CYBEX Information Sharing Game with Objective and Subjective Players

We model an information sharing game among firms as an evolutionary game on a graph under the condition that players perception of uncertainty and decision making can follow either an objective expected utility theory (EUT) model or a subjective prospect theory (PT) model. Each player chooses one of two strategies with probabilities $x$ and $1-x$, where the subjective players bias their choices of the probabilities to be $w(x)$ and $w(1-x)$ to reflect the probability weighting effect of PT. We find that players' behavior is affected by the total number of players and the number of each type of player (objective or subjective). We show that increasing the number of participating firms encourages the information sharing strategy and the behavior becomes similar for both types of players. Subjective players' are affected more by increasing the number of participating firms (the number of players). As a result, subjective players are more likely to cooperate by sharing information and paying the costs of this sharing than objective players. We derive the conditions to achieve a locally asymptotically stable Nash equilibrium (NE) and the necessary conditions to achieve an evolutionary stable strategy (ESS).

[1]  Narayan B. Mandayam,et al.  When Users Interfere with Protocols: Prospect Theory in Wireless Networks using Random Access and Data Pricing as an Example , 2014, IEEE Transactions on Wireless Communications.

[2]  N. Bambos,et al.  Security investment games of interdependent organizations , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[3]  Stefan Rass,et al.  Uncertainty in Games: Using Probability-Distributions as Payoffs , 2015, GameSec.

[4]  H. Ohtsuki,et al.  The replicator equation on graphs. , 2006, Journal of theoretical biology.

[5]  H. Vincent Poor,et al.  Prospect Theoretic Analysis of Energy Exchange Among Microgrids , 2015, IEEE Transactions on Smart Grid.

[6]  Liang Xiao,et al.  Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage , 2017, IEEE Access.

[7]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[8]  Shamik Sengupta,et al.  Establishing evolutionary game models for CYBer security information EXchange (CYBEX) , 2016, J. Comput. Syst. Sci..

[9]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[10]  Eric Cole,et al.  Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization , 2012 .

[11]  Karl Sigmund Evolutionary game dynamics : American Mathematical Society Short Course, January 4-5, 2011, New Orleans, Louisiana , 2011 .

[12]  Evolutionary Random Access Game With Objective and Subjective Players , 2021, IEEE Access.

[13]  Behrouz Tork Ladani,et al.  Interdependency Analysis in Security Investment against Strategic Attacks , 2020, Inf. Syst. Frontiers.

[14]  H. Vincent Poor,et al.  Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study , 2017, IEEE Journal on Selected Areas in Communications.

[15]  H. Ohtsuki,et al.  Evolutionary stability on graphs. , 2008, Journal of theoretical biology.

[16]  Eitan Altman,et al.  Evolutionary dynamics and potential games in non-cooperative routing , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[17]  Nicholas Bambos,et al.  Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[18]  D. Friedman On economic applications of evolutionary game theory , 1998 .

[19]  Dusit Niyato,et al.  Dynamics of Network Selection in Heterogeneous Wireless Networks: An Evolutionary Game Approach , 2009, IEEE Transactions on Vehicular Technology.

[20]  Kjell Hausken,et al.  Security Investment, Hacking, and Information Sharing between Firms and between Hackers , 2017, Games.

[21]  Christoph Meinel,et al.  Advanced persistent threats: Behind the scenes , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[22]  D. Prelec The Probability Weighting Function , 1998 .

[23]  Stefan Rass,et al.  Uncertainty in Cyber Security Investments , 2017, ArXiv.