Game of information security investment: Impact of attack types and network vulnerability

被引:45
|
作者
Wu, Yong [1 ,2 ]
Feng, Gengzhong [1 ,3 ]
Wang, Nengmin [1 ,3 ]
Liang, Huigang [4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Management, Xian 710049, Shaanxi, Peoples R China
[2] City Univ Hong Kong, Dept Syst Engn & Engn Management, Hong Kong, Hong Kong, Peoples R China
[3] Minist Educ Proc Control & Efficiency Engn, Key Lab, Xian 710049, Shaanxi, Peoples R China
[4] E Carolina Univ, Coll Business, Dept Management Informat Syst, Greenville, NC 27858 USA
关键词
Information security investment; Attack types; Network vulnerability; Game theory; Economic incentives; ECONOMICS; RISKS;
D O I
10.1016/j.eswa.2015.03.033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The level of firms' information security investment has recently become a critical issue in the management of IT infrastructure. Prior studies have not considered attack types and firms interconnection simultaneously when investigating the optimisation of such investment. Using game theory, we demonstrate that the optimal security investment level of an interconnected firm against targeted attacks is different from that against opportunistic attacks. Our model shows that not all information security risks are worth fighting against. As the potential loss increases, it is unadvisable to increase the security investment proportionately. Firms should increase investments with intrinsic vulnerability when facing target attacks, but focus on those systems that fall into the midrange of intrinsic vulnerability when facing opportunistic attacks. Firms are unwilling to invest in security and often offload reliability problems onto others when the trusted interdependence relationship becomes tighter in the absence of economic incentives. Thus we also discuss two economic incentives to motivate firms: liability and security information sharing. We find-that if the rules are set properly, both economic incentives are effective to not only internalise the negative externality and improve a firm's security level, but also reduce the total expected cost. We show that firms' optimal investments of liability always increase with the increasing number of firms, but the optimal investments on security information sharing increase only when the number of firms is large enough. These insights draw attention to many trade-offs firms often face and the importance of accurate assessment of firms' security environment. Future research directions are discussed based on the limitations and possible extensions of this study. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:6132 / 6146
页数:15
相关论文
共 50 条
  • [31] Decision making of optimal investment in information security for complementary enterprises based on game theory
    Li, Xiaotong
    TECHNOLOGY ANALYSIS & STRATEGIC MANAGEMENT, 2021, 33 (07) : 755 - 769
  • [32] Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
    Zhao, Xuhua
    International Journal of Network Security, 2020, 22 (06) : 1037 - 1042
  • [33] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1773 - 1774
  • [34] The Economics of Information Security Investment
    Wang, Heng
    ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEM, PTS 1-6, 2011, 219-220 : 1550 - 1553
  • [35] Protecting shared information in networks: A network security game with strategic attacks
    de Witte, Bram
    Frasca, Paolo
    Overvest, Bastiaan
    Timmer, Judith
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4255 - 4277
  • [36] Game Theory and Information Security
    Meng Xianghong
    Wang Xiaoli
    ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1625 - +
  • [37] Power Analysis Attack: A Vulnerability to Smart Card Security
    Mahanta, Hridoy Jyoti
    Azad, Abul Kalam
    Khan, Ajoy Kumar
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2015, : 506 - 510
  • [38] Vulnerability Analysis for Simultaneous Attack in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2017 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2017,
  • [39] A survey on EOSIO systems security: vulnerability, attack, and mitigation
    Ningyu He
    Haoyu Wang
    Lei Wu
    Xiapu Luo
    Yao Guo
    Xiangqun Chen
    Frontiers of Computer Science, 2025, 19 (6)
  • [40] Analysis of Network Attack Technologies and Network Security
    Pei, Xu
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 111 - 114