Economics of Malware : Epidemic Risks
نویسنده
چکیده
Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impact are also influenced by the decisions of legitimate end users. Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arising from the presence of network externalities. Our goal in this paper is to model and quantify the impact of such externalities on the investment in security features in a network. We study a network of interconnected agents, which are subject to epidemic risks such as those caused by propagating viruses and worms. Each agent can decide whether or not to invest some amount to self-protect and deploy security solutions which decreases the probability of contagion. Borrowing ideas from random graphs theory, we solve explicitly this ’micro’-model and compute the fulfilled expectations equilibria. We are able to compute the network externalities as a function of the parameters of the epidemic. We show that the network externalities have a public part and a private one. As a result of this separation, some counter-intuitive phenomena can occur: there are situations where the incentive to invest in self-protection decreases as the fraction of the population investing in self-protection increases. In a situation where the protection is strong and ensures that the protected agent cannot be harmed by the decision of others, we show that the situation is similar to a free-rider problem. In a situation where the protection is weaker, then we show that the network can exhibit critical mass. We also look at interaction with the security supplier. In the case where security is provided by a monopolist, we show that the monopolist is taking advantage of these positive network externalities by providing a low quality protection. JEL classification: D85, C70, D62, C45, L10.
منابع مشابه
An agent-based model to simulate coordinated response to malware outbreak within an organisation
Malware is a major threat to organizations. It incurs significant resources to contain their malicious activities. It affects business continuity and induces risks to organizations. Current anti-Malware solutions are proving to be ineffective against modern Malware. Malware is being custom built to circumvent deployed defences against specific organizations or individuals belonging to certain o...
متن کاملGenetic Algorithm Modeling Approach for Mobile Malware Evolution Forecasting
Mobile malware is a relatively new but constantly increasing threat to information security and modern means of communication. Mobile malware evolution speedup is highly expected due to the increase of the SmartPhone and other mobile device market and malware development shift from vandalism to economic aspect. Forecasting evolution tendencies is important for development of countermeasure tech...
متن کاملMalware variant detection
Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies and statistics show that the impact of malware is getting worse. Malware detectors are the primary tools in the defence against malware. Most commercial anti-malware scanners maintain a database of malware patterns and heuristic signatures for detecting malicious programs within a computer system. Malware w...
متن کاملEvaluation and Ranking of Citrus Gardens’ Risks Using TOPSIS Method (Case Study: East of Mazandaran Province)
Citrus production has a great importance and position in Iran. The growth and sustainability of the agriculture sector is impossible without appropriate and effective risk identification and management. In this study, the main risks of citrus gardens were identified based on the Delphi method through questionnaires completed by 16 experts. Then, using the TOPSIS technique, the risks involved in...
متن کاملEquilibria in Epidemic Containment Games
The spread of epidemics and malware is commonly modeled by diffusion processes on networks. Protective interventions such as vaccinations or installing anti-virus software are used to contain their spread. Typically, each node in the network has to decide its own strategy of securing itself, and its benefit depends on which other nodes are secure, making this a natural game-theoretic setting. T...
متن کامل