
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,428 |
Article View | 9,191,247 |
PDF Download | 5,622,152 |
A Decision-Making Model in a Cyber Conflicts Acted Upon Vulnerability, Based on Game Theoretic Analysis | |||||||||||||||
پدافند الکترونیکی و سایبری | |||||||||||||||
Article 3, Volume 6, Issue 2 - Serial Number 22, July 2018, Pages 21-28 PDF (777.66 K) | |||||||||||||||
Document Type: Original Article | |||||||||||||||
Authors | |||||||||||||||
Mahmoud Forooghy* ; Ali Akramizadeh; Masoud Bagheri | |||||||||||||||
Receive Date: 10 March 2017, Revise Date: 20 February 2019, Accept Date: 19 September 2018 | |||||||||||||||
Abstract | |||||||||||||||
It is crucial to predict the other side possible actions in any conflict, especially in cyber security and cyberwars. In this paper, based on game theoretic analytical model, the decision-making process of two rivals during detection of vulnerability is discussed in cyberspace. Comparing the earlier approaches, the assumptions are made more realistic, such as possible retaliation of the opposed side, asymmetrical payoffs and risk of failure during usage of vulnerability and penetration. In order to achieve this goal, a new structure is proposed based on real conflicts in cyberwar. The proposed game is in extensive form with imperfect information in which the vulnerability is detected by chance for players. Based on Nash equilibrium concept, analytical approach proves that whenever players’ ability for cyber-attack are close together, both sides will attend aggressive acts. The ability to detect vulnerabilities has less impact on strategy. | |||||||||||||||
Keywords | |||||||||||||||
Game Theory; Vulnerability; Strategy; Attack Ability; Cyber Defence | |||||||||||||||
References | |||||||||||||||
| |||||||||||||||
Statistics Article View: 860 PDF Download: 490 |