To pay or not: game theoretic models of ransomware

被引:26
|
作者
Cartwright, Edward [1 ]
Castro, Julio Hernandez [2 ]
Cartwright, Anna [3 ]
机构
[1] De Montfort Univ, Dept Strateg Management & Mkt, Leicester LE1 9BH, Leics, England
[2] Univ Kent, Sch Comp, Canterbury, Kent, England
[3] Coventry Univ, Sch Econ Finance & Accounting, Coventry, W Midlands, England
来源
JOURNAL OF CYBERSECURITY | 2019年 / 5卷 / 01期
基金
英国工程与自然科学研究理事会;
关键词
ransomware; game theory; kidnapping; hostage; deterrence; HOSTAGE-TAKING;
D O I
10.1093/cybsec/tyz009
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Ransomware is a type of malware that encrypts files and demands a ransom from victims. It can be viewed as a form of kidnapping in which the criminal takes control of the victim's files with the objective of financial gain. In this article, we review and develop the game theoretic literature on kidnapping in order to gain insight on ransomware. The prior literature on kidnapping has largely focused on political or terrorist hostage taking. We demonstrate, however, that key models within the literature can be adapted to give critical new insight on ransomware. We primarily focus on two models. The first gives insight on the optimal ransom that criminals should charge. The second gives insight on the role of deterrence through preventative measures. A key insight from both models will be the importance of spillover effects across victims. We will argue that such spillovers point to the need for some level of outside intervention, by governments or otherwise, to tackle ransomware.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Game Theoretic Analysis of Ransomware: A Preliminary Study
    Baksi, Rudra Prasad
    Upadhyaya, Shambhu
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 242 - 251
  • [2] Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware
    Yin, Tongxin
    Sarabi, Armin
    Liu, Mingyan
    GAMES, 2023, 14 (02):
  • [3] Ransomware: Pay to Play?
    Kshetri, Nir
    Voas, Jeffrey
    COMPUTER, 2022, 55 (03) : 11 - 13
  • [4] Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception Architecture
    Baksi, Rudra Prasad
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS SUPPLEMENTAL VOLUME (DSN-S 2022), 2022, : 53 - 54
  • [5] Determination of ransomware payment based on Bayesian game models
    Fang, Rui
    Xu, Maochao
    Zhao, Peng
    COMPUTERS & SECURITY, 2022, 116
  • [6] On game-theoretic models of networks
    Bodlaender, HL
    Dinneen, MJ
    Khoussainov, B
    ALGORITHMS AND COMPUTATION, PROCEEDINGS, 2001, 2223 : 550 - 561
  • [7] GAME THEORETIC MODELS AND RESPECT FOR OWNERSHIP
    ARCHER, J
    BEHAVIORAL AND BRAIN SCIENCES, 1986, 9 (04) : 740 - 741
  • [8] Game Theoretic Models of Enterprises Financing
    Liang, Tong
    Tang, Wansheng
    INTERNATIONAL JOINT CONFERENCE ON COMPUTATIONAL SCIENCES AND OPTIMIZATION, VOL 2, PROCEEDINGS, 2009, : 808 - 811
  • [9] Game theoretic models for detecting network intrusions
    Otrok, Hadi
    Mehrandish, Mona
    Assi, Chadi
    Debbabi, Mourad
    Bhattacharya, Prabir
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 1934 - 1944
  • [10] Some game theoretic marketing attribution models
    Molina, Elisenda
    Tejada, Juan
    Weiss, Tom
    ANNALS OF OPERATIONS RESEARCH, 2022, 318 (02) : 1043 - 1075