To pay or not: game theoretic models of ransomware

被引:29
|
作者
Cartwright, Edward [1 ]
Castro, Julio Hernandez [2 ]
Cartwright, Anna [3 ]
机构
[1] De Montfort Univ, Dept Strateg Management & Mkt, Leicester LE1 9BH, Leics, England
[2] Univ Kent, Sch Comp, Canterbury, Kent, England
[3] Coventry Univ, Sch Econ Finance & Accounting, Coventry, W Midlands, England
来源
JOURNAL OF CYBERSECURITY | 2019年 / 5卷 / 01期
基金
英国工程与自然科学研究理事会;
关键词
ransomware; game theory; kidnapping; hostage; deterrence; HOSTAGE-TAKING;
D O I
10.1093/cybsec/tyz009
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim's files with the objective of financial gain. In this article, we review and develop the game theoretic literature on kidnapping in order to gain insight on ransomware. The prior literature on kidnapping has largely focused on political or terrorist hostage taking. We demonstrate, however, that key models within the literature can be adapted to give critical new insight on ransomware. We primarily focus on two models. The first gives insight on the optimal ransom that criminals should charge. The second gives insight on the role of deterrence through preventative measures. A key insight from both models will be the importance of spillover effects across victims. We will argue that such spillovers point to the need for some level of outside intervention, by governments or otherwise, to tackle ransomware.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Game Theoretic Analysis of Ransomware: A Preliminary Study
    Baksi, Rudra Prasad
    Upadhyaya, Shambhu
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 242 - 251
  • [2] Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware
    Yin, Tongxin
    Sarabi, Armin
    Liu, Mingyan
    GAMES, 2023, 14 (02):
  • [3] Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception Architecture
    Baksi, Rudra Prasad
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS SUPPLEMENTAL VOLUME (DSN-S 2022), 2022, : 53 - 54
  • [4] A Game-Theoretical Model of Ransomware
    Caporusso, Nicholas
    Chea, Singhtararaksme
    Abukhaled, Raied
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018, 2019, 782 : 69 - 78
  • [5] Game theoretic models for climate change negotiations
    Forgó, F
    Fülöp, J
    Prill, M
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2005, 160 (01) : 252 - 267
  • [6] Empirical game theoretic models: computational issues
    Armantier, Olivier
    Richard, Jean-Francois
    Computational Economics, 2000, 15 (1-2) : 3 - 24
  • [7] Game Theoretic Models of Intangible Learning Data
    Hicks, Ben
    Kitto, Kirsty
    FIFTEENTH INTERNATIONAL CONFERENCE ON LEARNING ANALYTICS & KNOWLEDGE, LAK 2025, 2025, : 970 - 976
  • [8] Game Theory of Data-selling Ransomware
    Li Z.
    Liao Q.
    Journal of Cyber Security and Mobility, 2021, 10 (01): : 65 - 96
  • [9] Game Theoretic Validation of Air Combat Simulation Models
    Poropudas, Jirka
    Virtanen, Kai
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 3243 - 3250
  • [10] A survey of game-theoretic models of cooperative advertising
    Jorgensen, Steffen
    Zaccour, Georges
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2014, 237 (01) : 1 - 14