Skip to main content

Utilizing Game Theory for Security Risk Assessment

  • Chapter
  • First Online:
Game Theory for Security and Risk Management

Abstract

Security risk assessment provides valuable insights about potential security risks to an organization to protect their critical information assets. With an ability to comprehend security risks, organizations can make effective decision to allocate their budget to mitigate or treat those risks (often based on the severity of the risk). Thus, it is paramount to identify and assess risk scenarios properly to manage those risks. Subjective judgment due to the lack of statistical data and the adaptive nature of the adversary may affect the credibility of the assessments when using classical risk assessment methods. Even though game theoretical approach formulates robust mathematical models for risk assessment without the reliance on subjective probabilities, it is seldom used in organizations. Thus, this chapter expands on the existing mapping between game theory and risk assessment process and terminology to provide further insight into how game theory can be utilized for risk assessment. In addition, we provide our view on how cooperative game theoretical model may be used to capture opportunity risk, which is usually overlooked in many classical risk assessment methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ISO 31000 Risk management – Principles and guidelines. 2009.

    Google Scholar 

  2. ISO/IEC 27005 Information technology -Security techniques - Information security risk management. ISO/IEC, 1st edition, 2011.

    Google Scholar 

  3. NIST Special Publication 800-30 Revision 1. Guide for conducting risk assessments. Technical report, 2012.

    Google Scholar 

  4. David L. Banks and Steven Anderson. Combining Game Theory and Risk Analysis in Counterterrorism: A Smallpox Example. Springer New York, 2006.

    Google Scholar 

  5. F. Braber, I. Hogganvik, M. S. Lund, K. Stølen, and F. Vraalsen. Model-based security analysis in seven steps — a guided tour to the coras method. BT Technology Journal, 25(1):101–117, January 2007.

    Google Scholar 

  6. L. Carin, G. Cybenko, and J. Hughes. Cybersecurity strategies: The queries methodology. Computer, 41(8):20–26, Aug 2008.

    Article  Google Scholar 

  7. Robert T. Clemen. Making Hard Decision: An Introduction to Decision Analysis. Duxbury, second edition, 1996.

    Google Scholar 

  8. Jr. Louis Anthony Cox. Some limitations of “Risk = Threat x Vulnerability x Consequence” for risk analysis of terrorist attacks. Risk Analysis, 28(6):1749–61, 2008.

    Google Scholar 

  9. Jr. Louis Anthony (Tony) Cox. What’s wrong with risk matrices? Risk Analysis, 28(2):497–512, 2008.

    Article  Google Scholar 

  10. Jr. Louis Anthony (Tony) Cox. Game theory and risk analysis. Risk Analysis, 29(8):1062–1068, 2009.

    Google Scholar 

  11. Kjell Hausken. Probabilistic risk analysis and game theory. Society for Risk Analysis, 22, 2002.

    Google Scholar 

  12. David Hillson. Extending the risk process to manage opportunities. International Journal of Project Management, page 235–240, 2002.

    Google Scholar 

  13. David Rios Insua, Jesus Rios, and David Banks. Adversarial risk analysis. Journal of the American Statistical Association, 104(486):841–854, Jun 2009.

    Google Scholar 

  14. ISACA. The Risk IT Framework, 2009.

    Google Scholar 

  15. Peng Liu and Wanyu Zang. Incentive-based modeling and inference of attacker intent, objectives, and strategies. In Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS ’03, pages 179–189, New York, NY, USA, 2003. ACM.

    Google Scholar 

  16. Patrick Maillé, Peter Reichl, and Bruno Tuffin. Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management, pages 33–53. Springer New York, New York, NY, 2011.

    Google Scholar 

  17. Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, and Jean-Pierre Hubaux. Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3):25, 2013.

    Article  Google Scholar 

  18. Richard D. McKelvey, Andrew M. McLennan, and Theodore L. Turocy. Gambit: Software tools for game theory, version 16.0.1. http://www.gambit-project.org, 2016. [retrieved: 15-9-2017].

  19. John Nash. Non-cooperative games. Annals of mathematics, pages 286–295, 1951.

    Google Scholar 

  20. Eugene Nudelman, Jennifer Wortman, Yoav Shoham, and Kevin Leyton-Brown. Run the gamut: A comprehensive approach to evaluating game-theoretic algorithms. Autonomous Agents and Multiagent Systems, International Joint Conference on, 2:880–887, 2004.

    Google Scholar 

  21. Animesh Patcha and Jung-Min Park. A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security, 2:131–137, March 2006.

    Google Scholar 

  22. Lisa Rajbhandari. Risk analysis using “conflicting incentives” as an alternative notion of risk, 2013.

    Google Scholar 

  23. Lisa Rajbhandari and Einar Snekkenes. Risk acceptance and rejection for threat and opportunity risks in conflicting incentives risk analysis. In International Conference on Trust, Privacy and Security in Digital Business, pages 124–136. Springer, 2013.

    Google Scholar 

  24. Lisa Rajbhandari and Einar Snekkenes. Using the conflicting incentives risk analysis method. In IFIP International Information Security Conference, pages 315–329. Springer, 2013.

    Google Scholar 

  25. Lisa Rajbhandari and Einar Arthur Snekkenes. Mapping between Classical Risk Management and Game Theoretical Approaches, pages 147–154. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011.

    Google Scholar 

  26. Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and Wu Qishi. A survey of game theory as applied to network security. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on, pages 1–10. IEEE, 2010.

    Google Scholar 

  27. Einar Snekkenes. Position paper: Privacy risk analysis is about understanding conflicting incentives. In IFIP Working Conference on Policies and Research in Identity Management, pages 100–103. Springer, 2013.

    Google Scholar 

  28. Gaute Wangen, Christoffer Hallstensen, and Einar Snekkenes. A framework for estimating information security risk assessment method completeness. International Journal of Information Security, pages 1–19, 6 2017.

    Google Scholar 

  29. Joel Watson. Strategy: An Introduction to Game Theory. W. W. Norton & Company, 2nd edition, 2008.

    Google Scholar 

  30. Jenn Wortman, Eugene Nudelman, Mark Chen, and Yoav Shoham. Gamut: Game-theoretic algorithms evaluation suite. http://gamut.stanford.edu/. [retrieved: 15-9-2017].

  31. Cui Xiaolin, Tan Xiaobin, Zhang Yong, and Xi Hongsheng. A Markov game theory-based risk assessment model for network information system. In CSSE ’08: Proceedings of the 2008 International Conference on Computer Science and Software Engineering, pages 1057–1061, Washington, DC, USA, 2008. IEEE Computer Society.

    Google Scholar 

Download references

Acknowledgements

We would like to thank the anonymous reviewers for their valuable comments and suggestions.

DisclaimerThis is an independent research of the first author; thus the view expressed in this book chapter is not associated with any organization she is affiliated with.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lisa Rajbhandari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rajbhandari, L., Snekkenes, E. (2018). Utilizing Game Theory for Security Risk Assessment. In: Rass, S., Schauer, S. (eds) Game Theory for Security and Risk Management. Static & Dynamic Game Theory: Foundations & Applications. Birkhäuser, Cham. https://doi.org/10.1007/978-3-319-75268-6_1

Download citation

Publish with us

Policies and ethics