首页> 外文期刊>Information systems frontiers >Interdependency Analysis in Security Investment against Strategic Attacks
【24h】

Interdependency Analysis in Security Investment against Strategic Attacks

机译:安全投资抵御战略攻击的相互依赖性分析

获取原文
获取原文并翻译 | 示例
           

摘要

Information security investment is of high importance in management of IT infrastructure. There are many researches focused on game theoretical modeling and analysis of security investment of interdependent firms against potential security attacks. However, these studies usually are not concerned with dynamic and strategic nature of attacks which are increasingly important features of today's cyber systems. Strategic attackers are those who are able to substitute their investments among targets over time by shifting investments towards poorly protected targets in order to obtain more potential financial gains. In this paper we try to analyze the effects of interdependency in security investment of firms against strategic attackers. Note that although there are a limited number of works that consider the strategic nature of attack, they model the defenders as a set of isolated nodes. Hence the positive externality caused by interconnection of the firms is not considered in these models. We consider both the attackers' actual strategic behaviors (that causes negative externality via the possibility of substituting the target) as well as structural effects of the networked firms (that leads to positive externality via attack propagation). We propose a differential game among the networked firms in which attackers act strategically. In the proposed game, by employing a linear substitution model for characterizing the process of target selection by the attacker, the open-loop Nash solutions are highlighted in an analytical form. The analytical results show how interconnectivity between firms and the strategic behavior of the attacker determines the firms' incentives for security investment. It is shown that overinvestment or underinvestment could occur depending on the degree of interdependency among the given firms. Accordingly we designed mechanisms to encourage the firms to invest at a socially optimal level. The achieved results in this paper helps security designers to better formulate their policies in tackling strategic attackers.
机译:信息安全投资在IT基础架构管理中非常重要。有许多研究集中在博弈论建模和相互依赖的公司针对潜在安全攻击的安全投资分析上。但是,这些研究通常与攻击的动态和战略性质无关,攻击的动态和战略性质已成为当今网络系统越来越重要的特征。战略攻击者是能够随着时间的推移,通过将投资转向保护不力的目标,以获得更多潜在的财务收益,从而在目标之间替代其投资的人。在本文中,我们试图分析相互依存关系对公司针对战略攻击者的证券投资的影响。请注意,尽管考虑到攻击的战略性质的工作数量有限,但他们将防御者建模为一组孤立的节点。因此,在这些模型中没有考虑到由企业相互联系引起的正外部性。我们既考虑了攻击者的实际战略行为(通过替代目标而导致了负面的外部性),也考虑了网络公司的结构效应(通过攻击的传播而导致了积极的外部性)。我们提出了网络公司之间的差异博弈,其中攻击者采取战略行动。在提出的游戏中,通过采用线性替换模型来表征攻击者选择目标的过程,开环纳什解决方案以分析形式突出显示。分析结果表明,企业之间的相互关系和攻击者的战略行为如何决定企业进行证券投资的动机。结果表明,取决于给定公司之间的相互依赖程度,可能会发生过度投资或投资不足。因此,我们设计了鼓励企业在社会最优水平上进行投资的机制。本文取得的成果可帮助安全设计人员更好地制定其策略以应对战略攻击者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号