Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance

Author(s):  
Deepak K. Tosh ◽  
Iman Vakilinia ◽  
Sachin Shetty ◽  
Shamik Sengupta ◽  
Charles A. Kamhoua ◽  
...  
2021 ◽  
Vol 2 (2) ◽  
pp. 1-24
Author(s):  
Li Wang ◽  
S. Sitharama Iyengar ◽  
Amith K. Belman ◽  
Paweł Śniatała ◽  
Vir V. Phoha ◽  
...  

Potential for huge loss from malicious exploitation of software calls for development of principles of cyber-insurance. Estimating what to insure and for how much and what might be the premiums poses challenges because of the uncertainties, such as the timings of emergence and lethality of malicious apps, human propensity to favor ease by giving more privilege to downloaded apps over inconvenience of delay or functionality, the chance of infection determined by the lifestyle of the mobile device user, and the monetary value of the compromise of software, and so on. We provide a theoretical framework for cyber-insurance backed by game-theoretic formulation to calculate monetary value of risk and the insurance premiums associated with software compromise. By establishing the conditions for Nash equilibrium between strategies of an adversary and software we derive probabilities for risk, potential loss, gain to adversary from app categories, such as lifestyles, entertainment, education, and so on, and their prevalence ratios. Using simulations over a range of possibilities, and using publicly available malware statistics, we provide insights about the strategies that can be taken by the software and the adversary. We show the application of our framework on the most recent mobile malware data (2018 ISTR report—data for the year 2017) that consists of the top five Android malware apps: Malapp, Fakeinst, Premiumtext, Maldownloader , and Simplelocker and the resulting leaked phone number, location information, and installed app information. Uniqueness of our work stems from developing mathematical framework and providing insights of estimating cyber-insurance parameters through game-theoretic choice of strategies and by showing its efficacy on a recent real malicious app data . These insights will be of tremendous help to researchers and practitioners in the security community.


2017 ◽  
pp. 120-130
Author(s):  
A. Lyasko

Informal financial operations exist in the shadow of official regulation and cannot be protected by the formal legal instruments, therefore raising concerns about the enforcement of obligations taken by their participants. This paper analyzes two alternative types of auxiliary institutions, which can coordinate expectations of the members of informal value transfer systems, namely attitudes of trust and norms of social control. It offers some preliminary approaches to creating a game-theoretic model of partner interaction in the informal value transfer system. It also sheds light on the perspectives of further studies in this area of institutional economics.


2018 ◽  
pp. 114-131
Author(s):  
O. Yu. Bondarenko

his article explores theoretical and experimental approach to modeling social interactions. Communication and exchange of information with other people affect individual’s behavior in numerous areas. Generally, such influence is exerted by leaders, outstanding individuals who have a higher social status or expert knowledge. Social interactions are analyzed in the models of social learning, game theoretic models, conformity models, etc. However, there is a lack of formal models of asymmetric interactions. Such models could help elicit certain qualities characterizing higher social status and perception of status by other individuals, find the presence of leader influence and analyze its mechanism.


2012 ◽  
Vol E95.B (10) ◽  
pp. 3345-3348
Author(s):  
Jiamin LI ◽  
Dongming WANG ◽  
Pengcheng ZHU ◽  
Lan TANG ◽  
Xiaohu YOU

Sign in / Sign up

Export Citation Format

Share Document