Rational Theory of Information Security Battle: Economic Analysis of Preemptive Behavior
Makoto Goto and
Ken-ichi Tatsumi
No 303, Discussion paper series. A from Graduate School of Economics and Business Administration, Hokkaido University
Abstract:
We develop a model of a zero-sum information security game by introducing a reward function (called P-function) for cyber attackers into the models of Gordon and Leob (2002) and Tatsumi and Goto (2010). Then the preemptive behavior of cyber attackers or defenders is analyzed. The derivation of the optimal behavior is based on a real options theory and the properties are numerically calculated. Through our numerical analysis cyber attackers are turned out to be rational in the sense that they are very sensitive and quickly respond to both the monetary gain that they will obtain and the vulnerability of defenders. We further observe among others that, in many cases, defenders can optimally preempt. However, this is because attackers have no incentive to attack targets with a small monetary gain.
Keywords: information security investment; preemptive behavior; threat; optimal timing; real options theory (search for similar items in EconPapers)
Pages: 31 pages
Date: 2016-06
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
http://hdl.handle.net/2115/62344 (text/html)
https://eprints.lib.hokudai.ac.jp/dspace/bitstream/2115/62344/3/DPA303new.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:hok:dpaper:303
Access Statistics for this paper
More papers in Discussion paper series. A from Graduate School of Economics and Business Administration, Hokkaido University Contact information at EDIRC.
Bibliographic data for series maintained by Hokkaido University Library ().