Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity

Due to the recent cyber attacks, cybersecurity is becoming more critical in modern society. A single attack (e.g., WannaCry ransomware attack) can cause as much as $4 billion in damage. However, the cybersecurity investment by companies is far from satisfactory. Therefore, governments (e.g., in the...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Xinrun, AN, Bo, CHAN, Hau
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2019
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9151
https://ink.library.smu.edu.sg/context/sis_research/article/10154/viewcontent/0834_pvoa.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10154
record_format dspace
spelling sg-smu-ink.sis_research-101542024-08-01T09:16:42Z Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity WANG, Xinrun AN, Bo CHAN, Hau Due to the recent cyber attacks, cybersecurity is becoming more critical in modern society. A single attack (e.g., WannaCry ransomware attack) can cause as much as $4 billion in damage. However, the cybersecurity investment by companies is far from satisfactory. Therefore, governments (e.g., in the UK) launch grants and subsidies to help companies to boost their cybersecurity to create a safer national cyber environment. The allocation problem is hard due to limited subsidies and the interdependence between self-interested companies and the presence of a strategic cyber attacker. To tackle the government's allocation problem, we introduce a Stackelberg game-theoretic model where the government first commits to an allocation and the companies/users and attacker simultaneously determine their protection and attack (pure or mixed) strategies, respectively. For the pure-strategy case, while there may not be a feasible allocation in general, we prove that computing an optimal allocation is NP-hard and propose a linear reverse convex program when the attacker can attack all users. For the mixed-strategy case, we show that there is a polynomial time algorithm to find an optimal allocation when the attacker has a single-attack capability. We then provide a heuristic algorithm, based on best-response-gradient dynamics, to find an effective allocation in the general setting. Experimentally, we show that our heuristic is effective and outperforms other baselines on synthetic and real data. 2019-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9151 info:doi/10.24963/ijcai.2019/834 https://ink.library.smu.edu.sg/context/sis_research/article/10154/viewcontent/0834_pvoa.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Artificial Intelligence and Robotics Information Security Theory and Algorithms
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Artificial Intelligence and Robotics
Information Security
Theory and Algorithms
spellingShingle Artificial Intelligence and Robotics
Information Security
Theory and Algorithms
WANG, Xinrun
AN, Bo
CHAN, Hau
Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity
description Due to the recent cyber attacks, cybersecurity is becoming more critical in modern society. A single attack (e.g., WannaCry ransomware attack) can cause as much as $4 billion in damage. However, the cybersecurity investment by companies is far from satisfactory. Therefore, governments (e.g., in the UK) launch grants and subsidies to help companies to boost their cybersecurity to create a safer national cyber environment. The allocation problem is hard due to limited subsidies and the interdependence between self-interested companies and the presence of a strategic cyber attacker. To tackle the government's allocation problem, we introduce a Stackelberg game-theoretic model where the government first commits to an allocation and the companies/users and attacker simultaneously determine their protection and attack (pure or mixed) strategies, respectively. For the pure-strategy case, while there may not be a feasible allocation in general, we prove that computing an optimal allocation is NP-hard and propose a linear reverse convex program when the attacker can attack all users. For the mixed-strategy case, we show that there is a polynomial time algorithm to find an optimal allocation when the attacker has a single-attack capability. We then provide a heuristic algorithm, based on best-response-gradient dynamics, to find an effective allocation in the general setting. Experimentally, we show that our heuristic is effective and outperforms other baselines on synthetic and real data.
format text
author WANG, Xinrun
AN, Bo
CHAN, Hau
author_facet WANG, Xinrun
AN, Bo
CHAN, Hau
author_sort WANG, Xinrun
title Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity
title_short Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity
title_full Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity
title_fullStr Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity
title_full_unstemmed Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity
title_sort who should pay the cost: a game-theoretic model for government subsidized investments to improve national cybersecurity
publisher Institutional Knowledge at Singapore Management University
publishDate 2019
url https://ink.library.smu.edu.sg/sis_research/9151
https://ink.library.smu.edu.sg/context/sis_research/article/10154/viewcontent/0834_pvoa.pdf
_version_ 1814047756801540096