@inproceedings{775a73ae22c24787ba97cb24cbd91ae2,
title = "Cybersecurity Games and Investments: A Decision Support Approach",
abstract = "In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly interested in examining cases where the organization suffers from an underinvestment problem or inefficient spending on cybersecurity. To this end, we first model the cybersecurity environment of an organization. We then model non-cooperative cybersecurity control-games between the defender which abstracts all defense mechanisms of the organization and the attacker which can exploit different vulnerabilities at different network locations. To implement our methodology we use the SANS Top 20 Critical Security Controls and the 2011 CWE/SANS top 25 most dangerous software errors. Based on the profile of an organization, which forms its preferences in terms ofindirect costs, its concerns about different kinds of threats and the importance of the assets given their associated risks we derive the Nash Equilibria of a series of control-games. These game solutions are then handled by optimization techniques, in particular multi-objective, multiple choice Knapsack to determine the optimal cybersecurity investment. Our methodology provides security effective and cost efficient solutions especially against commodity attacks. We believe our work can be used to advise security managers on how they should spend an available cybersecurity budget given their organization profile.",
keywords = "cybersecurity, game theory, optimization",
author = "Emmanouil Panaousis and Andrew Fielder and Pasquale Malacaria and Chris Hankin and Fabrizio Smeraldi",
note = "The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-12601-2_15.; 5th International Conference, GameSec 2014 ; Conference date: 06-11-2014",
year = "2014",
month = nov,
day = "6",
doi = "10.1007/978-3-319-12601-2_15",
language = "English",
isbn = "9783319126005",
volume = "8840",
series = "Lecture Notes in Computer Science",
publisher = "Springer International Publishing",
pages = "266--286",
booktitle = "5th International Conference, GameSec 2014",
}