Dynamic competition in IT security: A differential games approach

被引:20
作者
Bandyopadhyay, Tridib [3 ]
Liu, Dengpan [1 ]
Mookerjee, Vijay S. [2 ]
Wilhite, Allen W. [4 ]
机构
[1] Iowa State Univ, Ames, IA USA
[2] Univ Texas Dallas, Richardson, TX 75083 USA
[3] Kennesaw State Univ, Kennesaw, GA 30144 USA
[4] Univ Alabama, Huntsville, AL 35899 USA
关键词
IT security; Dynamic games; Competing defense; Cyber defense; Investment in IT security; MODELS;
D O I
10.1007/s10796-012-9373-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition in IT security between firms that possess similar information assets. We utilize a differential game framework to analyze the continuous time IT security investment decisions of firms in such a target group. We derive the steady state equilibrium of the duopolistic differential game, show how implicit competition induces overspending in IT defense, and then demonstrate how such overinvestment can be combated by innovatively managing the otherwise misaligned incentives for coordination. We show that in order to achieve cooperation, the firm with the higher asset value must take the lead and provide appropriate incentives to elicit participation of the other firm. Our analysis indicates that IT security planning should not remain an internal, firm-level decision, but also incorporate the actions of those firms that hackers consider as alternative targets.
引用
收藏
页码:643 / 661
页数:19
相关论文
共 26 条
[1]   Why information security is hard - An economic perspective [J].
Anderson, R .
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, :358-365
[2]  
[Anonymous], MANAGEMENT SCI
[3]  
[Anonymous], J ACCOUNTING PUBLIC
[4]  
[Anonymous], J ACCOUNTING PUBLIC
[5]  
[Anonymous], P SOFTW C VEGAS NV D
[6]  
[Anonymous], 2000, DIFFERENTIAL GAMES E
[7]  
[Anonymous], P 24 ANN C COGN SCI
[8]  
[Anonymous], 2000, NY TIMES
[9]  
[Anonymous], MESSAGE LAB REPORTS
[10]  
[Anonymous], MANAGEMENT SCI