic attacks. Firms are unwilling to invest in security and often offload reliability problems onto others when the trusted interdependence relationship becomes tighter in the absence of economic incentives. Thus we also discuss two economic incentives to motivate firms: liability and security information sharing. We find-that if the rules are set properly, both economic incentives are effective to not only internalise the negative externality and improve a firm's security level, but also reduce the total expected cost. We show that firms' optimal investments of liability always increase with the increasing number of firms, but the optimal investments on security information sharing increase only when the number of firms is large enough. These insights draw attention to many trade-offs firms often face and the importance of accurate assessment of firms' security environment. Future research directions are discussed based on the limitations and possible extensions of this study. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:6132 / 6146
页数:15
相关论文
共 33 条
  • [11] Gordon L. A., 2002, ACM Transactions on Information and Systems Security, V5, P438, DOI 10.1145/581271.581274
  • [12] Gordon L. A., 2003, Journal of Accounting and Public Policy, V22, P461, DOI [DOI 10.1016/J.JACCPUBPOL.2003.09.001, 10.1016/j.jaccpubpol.2003.09.001]
  • [13] A defence scheme against Identity Theft Attack based on multiple social networks
    He, Bing-Zhe
    Chen, Chien-Ming
    Su, Yi-Ping
    Sun, Hung-Min
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (05) : 2345 - 2352
  • [14] An economic analysis of the optimal information security investment in the case of a risk-averse firm
    Huang, C. Derrick
    Hu, Qing
    Behara, Ravi S.
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2008, 114 (02) : 793 - 804
  • [15] Optimal information security investment in a Healthcare Information Exchange: An economic analysis
    Huang, C. Derrick
    Behara, Ravi S.
    Goo, Jahyun
    [J]. DECISION SUPPORT SYSTEMS, 2014, 61 : 1 - 11
  • [16] Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
    Huang, C. Derrick
    Behara, Ravi S.
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2013, 141 (01) : 255 - 268
  • [17] A novel approach to evaluate software vulnerability prioritization
    Huang, Chien-Cheng
    Lin, Feng-Yu
    Lin, Frank Yeong-Sung
    Sun, Yeali S.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (11) : 2822 - 2840
  • [18] Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
    Hui, Kai-Lung
    Hui, Wendy
    Yue, Wei T.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 29 (03) : 117 - 155
  • [19] DSS for computer security incident response applying CBR and collaborative response
    Kim, Huy Kang
    Im, Kwang Hyuk
    Park, Sang Chan
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 852 - 870
  • [20] Market Impact on IT Security Spending
    Kolfal, Bora
    Patterson, Raymond A.
    Yeo, M. Lisa
    [J]. DECISION SCIENCES, 2013, 44 (03) : 517 - 556