Game of information security investment: Impact of attack types and network vulnerability

被引:45
|
作者
Wu, Yong [1 ,2 ]
Feng, Gengzhong [1 ,3 ]
Wang, Nengmin [1 ,3 ]
Liang, Huigang [4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Management, Xian 710049, Shaanxi, Peoples R China
[2] City Univ Hong Kong, Dept Syst Engn & Engn Management, Hong Kong, Hong Kong, Peoples R China
[3] Minist Educ Proc Control & Efficiency Engn, Key Lab, Xian 710049, Shaanxi, Peoples R China
[4] E Carolina Univ, Coll Business, Dept Management Informat Syst, Greenville, NC 27858 USA
关键词
Information security investment; Attack types; Network vulnerability; Game theory; Economic incentives; ECONOMICS; RISKS;
D O I
10.1016/j.eswa.2015.03.033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The level of firms' information security investment has recently become a critical issue in the management of IT infrastructure. Prior studies have not considered attack types and firms interconnection simultaneously when investigating the optimisation of such investment. Using game theory, we demonstrate that the optimal security investment level of an interconnected firm against targeted attacks is different from that against opportunistic attacks. Our model shows that not all information security risks are worth fighting against. As the potential loss increases, it is unadvisable to increase the security investment proportionately. Firms should increase investments with intrinsic vulnerability when facing target attacks, but focus on those systems that fall into the midrange of intrinsic vulnerability when facing opportunistic attacks. Firms are unwilling to invest in security and often offload reliability problems onto others when the trusted interdependence relationship becomes tighter in the absence of economic incentives. Thus we also discuss two economic incentives to motivate firms: liability and security information sharing. We find-that if the rules are set properly, both economic incentives are effective to not only internalise the negative externality and improve a firm's security level, but also reduce the total expected cost. We show that firms' optimal investments of liability always increase with the increasing number of firms, but the optimal investments on security information sharing increase only when the number of firms is large enough. These insights draw attention to many trade-offs firms often face and the importance of accurate assessment of firms' security environment. Future research directions are discussed based on the limitations and possible extensions of this study. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:6132 / 6146
页数:15
相关论文
共 50 条
  • [21] Information sharing and security investment for substitutable firms: A game-theoretic analysis
    Gao, Xing
    Gong, Siyu
    Wang, Ying
    Zhang, Yanfang
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2024, 75 (04) : 799 - 820
  • [22] A Game Theoretical Vulnerability Analysis of Adversarial Attack
    Hossain, Khondker Fariha
    Tavakkoli, Alireza
    Sengupta, Shamik
    [J]. ADVANCES IN VISUAL COMPUTING, ISVC 2022, PT II, 2022, 13599 : 369 - 380
  • [23] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [24] A Hierarchical Network Security Risk Assessment Method Based on Vulnerability Attack Link Generated
    Yang, Jungang
    Liang, Li
    Yang, Yanfeng
    Zhu, Guangliang
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 113 - 118
  • [25] ENHANCING INDUSTRIAL CONTROL NETWORK SECURITY THROUGH VULNERABILITY DETECTION AND ATTACK GRAPH ANALYSIS
    Liao, Yan
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 65 - 74
  • [26] DG Impact on Investment Deferral: Network Planning and Security of Supply
    Wang, David T. -C.
    Ochoa, Luis F.
    Harrison, Gareth P.
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2010, 25 (02) : 1134 - 1141
  • [27] DG Impact on Investment Deferral: Network Planning and Security of Supply
    Wang, David T-C.
    Ochoa, Luis
    Harrison, Gareth
    [J]. IEEE POWER AND ENERGY SOCIETY GENERAL MEETING 2010, 2010,
  • [28] Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
    Goel, Sanjay
    Nussbaum, Brian
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 1082 - 1093
  • [29] Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection
    Xia, Siqi
    Rajasegarar, Sutharshan
    Leckie, Christopher
    Erfani, Sarah M.
    Chan, Jeffrey
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 105 - 119
  • [30] An evolutionary game-theoretic analysis of enterprise information security investment based on information sharing platform
    Li, Xiaotong
    [J]. MANAGERIAL AND DECISION ECONOMICS, 2022, 43 (03) : 595 - 606