Game theoretic approach applied in cybersecurity information exchange framework

被引:0
|
作者
Thakkar, Ankita [1 ]
Badsha, Shahriar [1 ]
Sengupta, Shamik [1 ]
机构
[1] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In CYBersecurity information EXchange (CYBEX) framework, Cyber Threat Intelligence (CTI) is shared among multiple organizations with a view of creating situational awareness. But there is a possibility that malicious organizations coexist with regular ones in this framework, which can get hold of the threat data shared by other organizations and can use it for carrying out malicious activities. We formulate the aforementioned problem as an incomplete information game assuming that whenever CYBEX receives any information, it processes the information for anomaly detection. We find the mixed strategy Nash equilibrium probabilities and corresponding Bayesian belief updates. We simulate the game to find the best response strategies with which regular and malicious organizations can play to increase their payoffs. Based on the best response strategies of organizations, we analyze that achieving more anomaly detection rate while keeping the processing rate minimum is the best action strategy with which CYBEX can play to increase the gain of both CYBEX and regular organizations over malicious organizations. We also find the approximate average minimum processing rate and anomaly detection rate with which CYBEX can play in order to maintain the payoff of itself and regular organizations higher than the malicious ones.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Analyzing information system investments: A game-theoretic approach
    Butterfield, J
    Pendegraft, N
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2001, 18 (03) : 73 - 82
  • [22] Environmental Information, Asymmetric Information, and Financial Markets: A Game-Theoretic Approach
    Nikolaou, Ioannis E.
    Chymis, Athanasios
    Evangelinos, Konstantinos
    [J]. ENVIRONMENTAL MODELING & ASSESSMENT, 2013, 18 (06) : 615 - 628
  • [23] Environmental Information, Asymmetric Information, and Financial Markets: A Game-Theoretic Approach
    Ioannis E. Nikolaou
    Athanasios Chymis
    Konstantinos Evangelinos
    [J]. Environmental Modeling & Assessment, 2013, 18 : 615 - 628
  • [24] Applied Cybersecurity using Game Theory Elements
    Patrascu, Alecsandru
    Simion, Emil
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [25] Collective Action and Exchange: A Game Theoretic Approach to Contemporary Political Economy
    Gratton, Gabriele
    [J]. JOURNAL OF ECONOMIC PSYCHOLOGY, 2014, 42 : 192 - 193
  • [26] A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach
    Priyadarsini, Madhukrishna
    Bera, Padmalochan
    Das, Sajal K.
    Rahman, Mohammad Ashiqur
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1500 - 1515
  • [27] A game-theoretic approach to regulatory negotiation and a framework for empirical analysis
    Hsu, SL
    [J]. HARVARD ENVIRONMENTAL LAW REVIEW, 2002, 26 (01) : 33 - 107
  • [28] An Evolutionary Game-Theoretic Framework for Cyber-threat Information Sharing
    Tosh, Deepak
    Sengupta, Shamik
    Kamhoua, Charles
    Kwiat, Kevin
    Martin, Andrew
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7341 - 7346
  • [29] Testing for nonlinearity of exchange rates: an information-theoretic approach
    Zhang, Yuqin
    Soofi, Abdol S.
    Wang, Shouyang
    [J]. JOURNAL OF ECONOMIC STUDIES, 2011, 38 (06) : 637 - 657
  • [30] A noncooperative game-theoretic approach applied to the service selection in the vehicular cloud
    Hichri, Yamina
    Dahi, Soumaya
    Fathallah, Habib
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (10)