Effect of Security Investment on Evolutionary Games

نویسندگان

  • Chen Zhang
  • Rong Pan
  • Abhijit Chaudhury
  • Changxin Xu
چکیده

In this paper, we propose an evolutionary game model to analyze the investment decision making process in the cyber offender-defender interaction and provide a quantified approach for defender to calculate the safety threshold to avoid the occurrence of offender-leading game. Then we use simulation as a workbench to discuss the adjustment of each parameter to the security investment threshold. Our evolutionary game model shows that the cyber offender-defender game can possibly reach one realistic stable point after a long-term evolution, which implicates a tied offender-defender game. We found that an offender-leading game can be avoided by maintaining the security investment above a safety threshold level determined by the system vulnerability among other environmental parameters such as residual risk and potential loss. Hence with an optimal level of security investment, the defender can lead the game effectively to discourage attacking attempts. Both linear and nonlinear simulations share similar trends and our evolutionary game theoretic analysis remains valid in either case.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

National Security and Economic Growth

D uring the past few decades, national security plays a central role in the process of economic development. Also, foreign investment and trade have rapidly increased worldwide and have enhanced economic growth in developing countries. Although foreign investment and trade bring huge economic benefits, many developing countries fear that by opening up markets to competition and forei...

متن کامل

The Lobbying, Bribery, and Compliance: An Evolutionary Model of Social Factors

Abstract Connecting to rule-makers in order to set favorable rules (lobbying) or paying government executives to bend the current rule (bribing) are the two main strategies for influencing government. This study in an evolutionary game model explain why bribing may become widespread while other states like compliance and cooperative lobbying are Pareto superior. The theoretical model is used ...

متن کامل

Domino Effects within a Chemical Cluster: An Evolutionary Game Approach

In a chemical cluster, there are a large number of enterprises, which are adjacent, so that their risk not only depends on own risk management strategies, but also on those of all others. With this, how to prevent domino effect is becoming more and more essential. Consider external domino effects, while some enterprises take a certain level of security investment, there is a certain probability...

متن کامل

Investment in Information Security Measures: A Behavioral Investigation

In a pilot study, we employed a series of novel economic games to investigate the underexplored behavioral aspects of security investment decisions and security investment structure decisions (i.e., budgeting the security expenditure among different types of security measures). In our study, decision makers exhibited a bias toward investing in prevention even though investing in detection and r...

متن کامل

UPFC Siting and Sizing in Power Network Using Two Different Evolutionary Algorithm

In emerging electric power systems, increased transactions often lead to the situations where the system no longer remains in secure operating region. The flexible Ac transmission system (FACTS) controllers can play an important role in the power system security enhancement. However, due to high capital investment, it is necessary to locate these controllers optimally in the power system. FACTS...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2014