Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation

Li Wang, S. Iyengar, Amith K. Belman, P. Sniatala, V. Phoha, C. Wan
{"title":"Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation","authors":"Li Wang, S. Iyengar, Amith K. Belman, P. Sniatala, V. Phoha, C. Wan","doi":"10.1145/3409959","DOIUrl":null,"url":null,"abstract":"Potential for huge loss from malicious exploitation of software calls for development of principles of cyber-insurance. Estimating what to insure and for how much and what might be the premiums poses challenges because of the uncertainties, such as the timings of emergence and lethality of malicious apps, human propensity to favor ease by giving more privilege to downloaded apps over inconvenience of delay or functionality, the chance of infection determined by the lifestyle of the mobile device user, and the monetary value of the compromise of software, and so on. We provide a theoretical framework for cyber-insurance backed by game-theoretic formulation to calculate monetary value of risk and the insurance premiums associated with software compromise. By establishing the conditions for Nash equilibrium between strategies of an adversary and software we derive probabilities for risk, potential loss, gain to adversary from app categories, such as lifestyles, entertainment, education, and so on, and their prevalence ratios. Using simulations over a range of possibilities, and using publicly available malware statistics, we provide insights about the strategies that can be taken by the software and the adversary. We show the application of our framework on the most recent mobile malware data (2018 ISTR report—data for the year 2017) that consists of the top five Android malware apps: Malapp, Fakeinst, Premiumtext, Maldownloader, and Simplelocker and the resulting leaked phone number, location information, and installed app information. Uniqueness of our work stems from developing mathematical framework and providing insights of estimating cyber-insurance parameters through game-theoretic choice of strategies and by showing its efficacy on a recent real malicious app data. These insights will be of tremendous help to researchers and practitioners in the security community.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Threats: Research and Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3409959","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Potential for huge loss from malicious exploitation of software calls for development of principles of cyber-insurance. Estimating what to insure and for how much and what might be the premiums poses challenges because of the uncertainties, such as the timings of emergence and lethality of malicious apps, human propensity to favor ease by giving more privilege to downloaded apps over inconvenience of delay or functionality, the chance of infection determined by the lifestyle of the mobile device user, and the monetary value of the compromise of software, and so on. We provide a theoretical framework for cyber-insurance backed by game-theoretic formulation to calculate monetary value of risk and the insurance premiums associated with software compromise. By establishing the conditions for Nash equilibrium between strategies of an adversary and software we derive probabilities for risk, potential loss, gain to adversary from app categories, such as lifestyles, entertainment, education, and so on, and their prevalence ratios. Using simulations over a range of possibilities, and using publicly available malware statistics, we provide insights about the strategies that can be taken by the software and the adversary. We show the application of our framework on the most recent mobile malware data (2018 ISTR report—data for the year 2017) that consists of the top five Android malware apps: Malapp, Fakeinst, Premiumtext, Maldownloader, and Simplelocker and the resulting leaked phone number, location information, and installed app information. Uniqueness of our work stems from developing mathematical framework and providing insights of estimating cyber-insurance parameters through game-theoretic choice of strategies and by showing its efficacy on a recent real malicious app data. These insights will be of tremendous help to researchers and practitioners in the security community.
基于博弈论的网络保险覆盖移动恶意软件开发的潜在损失
恶意利用软件可能造成巨大损失,因此需要制定网络保险原则。由于各种不确定性,比如恶意应用出现的时间和杀伤力,人们倾向于给下载的应用提供更多特权,而不是延迟或功能带来的不便,移动设备用户的生活方式决定了感染的可能性,以及软件泄露的货币价值等,估计保险内容、保险金额和可能的保费构成了挑战。我们提供了一个以博弈论公式为支持的网络保险理论框架,以计算风险的货币价值和与软件损害相关的保险费。通过建立对手和软件策略之间的纳什均衡条件,我们可以从应用类别(如生活方式、娱乐、教育等)中获得对手的风险、潜在损失和收益的概率,以及它们的流行率。通过对一系列可能性进行模拟,并使用公开可用的恶意软件统计数据,我们提供了有关软件和对手可以采取的策略的见解。我们展示了我们的框架在最新移动恶意软件数据(2018年ISTR报告- 2017年数据)上的应用,其中包括五大Android恶意软件应用:Malapp、Fakeinst、Premiumtext、Maldownloader和Simplelocker,以及由此泄露的电话号码、位置信息和安装的应用信息。我们工作的独特性源于开发数学框架,并通过博弈论策略选择提供估计网络保险参数的见解,并通过展示其对最近真实恶意应用程序数据的有效性。这些见解将对安全社区的研究人员和实践者提供巨大的帮助。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信