When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination

被引:49
|
作者
Mookerjee, Vijay [1 ]
Mookerjee, Radha [1 ]
Bensoussan, Alain [1 ]
Yue, Wei T. [2 ]
机构
[1] Univ Texas Dallas, Sch Management, Richardson, TX 75083 USA
[2] City Univ Hong Kong, Kowloon Tong, Hong Kong, Peoples R China
关键词
optimal security management; variable attack rates; hacker learning; security shocks; VULNERABILITY; SYSTEMS;
D O I
10.1287/isre.1100.0341
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper analyzes interactions between a firm that seeks to discriminate between normal users and hackers that try to penetrate and compromise the firm's information assets. We develop an analytical model in which a variety of factors are balanced to best manage the detection component within information security management. The approach not only considers conventional factors such as detection rate and false-positive rate, but also factors associated with hacker behavior that occur in response to improvements in the detection system made by the firm. Detection can be improved by increasing the system's discrimination ability (i.e., the ability to distinguish between attacks and normal usage) through the application of maintenance effort. The discrimination ability deteriorates over time due to changes in the environment. Also, there is the possibility of sudden shocks that can sharply degrade the discrimination ability. The firm's cost increases as hackers become more knowledgeable by disseminating security knowledge within the hacker population. The problem is solved to reveal the presence of a steady-state solution in which the level of system discrimination ability and maintenance effort are held constant. We find an interesting result where, under certain conditions, hackers do not benefit from disseminating security knowledge among one another. In other situations, we find that hackers benefit because the firm must lower its detection rate in the presence of knowledge dissemination. Other insights into managing detection systems are provided. For example, the presence of security shocks can increase or decrease the optimal discrimination level as compared to the optimal level without shocks.
引用
收藏
页码:606 / 623
页数:18
相关论文
共 19 条
  • [1] A differential game approach to information security investment under hackers' knowledge dissemination
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. OPERATIONS RESEARCH LETTERS, 2013, 41 (05) : 421 - 425
  • [2] Information Security Investment When Hackers Disseminate Knowledge
    Gao, Xing
    Zhong, Weijun
    Mei, Shue
    [J]. DECISION ANALYSIS, 2013, 10 (04) : 352 - 368
  • [3] COMPETITIVE INFORMATION SECURITY INVESTMENT UNDER HACKER KNOWLEDGE DISSEMINATION
    Gao, Xing
    [J]. JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2023, 19 (06) : 4199 - 4221
  • [4] When Hackers Err: The Impacts of False Positives on Information Security Games
    Mai, Bin
    Kulkarni, Shailesh
    [J]. DECISION ANALYSIS, 2018, 15 (02) : 90 - 109
  • [5] Towards Managing Information Security Knowledge Through Metamodelling Approach
    Baras, Doaa Saleh Abobakr
    Othman, Siti Hajar
    Ahmad, Mohammad Nazir
    Ithnin, Norafida
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 310 - 315
  • [6] Managing Information System Security Under Continuous and Abrupt Deterioration
    Bensoussan, Alain
    Mookerjee, Vijay
    Yue, Wei T.
    [J]. PRODUCTION AND OPERATIONS MANAGEMENT, 2020, 29 (08) : 1894 - 1917
  • [7] FDA policies on DTC advertising, off-label information dissemination under attack
    Wechsler, J
    [J]. FORMULARY, 1998, 33 (10) : 1033 - 1034
  • [8] BASE RATES, INDIVIDUATING INFORMATION, EXPERTISE, AND TRANSFER OF KNOWLEDGE IN JUDGMENT UNDER UNCERTAINTY
    HELMKAY, OS
    GEBOTYS, RJ
    [J]. CANADIAN PSYCHOLOGY-PSYCHOLOGIE CANADIENNE, 1994, 35 (2A): : 27 - 27
  • [9] Practical security of the continuous-variable quantum key distribution with real local oscillators under phase attack
    Huang, Biao
    Huang, Yongmei
    Peng, Zhenming
    [J]. OPTICS EXPRESS, 2019, 27 (15) : 20621 - 20631
  • [10] Security analysis of practical continuous-variable quantum key distribution systems under laser seeding attack
    Zheng, Yi
    Huang, Peng
    Huang, Anqi
    Peng, Jinye
    Zeng, Guihua
    [J]. OPTICS EXPRESS, 2019, 27 (19) : 27369 - 27384