Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation

被引:1
|
作者
Wang, Li [1 ]
Iyengar, S. Sitharama [1 ]
Belman, Amith K. [2 ]
Sniatala, Pawel [3 ]
Phoha, Vir V. [2 ]
Wan, Changsheng [4 ]
机构
[1] Florida Int Univ, Sch Comp & Informat Sci, Miami, FL 33199 USA
[2] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
[3] Poznan Univ Tech, Inst Comp Sci, Poznan, Poland
[4] Southeast Univ, Sch Informat Sci & Engn, Nanjing, Jiangsu, Peoples R China
来源
关键词
Game theory; malicious apps; software apps; nash equilibrium; android malware; cyber insurance; SOFTWARE;
D O I
10.1145/3409959
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Potential for huge loss from malicious exploitation of software calls for development of principles of cyber-insurance. Estimating what to insure and for how much and what might be the premiums poses challenges because of the uncertainties, such as the timings of emergence and lethality of malicious apps, human propensity to favor ease by giving more privilege to downloaded apps over inconvenience of delay or functionality, the chance of infection determined by the lifestyle of the mobile device user, and the monetary value of the compromise of software, and so on. We provide a theoretical framework for cyber-insurance backed by game-theoretic formulation to calculate monetary value of risk and the insurance premiums associated with software compromise. By establishing the conditions for Nash equilibrium between strategies of an adversary and software we derive probabilities for risk, potential loss, gain to adversary from app categories, such as lifestyles, entertainment, education, and so on, and their prevalence ratios. Using simulations over a range of possibilities, and using publicly available malware statistics, we provide insights about the strategies that can be taken by the software and the adversary. We show the application of our framework on the most recent mobile malware data (2018 ISTR report-data for the year 2017) that consists of the top five Android malware apps: Malapp, Fakeinst, Premiumtext, Maldownloader, and Simplelocker and the resulting leaked phone number, location information, and installed app information. Uniqueness of our work stems from developing mathematical framework and providing insights of estimating cyber-insurance parameters through game-theoretic choice of strategies and by showing its efficacy on a recent real malicious app data. These insights will be of tremendous help to researchers and practitioners in the security community.
引用
收藏
页数:24
相关论文
共 3 条
  • [1] An insurance theory based optimal cyber-insurance contract against moral hazard
    Dou, Wanchun
    Tang, Wenda
    Wu, Xiaotong
    Qi, Lianyong
    Xu, Xiaolong
    Zhang, Xuyun
    Hu, Chunhua
    [J]. INFORMATION SCIENCES, 2020, 527 : 576 - 589
  • [2] Strategies of Pursuit-Evasion Game Based on Improved Potential Field and Differential Game Theory for Mobile Robots
    Dong, Jie
    Zhang, Xu
    Jia, Xuemei
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1452 - 1456
  • [3] Intention to Utilize Mobile Game-Based Learning in Nursing Education From Teachers' Perspective: A Theory of Planned Behavior Approach
    Garcia, Manuel B.
    Oducado, Ryan Michael F.
    [J]. 2021 1ST CONFERENCE ON ONLINE TEACHING FOR MOBILE EDUCATION (OT4ME), 2021, : 103 - 107