Game theoretic approach applied in cybersecurity information exchange framework

被引:0
|
作者
Thakkar, Ankita [1 ]
Badsha, Shahriar [1 ]
Sengupta, Shamik [1 ]
机构
[1] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In CYBersecurity information EXchange (CYBEX) framework, Cyber Threat Intelligence (CTI) is shared among multiple organizations with a view of creating situational awareness. But there is a possibility that malicious organizations coexist with regular ones in this framework, which can get hold of the threat data shared by other organizations and can use it for carrying out malicious activities. We formulate the aforementioned problem as an incomplete information game assuming that whenever CYBEX receives any information, it processes the information for anomaly detection. We find the mixed strategy Nash equilibrium probabilities and corresponding Bayesian belief updates. We simulate the game to find the best response strategies with which regular and malicious organizations can play to increase their payoffs. Based on the best response strategies of organizations, we analyze that achieving more anomaly detection rate while keeping the processing rate minimum is the best action strategy with which CYBEX can play to increase the gain of both CYBEX and regular organizations over malicious organizations. We also find the approximate average minimum processing rate and anomaly detection rate with which CYBEX can play in order to maintain the payoff of itself and regular organizations higher than the malicious ones.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework
    Astaburuaga, Ignacio
    Sengupta, Shamik
    [J]. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 730 - 735
  • [2] 3-way Game Model for Privacy-Preserving Cybersecurity Information Exchange Framework
    Vakilinia, Iman
    Tosh, Deepak K.
    Sengupta, Shamik
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 829 - 834
  • [3] Attribute Based Sharing in Cybersecurity Information Exchange Framework
    Vakilinia, Iman
    Tosh, Deepak K.
    Sengupta, Shamik
    [J]. 2017 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2017,
  • [4] Evolving Sharing Strategies in Cybersecurity Information Exchange Framework
    Vakilinia, Iman
    Louis, Sushil J.
    Sengupta, Shamik
    [J]. PROCEEDINGS OF THE 2017 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCO'17 COMPANION), 2017, : 309 - 310
  • [5] Towards a Game-Theoretic Framework for Information Retrieval
    Zhai, ChengXiang
    [J]. SIGIR 2015: PROCEEDINGS OF THE 38TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2015, : 543 - 543
  • [6] Game-theoretic approach for information sharing
    Raweewan, Morrakot
    Ferrell, William G., Jr.
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 111 - +
  • [7] A Coalitional Game Theory Approach for Cybersecurity Information Sharing
    Vakilinia, Iman
    Sengupta, Shamik
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 237 - 242
  • [8] Knowledge Sharing Framework: a Game-Theoretic Approach
    Al-Gharaibeh, Rami S.
    Ali, Mostafa Z.
    [J]. JOURNAL OF THE KNOWLEDGE ECONOMY, 2022, 13 (01) : 332 - 366
  • [9] Health information exchange network under collaboration, cooperation, and competition: A game-theoretic approach
    Shabbar, Rawan
    Sayama, Hiroki
    [J]. HEALTH CARE MANAGEMENT SCIENCE, 2023, 26 (03) : 516 - 532
  • [10] Health information exchange network under collaboration, cooperation, and competition: A game-theoretic approach
    Rawan Shabbar
    Hiroki Sayama
    [J]. Health Care Management Science, 2023, 26 : 516 - 532