...
首页> 外文期刊>JISTEM - Journal of Information Systems and Technology Management >A STRATEGIC ANALYSIS OF INFORMATION SHARING AMONG CYBER HACKERS
【24h】

A STRATEGIC ANALYSIS OF INFORMATION SHARING AMONG CYBER HACKERS

机译:网络黑客之间信息共享的战略分析

获取原文
           

摘要

ABSTRACTWe build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm's vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker's attack and information sharing are strategic complements while one hacker's attack and the other hacker's information sharing are strategic substitutes. As the firm's unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm's defense and profit decrease, and the hackers’ information sharing and profit increase. The firm's profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and, moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm's investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm's investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm's asset causes all the variables to increase linearly, except information sharing which is constant. We extend our analysis to endogenize the firm's asset and this analysis largely confirms the preceding analysis with a fixed asset. We use the software Mathematica 10.1 (www.wolfram.com) to program the model mathematically with equilibrium constraints, and perform numerical analysis illustrated graphically.
机译:摘要我们建立了一个博弈论模型,其中的市场设计是这样的:一家公司投资于安全性以抵御两名黑客的网络攻击。该公司拥有一项资产,该资产将根据其竞争成功情况分配给三个市场参与者。每个黑客都会选择一种最佳攻击方式,并且他们彼此共享有关公司漏洞的信息。每个黑客都喜欢接收信息,但是传递信息会给另一个黑客带来竞争优势。我们发现,每个黑客的攻击和信息共享都是战略补充,而一个黑客的攻击和另一位黑客的信息共享则是战略替代。随着公司的单位防御成本的增加,攻击呈倒U形并达到零,而公司的防御和利润下降,黑客的信息共享和利润增加。公司的利润增加了黑客的单位攻击成本,而黑客的信息共享和利润却减少了。我们的分析还揭示了有趣的结果,即黑客的累计攻击级别不受其间信息共享有效性的影响,而且不受联合信息共享强度的影响。我们还发现,随着黑客之间信息共享的有效性相对于攻击投资的增加,公司在网络安全防御和利润方面的投资是恒定的,黑客在攻击方面的投资减少了,信息共享水平和黑客利润也在增加。相反,随着联合信息共享强度的增加,尽管公司在网络安全防御和利润方面的投资保持不变,但黑客在攻击方面的投资却在增加,黑客的信息共享水平和利润在下降。公司资产的增加会导致所有变量线性增加,但信息共享是恒定的。我们将分析扩展到对公司资产进行内生化,该分析在很大程度上确认了先前使用固定资产进行的分析。我们使用软件Mathematica 10.1(www.wolfram.com)对带有平衡约束的数学模型进行编程,并进行图形化的数值分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号