Effect of Security Investment on Evolutionary Games

被引:0
作者
Zhang, Chen [1 ]
Pan, Rong [2 ]
Chaudhury, Abhijit [2 ]
Xu, Changxin [3 ]
机构
[1] Bryant Univ, Dept Comp Informat Syst, Smithfield, RI USA
[2] China Construct Bank, Nanjing 2100002, Jiangsu, Peoples R China
[3] Hohai Univ, Sch Business, Nanjing 210098, Jiangsu, Peoples R China
关键词
management; network reliability; security; artificial intelligence; evolutionary algorithm; INFORMATION SECURITY; SOFTWARE VULNERABILITIES; INTERNET SECURITY; MARKET; MODEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an evolutionary game model to analyze the investment decision making process in the cyber offender-defender interaction and provide a quantified approach for defender to calculate the safety threshold to avoid the occurrence of offender-leading game. Then we use simulation as a workbench to discuss the adjustment of each parameter to the security investment threshold. Our evolutionary game model shows that the cyber offender-defender game can possibly reach one realistic stable point after a long-term evolution, which implicates a tied offender-defender game. We found that an offender-leading game can be avoided by maintaining the security investment above a safety threshold level determined by the system vulnerability among other environmental parameters such as residual risk and potential loss. Hence with an optimal level of security investment, the defender can lead the game effectively to discourage attacking attempts. Both linear and nonlinear simulations share similar trends and our evolutionary game theoretic analysis remains valid in either case.
引用
收藏
页码:1695 / 1718
页数:24
相关论文
共 57 条
  • [41] Roy S., 2010, Conference Papers - New Zealand Association of Economists, P1, DOI [DOI 10.1109/HICSS.2010.35, 10.1109/HICSS. 2010.35., 10.1109/HICSS.2010.35]
  • [42] Security protection design for deception and real system regimes: A model and analysis
    Ryu, C.
    Sharman, R.
    Rao, H. R.
    Upadhyaya, S.
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2010, 201 (02) : 545 - 556
  • [43] Schwarz B, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P8
  • [44] GAME-THEORY AND THE EVOLUTION OF BEHAVIOR
    SMITH, JM
    [J]. BEHAVIORAL AND BRAIN SCIENCES, 1984, 7 (01) : 95 - 101
  • [45] Sonnenreich W, 2006, J RES PRACT INF TECH, V38, P45
  • [46] An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    Sun, LL
    Srivastava, RP
    Mock, TJ
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2006, 22 (04) : 109 - 142
  • [47] SUN W, 2008, P INT C INN COMP INF, P559
  • [48] Sun W, 2008, PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, P554, DOI 10.1109/ISECS.2008.147
  • [49] TEMBINE H, 2008, P IEEE ACM WIOPT APR, P344
  • [50] Varian H, 2004, ADV INF SEC, V12, P1