Decision-theoretic and game-theoretic approaches to IT security investment

被引:147
|
作者
Cavusoglu, Huseyin [1 ]
Raghunathan, Srinivasan [1 ]
Yue, Wei T. [2 ]
机构
[1] Univ Texas Dallas, Sch Management, Dallas, TX 75230 USA
[2] Univ Texas Dallas, MIS Area, Dallas, TX 75230 USA
关键词
decision theory; game theory; IT security investments;
D O I
10.2753/MIS0742-1222250211
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Firms have been increasing their information technology (IT) security budgets significantly to deal with increased security threats. An examination of current practices reveals that managers view security investment as any other and use traditional decision-theoretic risk management techniques to determine security investments. We argue in this paper that this method is incomplete because of the problem's strategic nature-hackers alter their hacking strategies in response to a firm's investment strategies. We propose game theory for determining IT security investment levels and compare game theory and decision theory approaches on several dimensions such as the investment levels, vulnerability, and payoff from investments. We show that the sequential game results in the maximum payoff to the firm, but requires that the firm move first before the hacker. Even if a simultaneous game is played, the firm enjoys a higher payoff than that in the decision theory approach, except when the firm's estimate of the hacker effort in the decision theory approach is sufficiently close to the actual hacker effort. We also show that if the firm learns from prior observations of hacker effort and uses these to estimate future hacker effort in the decision theory approach, then the gap between the results of decision theory and game theory approaches diminishes over time. The rate of convergence and the extent of loss the firm suffers before convergence depend on the learning model employed by the firm to estimate hacker effort.
引用
收藏
页码:281 / 304
页数:24
相关论文
共 50 条
  • [1] Game-theoretic risk analysis in decision-theoretic rough sets
    Herbert, Joseph P.
    Yao, JingTao
    [J]. ROUGH SETS AND KNOWLEDGE TECHNOLOGY, 2008, 5009 : 132 - 139
  • [2] Cooperation: Game-theoretic approaches
    Forges, F
    [J]. SOCIAL CHOICE AND WELFARE, 1998, 15 (04) : 593 - 596
  • [3] A Game-Theoretic Analysis of Security Investment for Service Computing Applications
    Ye, Xinfeng
    [J]. 2014 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2014, : 224 - 231
  • [4] Game-Theoretic Approaches to Pragmatics
    Benz, Anton
    Stevens, Jon
    [J]. ANNUAL REVIEW OF LINGUISTICS, VOL 4, 2018, 4 : 173 - 191
  • [5] The decision-theoretic foundations of game theory
    Mariotti, M
    [J]. RATIONAL FOUNDATIONS OF ECONOMIC BEHAVIOUR, 1996, : 133 - 148
  • [6] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [7] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    [J]. Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [8] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64
  • [9] A game-theoretic analysis of information sharing and security investment for complementary firms
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (11) : 1682 - 1691
  • [10] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820