A Framework for a Game Theoretic Model for Cyber Treats Prevention

  • Adisa S. Philip
  • Caleb O. Akanbi
  • Ibrahim K. Ogundoyin

Abstract

The dynamic nature of cyber treats presents formidable challenges in thwarting and managing cyberspace. Conventional security measures often lag-behind swiftly evolving tactics employed by cybercriminals, necessitating a more proactive approach. This paper introduces a framework that advocates for the integration of game theory models to introduce strategies for preventing cyber threats. The framework explores how attackers and defenders interact in cyber fields using ideas from noncooperative non-zero-sum game theory and linear algebra. By comprehensively analyzing and modeling the decision-making processes of both parties, it becomes possible to implement proactive measures that fortify cybersecurity defense. Two distinct performance metrics—residual energy and success rate—were used to assess the model's effectiveness. The results show that, under realistic assumptions, the developed model achieved an excellent success rate of 99.65% and better residual energy compared to three other fixed-strategy defense systems. This implies that a noncooperative non-zero-sum approach can used to improve the system's defense against cyber threats.

References

Abu-Rahmeh, A., Alsmadi, I., & Chaudhry, S. A. (2021). Detection and classification of malware using machine learning: A survey. IEEE Access, 9, 38406-38426.

Amadi Emmanuuel Chukwudi, Eze Udoka, & Ikerionwu Charles. (2017). Game Theory Basics and Its Application in Cyber Security. Advances in Wireless Communications and Networks, 3(4), 45. https://doi.org/10.11648/j.awcn.20170304.13

Attiah, A., Chatterjee, M., & Zou, C. C. (2018). A Game Theoretic Approach to Model Cyber Attack and Defense Strategies.

Iqbal, A., Gunn, L. J., Guo, M., Ali, B. M., & Abbott, D. (2019). Game theoretical modelling of network/cybersecurity. IEEE Access. https://doi.org/10.1109/ACCESS.2019.294835

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993. https://doi.org/10.1016/j.jcss.2014.02.005.

Ji, Y., Yu, L., Li, S., & Zhang, X. (2022). Artificial Intelligence-Based Cybersecurity Defense Technologies: Advances, Challenges, and Opportunities. IEEE Transactions on Big Data, 8(3), 808-822.

Johnson, R., & Martinez, S. (2022). Cyber attacks targeting physical systems: A comprehensive analysis. Journal of Cybersecurity, 12(4), 345-362.

Krejci, R. (2011). Network Security Monitoring of Smart Home System. Czech Republic: Masaryk University.

Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys and Tutorials, 15(1), 472–486. https://doi.org/10.1109/ SURV.2012. 062612. 00056

Myerson, R. B. (1991). Game Theory. Harvard University Press. Available: https://books.google.com.ng/books?id=1w5PAAAAMAAJ.

Rathore, S., Kim, D. H., & Baik, D. K. (2020). Cybersecurity Risks and Countermeasures in the Era of Industrial IoT. IEEE Communications Surveys & Tutorials.

Sokri, A. (2018). Optimal Resource Allocation in Cyber-Security: A Game Theoretic Approach. Procedia Computer Science, 134, 283–288. https://doi.org/10.1016/j.procs.2018.07.172

Sokri, A. (2020). Game theory and cyber defense. In International Series in Operations Research and Management Science, 280, 335–352. Springer New York LLC. https://doi.org/10.1007/978-3-030-19107-8_18.

Thomas, R., et al. (2023). Building a resilient cybersecurity framework: Best practices for organizations. Journal of Information Assurance and Security, 18(2), 91-108.

Zarreh, A., Wan, H. da, Lee, Y., Saygin, C., & al Janahi, R. (2019). Risk assessment for cybersecurity of manufacturing systems: A game theory approach. Procedia Manufacturing, 38, 605–612. https://doi.org/10.1016/j.promfg.2020.01.077.

Zhang, Y., & Malacaria, P. (2021). Bayesian Stackelberg games for cyber-security decision support. Decision Support Systems, 148. https://doi.org/10.1016/j.dss.2021.113599.

Published
2024-07-01