Abstract
The increase in the number and complexity of cyber threats forces us to study not only the technical aspects of cyber security, but also the social and interaction between participants in the digital space. The game-theoretic approach opens up opportunities for a deeper understanding of emerging conflicts and the development of effective management strategies to ensure cyber security. In this context, it is important to investigate how game theory can be applied to the analysis of conflicts in cyberspace and what practical conclusions can be drawn for the improvement of cyber security systems as a whole, which determined the relevance and importance of this work. Based on the scientific literature, a review of various approaches to the application of game theory in information and cyber security systems was carried out. The main concepts of the concept of game theory are highlighted, such as player, strategy, winning and losing, which allows to structure and understand interactions in security systems. The most common types of games from the point of view of information security management are characterized: maximin equilibrium, Nash equilibrium, Pareto-optimal situations, Stackelberg equilibrium. A formal description of the game model in conflict conditions and a mechanism for applying game theory to modeling decisions in conflict situations in security systems have been developed. The subject area of the game of the conflict situation is presented for each of the “subject-subject” levels: the level of the individual (criminal — user); business level (internal and/or external violator — company manager); state level (violators/hackers — state institutions, state officials); the level of international relations (states, a group of subjects/hackers — institutions and/or political leaders of another state). Specific scenarios for managing conflict situations in security systems using a game-theoretic approach are proposed. The results of the research can be used in the practice of solving conflict situations in organizations, serve for the development of software on this problem, and also as educational material for students of the specialty 125 Cybersecurity and information protection.
Publisher
Borys Grinchenko Kyiv University
Reference20 articles.
1. Cavusoglu, H., & Zhang, J. (2008). Security Patch Management: Share the Burden or Share the Damage? Management Science, 54(4), 657-670.
2. Khalid, M., Al-Kadhimi, A., Singh, M. (2023). Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic Review Mathematics, 11, 1353. https://doi.org/10.3390/math11061353
3. Shiyan, A. (2009) Game-theoretic analysis of rational human behavior and decision-making in the management of socio-economic systems. UNIVERSUM-Vinnytsia.
4. Buryachok, V., & Shiyan, A. (2014). Classification of technologies for informational and psychological influence on the process of rational human activity. Modern information protection, 1, 64-70.
5. Kolomiets, G. (2020). Application of game theory in taxation as a sphere of reconciliation of public and private interests. Bulletin of the Khmelnytskyi National University, 4(3), 202-205.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献