2023
DOI: 10.3390/g14020020
|View full text |Cite
|
Sign up to set email alerts
|

Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware

Abstract: In this paper, we present a game-theoretic analysis of ransomware. To this end, we provide theoretical and empirical analysis of a two-player Attacker-Defender (A-D) game, as well as a Defender-Insurer (D-I) game; in the latter, the attacker is assumed to be a non-strategic third party. Our model assumes that the defender can invest in two types of protection against ransomware attacks: (1) general protection through a deterrence effort, making attacks less likely to succeed, and (2) a backup effort serving th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…Developing customizable, dynamic decoys indistinguishable from genuine data at scale is an open problem [28,58]. Moreover, data exfiltration prior to encryption leaves minimal time between decoy-based detection and actual data loss [59,16]. Hence decoys should focus on disrupting this initial exfiltration stage [60,52].…”
Section: Current Decoy File Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Developing customizable, dynamic decoys indistinguishable from genuine data at scale is an open problem [28,58]. Moreover, data exfiltration prior to encryption leaves minimal time between decoy-based detection and actual data loss [59,16]. Hence decoys should focus on disrupting this initial exfiltration stage [60,52].…”
Section: Current Decoy File Techniquesmentioning
confidence: 99%
“…Early decoy-based defenses against ransomware involved basic "honeyfiles" -fake files left as bait across networks [49,50]. Access attempts would trigger alerts to indicate malicious activity [51].…”
Section: Current Decoy File Techniquesmentioning
confidence: 99%
“…The game-theoretic analysis of ransomware in this paper assumes that the defender can invest in two types of ransomware protection: (1) general protection due to deterrence effort, which reduces the probability of infection, and (2) a backup plan that enables the user to recover from the infection [74]. Based on the general consensus among security experts [71] that "96% of those whose data were encrypted obtained their data back in the most significant ransomware attack," and that "only 8% (of those who paid) obtained all their data back," we constructed a payoff matrix, as seen Figure 2.…”
Section: Modeling Virlock With Game Theorymentioning
confidence: 99%
“…We remark that our paper adds to a growing literature using game theory to analyse the ransomware decision process [4,5,9,13]. Prior game-theoretical studies have focused on the interaction of ransomware and victim's decision to invest in security measures like backups or insurance [2,32,36,38]. For instance, Laszka, Farhang and Grossklags [17] focused on modeling the ransomware ecosystem as a whole and how backup decisions affect the ransomware ecosystem.…”
Section: Introductionmentioning
confidence: 97%