Game of information security investment: Impact of attack types and network vulnerability

被引:45
|
作者
Wu, Yong [1 ,2 ]
Feng, Gengzhong [1 ,3 ]
Wang, Nengmin [1 ,3 ]
Liang, Huigang [4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Management, Xian 710049, Shaanxi, Peoples R China
[2] City Univ Hong Kong, Dept Syst Engn & Engn Management, Hong Kong, Hong Kong, Peoples R China
[3] Minist Educ Proc Control & Efficiency Engn, Key Lab, Xian 710049, Shaanxi, Peoples R China
[4] E Carolina Univ, Coll Business, Dept Management Informat Syst, Greenville, NC 27858 USA
关键词
Information security investment; Attack types; Network vulnerability; Game theory; Economic incentives; ECONOMICS; RISKS;
D O I
10.1016/j.eswa.2015.03.033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The level of firms' information security investment has recently become a critical issue in the management of IT infrastructure. Prior studies have not considered attack types and firms interconnection simultaneously when investigating the optimisation of such investment. Using game theory, we demonstrate that the optimal security investment level of an interconnected firm against targeted attacks is different from that against opportunistic attacks. Our model shows that not all information security risks are worth fighting against. As the potential loss increases, it is unadvisable to increase the security investment proportionately. Firms should increase investments with intrinsic vulnerability when facing target attacks, but focus on those systems that fall into the midrange of intrinsic vulnerability when facing opportunistic attacks. Firms are unwilling to invest in security and often offload reliability problems onto others when the trusted interdependence relationship becomes tighter in the absence of economic incentives. Thus we also discuss two economic incentives to motivate firms: liability and security information sharing. We find-that if the rules are set properly, both economic incentives are effective to not only internalise the negative externality and improve a firm's security level, but also reduce the total expected cost. We show that firms' optimal investments of liability always increase with the increasing number of firms, but the optimal investments on security information sharing increase only when the number of firms is large enough. These insights draw attention to many trade-offs firms often face and the importance of accurate assessment of firms' security environment. Future research directions are discussed based on the limitations and possible extensions of this study. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:6132 / 6146
页数:15
相关论文
共 50 条
  • [1] A game-theoretic analysis of information security investment for multiple firms in a network
    Qian, Xiaofei
    Liu, Xinbao
    Pei, Jun
    Pardalos, Panos M.
    Liu, Lin
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2017, 68 (10) : 1290 - 1305
  • [2] A game of information security investment considering security insurance and complementary information assets
    Qian, Xiaofei
    Yang, Wujuan
    Pei, Jun
    Liu, Xinbao
    Pardalos, Panos M.
    [J]. INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2022, 29 (03) : 1791 - 1824
  • [3] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Kjell Hausken
    [J]. Information Systems Frontiers, 2006, 8 : 338 - 349
  • [4] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Hausken, Kjell
    [J]. INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) : 338 - 349
  • [5] Impact of Side Channel Attack in Information Security
    Gupta, Himanshu
    Mondal, Subhash
    Majumdar, Rana
    Ghosh, Neha Sana
    Khan, Soumya Suvra
    Kwanyu, Ngala Etienne
    Mishra, Ved P.
    [J]. PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 291 - 295
  • [6] Impact of imperfect information on network attack
    Melchionna, Andrew
    Caloca, Jesus
    Squires, Shane
    Antonsen, Thomas M.
    Ott, Edward
    Girvan, Michelle
    [J]. PHYSICAL REVIEW E, 2015, 91 (03)
  • [7] A differential game approach to security investment and information sharing in a competitive environment
    Gao, Xing
    Zhong, Weijun
    [J]. IIE TRANSACTIONS, 2016, 48 (06) : 511 - 526
  • [8] Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
    Arora, Ashish
    Nandkumar, Anand
    Telang, Rahul
    [J]. INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) : 350 - 362
  • [9] Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
    Ashish Arora
    Anand Nandkumar
    Rahul Telang
    [J]. Information Systems Frontiers, 2006, 8 : 350 - 362
  • [10] Optimal Information Security Investment Analyses with the Consideration of the Benefits of Investment and Using Evolutionary Game Theory
    Wang, Qin
    Zhu, Jianming
    [J]. PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2016), 2016,