TY - JOUR
T1 - Collaboration or separation maximizing the partnership between a “Gray hat” hacker and an organization in a two-stage cybersecurity game
AU - Cohen, Daniel
AU - Elalouf, Amir
AU - Zeev, Raz
N1 - Publisher Copyright:
© 2022
PY - 2022/4
Y1 - 2022/4
N2 - Vulnerability disclosure is a key topic in cybersecurity. It is a practice ensuring that organizations address and fix vulnerabilities before bad actors can find and exploit them. This study focuses on the “disclose or exploit” dilemma. It presents a two-player non-zero-sum simultaneous cyber-security game between a hacker and an organization at multiple rounds. The vulnerabilities classified as high, medium, and low are based on a Common Vulnerability Scoring System (CVSS). The hacker can decide to act separately or to collaborate with the organization. Subsequently, the organization chooses to operate individually or cooperate with the hacker. The organization also has a budget limit to patch the vulnerabilities. The paper developed an algorithm to determine the Nash equilibria of the game and conducted a numerical analysis. It found that maximum cooperation occurred at the beginning of the game when both the organization and the hacker decided to cooperate.
AB - Vulnerability disclosure is a key topic in cybersecurity. It is a practice ensuring that organizations address and fix vulnerabilities before bad actors can find and exploit them. This study focuses on the “disclose or exploit” dilemma. It presents a two-player non-zero-sum simultaneous cyber-security game between a hacker and an organization at multiple rounds. The vulnerabilities classified as high, medium, and low are based on a Common Vulnerability Scoring System (CVSS). The hacker can decide to act separately or to collaborate with the organization. Subsequently, the organization chooses to operate individually or cooperate with the hacker. The organization also has a budget limit to patch the vulnerabilities. The paper developed an algorithm to determine the Nash equilibria of the game and conducted a numerical analysis. It found that maximum cooperation occurred at the beginning of the game when both the organization and the hacker decided to cooperate.
UR - http://www.scopus.com/inward/record.url?scp=85128382256&partnerID=8YFLogxK
U2 - 10.1016/j.jjimei.2022.100073
DO - 10.1016/j.jjimei.2022.100073
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85128382256
SN - 2667-0968
VL - 2
JO - International Journal of Information Management Data Insights
JF - International Journal of Information Management Data Insights
IS - 1
M1 - 100073
ER -