A Reputation Game on Cyber-Security and Cyber-Risk Calibration

被引:2
|
作者
Han, Kookyoung [1 ]
Choi, Jin Hyuk [2 ]
机构
[1] Pusan Natl Univ, Dept Econ, Busan, South Korea
[2] Ulsan Natl Inst Sci & Technol, Dept Math Sci, Ulsan, South Korea
来源
APPLIED MATHEMATICS AND OPTIMIZATION | 2022年 / 85卷 / 02期
基金
新加坡国家研究基金会;
关键词
Stochastic control; Cyber-security; Reputation game; Bayesian learning; Optimal stopping; RADNER EQUILIBRIUM; INFORMATION; MODEL;
D O I
10.1007/s00245-022-09851-6
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
To analyze strategic interactions arising in the cyber-security context, we develop a new reputation game model in which an attacker can pretend to be a normal user and a defender may have to announce attack detection at a certain point of time without knowing whether he has been attacked. We show the existence and uniqueness of sequential equilibrium in Markov strategies, and explicitly characterize the players' equilibrium strategies. Using our model, we suggest empirical and theoretical ways of calibrating the attack probability, which is an important element of cyber-risks.
引用
收藏
页数:31
相关论文
共 50 条
  • [41] Self-Healing for Cyber-Security
    Gijsen, Bart
    Montalto, Ruggero
    Panneman, Jeffrey
    Falconieri, Federico
    Wiper, Paul
    Zuraniewski, Piotr
    [J]. 2021 SIXTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2021, : 84 - 90
  • [42] Physical Cyber-Security of SCADA Systems
    Bichmou, Ahmed
    Chiocca, Joseph
    Hernandez, Leonarndo
    Hoffmann, R. Wade
    Horsham, Brandon
    Huy Lam
    McKinsey, Vince
    Bibyk, Steven
    [J]. PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 243 - 248
  • [43] Pennsylvania starts cyber-security initiative
    不详
    [J]. COMPUTERS & SECURITY, 2001, 20 (08) : 650 - 650
  • [44] The cyber-security challenge at the connected industry
    Garcia-Bringas, Pablo
    Angulo, Ignacio
    Goti-Elordi, Aitor
    Pastor, Iker
    [J]. DYNA, 2019, 94 (03): : 258 - 261
  • [45] Strategic Communication for Supporting Cyber-Security
    Kuusisto, Tuija
    Kuusisto, Rauno
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 72 - 79
  • [46] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [47] Special Issue on Cyber-Security for Development
    Osei-Bryson, Kweku-Muata
    Vogel, Doug
    [J]. INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2014, 20 (02) : 93 - 95
  • [48] Cultural and psychological factors in cyber-security
    Halevi, Tzipora
    Memon, Nasir
    Lewis, James
    Kumaraguru, Ponnurangam
    Arora, Sumit
    Dagar, Nikita
    Aloul, Fadi
    Chen, Jay
    [J]. Journal of Mobile Multimedia, 2017, 13 (1-2): : 43 - 56
  • [49] A genetic epidemiology approach to cyber-security
    Gil, Santiago
    Kott, Alexander
    Barabasi, Albert-Laszlo
    [J]. SCIENTIFIC REPORTS, 2014, 4
  • [50] A genetic epidemiology approach to cyber-security
    Santiago Gil
    Alexander Kott
    Albert-László Barabási
    [J]. Scientific Reports, 4