IDEAS home Printed from https://ideas.repec.org/a/eee/apmaco/v399y2021ics0096300321000990.html
   My bibliography  Save this article

Evolutionary dynamics of the interdependent security games on complex network

Author

Listed:
  • Wang, Zhen
  • Li, Chaofan
  • Jin, Xing
  • Ding, Hong
  • Cui, Guanghai
  • Yu, Lanping

Abstract

With the development of information technology, the infrastructure between enterprises and the connections between businesses show complex network characteristics. The security investment made by an enterprise in a network has an impact on its neighbors, but also bears the impact of its neighbors’ security investments. Such individual interaction problems are often modeled as interdependent security games (IDS). In this paper, we study IDS models under three different attack scenarios: the total effort, the weakest link and the best shot. We use evolutionary game theory to explore the dynamics of social payoffs and the average social investments of these three models under different network topologies. The results show that under the total effort model, individuals are more inclined to increase their investments, while under the weakest link and best shot models, individuals choose to minimize their investments due to selfishness. Finally, we study the cluster effect under different network structures and find the threshold at which it exists.

Suggested Citation

  • Wang, Zhen & Li, Chaofan & Jin, Xing & Ding, Hong & Cui, Guanghai & Yu, Lanping, 2021. "Evolutionary dynamics of the interdependent security games on complex network," Applied Mathematics and Computation, Elsevier, vol. 399(C).
  • Handle: RePEc:eee:apmaco:v:399:y:2021:i:c:s0096300321000990
    DOI: 10.1016/j.amc.2021.126051
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0096300321000990
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.amc.2021.126051?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Schilling, Andreas & Werners, Brigitte, 2016. "Optimal selection of IT security safeguards from an existing knowledge base," European Journal of Operational Research, Elsevier, vol. 248(1), pages 318-327.
    2. Zhu, Xiangbin & Zhao, Jiaying & Hu, Zhaolong, 2019. "Incentive mechanism design for security investment with local exit equilibrium on structured populations," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 531(C).
    3. Khouzani, MHR. & Liu, Zhengliang & Malacaria, Pasquale, 2019. "Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs," European Journal of Operational Research, Elsevier, vol. 278(3), pages 894-903.
    4. Ding, Hong & Xu, Jia-Hao & Wang, Zhen & Ren, Yi-Zhi & Cui, Guang-Hai, 2018. "Subsidy strategy based on history information can stimulate voluntary vaccination behaviors on seasonal diseases," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 503(C), pages 390-399.
    5. Geoffrey Heal & Howard Kunreuther, 2004. "Interdependent Security: A General Model," NBER Working Papers 10706, National Bureau of Economic Research, Inc.
    6. Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
    7. Wang, Zhigang & Zhang, Haifeng & Wang, Zhen, 2014. "Multiple effects of self-protection on the spreading of epidemics," Chaos, Solitons & Fractals, Elsevier, vol. 61(C), pages 1-7.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Lou, Fangzheng & Li, Feng & Wang, Jing & Wang, Yan, 2022. "Reliable output feedback control for persistent dwell-time switched piecewise-affine systems against deception attacks," Applied Mathematics and Computation, Elsevier, vol. 426(C).
    2. Jin, Xing & Tao, Yuchen & Wang, Jingrui & Wang, Chao & Wang, Yongheng & Zhang, Zhouyang & Wang, Zhen, 2023. "Strategic use of payoff information in k-hop evolutionary Best-shot networked public goods game," Applied Mathematics and Computation, Elsevier, vol. 459(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Corbet, Shaen & Gurdgiev, Constantin, 2019. "What the hack: Systematic risk contagion from cyber events," International Review of Financial Analysis, Elsevier, vol. 65(C).
    2. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    3. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    4. Zhang, Yaming & Su, Yanyuan & Weigang, Li & Liu, Haiou, 2019. "Interacting model of rumor propagation and behavior spreading in multiplex networks," Chaos, Solitons & Fractals, Elsevier, vol. 121(C), pages 168-177.
    5. Michel Benaroch, 2018. "Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making," Information Systems Research, INFORMS, vol. 29(2), pages 315-340, June.
    6. Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
    7. Kay-Yut Chen & Jingguo Wang & Yan Lang, 2022. "Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals," Management Science, INFORMS, vol. 68(7), pages 5269-5286, July.
    8. J. S. Busby & B. Green & D. Hutchison, 2017. "Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1298-1314, July.
    9. David Rios Insua & Aitor Couce‐Vieira & Jose A. Rubio & Wolter Pieters & Katsiaryna Labunets & Daniel G. Rasines, 2021. "An Adversarial Risk Analysis Framework for Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 41(1), pages 16-36, January.
    10. Li, Li, 2015. "Bifurcation and chaos in a discrete physiological control system," Applied Mathematics and Computation, Elsevier, vol. 252(C), pages 397-404.
    11. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    12. Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
    13. Marcin Dziubinski & Sanjeev Goyal & Adrien Vigier, 2015. "Conflict and Networks," Cambridge Working Papers in Economics 1565, Faculty of Economics, University of Cambridge.
    14. Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
    15. Soriano-Sánchez, A.G. & Posadas-Castillo, C., 2018. "Smart pattern to generate small–world networks," Chaos, Solitons & Fractals, Elsevier, vol. 114(C), pages 415-422.
    16. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    17. Lee, Sangjae & Costello, Francis Joseph & Lee, Kun Chang, 2021. "Hierarchical balanced scorecard-based organizational goals and the efficiency of controls processes," Journal of Business Research, Elsevier, vol. 132(C), pages 270-288.
    18. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    19. Cui, Guang-Hai & Wang, Zhen & Li, Jun-Li & Jin, Xing & Zhang, Zhi-Wang, 2021. "Influence of precaution and dynamic post-indemnity based insurance policy on controlling the propagation of epidemic security risks in networks," Applied Mathematics and Computation, Elsevier, vol. 392(C).
    20. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:apmaco:v:399:y:2021:i:c:s0096300321000990. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/applied-mathematics-and-computation .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.