Abstract

The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption that investment processes are significantly influenced by the behavior of parties involved in a cyber conflict.General approaches to model development are presented. First of all, the system of concepts, assumptions and limitations is formed, within the framework of which a mathematical model of behavior must be developed. Taking this into account, the mathematical model of the conflicting agents behavior, presented in the form of algebraic and differential equations, is developed. The developed model presents both the technical characteristics of the security system and the psychological characteristics of the participants in the cyber conflict, which affect the financial characteristics of the investment processes in cybersecurity systems. A distinctive feature of the proposed model is the simultaneous consideration of the behavior of the parties to a cyber conflict not as independent parties, but as agents mutually interacting with each other. The model also makes it possible to simulate the destabilizing effect of the confrontation environment disturbances on the behavior of the conflicting parties, changing the degree of vulnerability of the cybersecurity system along various attack vectors and the level of their success.Using the developed model, simulation modeling of the interacting agents behavior in a cyber conflict is performed. The simulation results showed that even the simplest behavior strategies of the attacking side (“the weakest link”) and the defense side (“wait and see”) make it possible to ensure information security of the business process loop.The developed model of interaction between the attacker and the defender can be considered as a tool for modeling the processes of the conflicting parties behavior when implementing various investment scenarios. The simulation results enable decision-makers to receive support regarding the direction of investment in the security of the business process loop.

Highlights

  • The Internet revolution has radically changed the way people, companies and governments communicate and conduct business

  • Studies related to the economics of information security [1,2,3], that is, the question of how much to spend on security countermeasures, despite their large number, demonstrate the following features

  • The results of the analysis show that a limited budget is allocated to mitigate the vulnerabilities that cause the most damage, and which are often associated with targeted attacks, with the result that organizations with very limited security budgets are subject to opportunistic attacks

Read more

Summary

Introduction

The Internet revolution has radically changed the way people, companies and governments communicate and conduct business. The findings of the researchers do not always coincide, and often they are just the opposite This can be explained by the fact that investment in information security does not usually bring direct cash benefits, such as higher incomes or lower costs; their main contribution is to prevent possible economic losses [7, 8]. This can be viewed as a discrepancy between the methods used and the features of the objects being analyzed. The effectiveness of the creation and functioning of cyber defense systems is determined by the behavioral characteristics of the attacking and defending sides, which can be seen as confirming the relevance of developing behavioral patterns for the interacting parties of the cyber conflict

Literature review and problem statement
The aim and objectives of the study
Simulation of the interacting agents behavior
Conclusions
13. Gartner IT Key Metrics Data 2012
Findings
Hrudinina Lecturer
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call