通信学报 ›› 2018, Vol. 39 ›› Issue (2): 174-182.doi: 10.11959/j.issn.1000-436x.2018027

• 学术通信 • 上一篇    

基于Gordon-Loeb模型的信息安全投资博弈研究

王秦,朱建明   

  1. 中央财经大学信息学院,北京 100081
  • 修回日期:2018-01-02 出版日期:2018-02-01 发布日期:2018-03-28
  • 作者简介:王秦(1990-),男,甘肃天水人,中央财经大博士生,主要研究方向为信息安全的经济学分析。|朱建明(1965-),男,山西太原人,博士,中央财经大学教授、博士生导师,主要研究方向为信息安全和电子商务安全。
  • 基金资助:
    国家重点研发计划基金资助项目(2017YFB1400700);国家自然科学基金资助项目(U1509214);国家自然科学基金资助项目(61272398)

Research on the game of information security investment based on the Gordon-Loeb model

Qin WANG,Jianming ZHU   

  1. School of Information,Central University of Finance and Economics,Beijing 100081,China
  • Revised:2018-01-02 Online:2018-02-01 Published:2018-03-28
  • Supported by:
    The National Key R&D Program of China(2017YFB1400700);The National Natural Science Foundation of China(U1509214);The National Natural Science Foundation of China(61272398)

摘要:

为了研究信息安全投资外部性的影响,将Gordon-Loeb模型扩展到多组织博弈环境下,分别得出在正负外部性下,面对不同类型的攻击时,最优信息安全投资与脆弱性、潜在损失和投资效率的关系,并且比较了与社会最优条件下最优信息安全投资的差别。结果表明,正外部性条件下的信息安全投资变化规律与单一组织的情况相比存在一定相似之处,但负外部性下的信息安全投资改变较大,总体更加谨慎,并且攻击类型对于信息安全投资有着重要影响。

关键词: 信息安全投资, Gordon-Loeb模型, 外部性, 攻击类型

Abstract:

In order to study the impacts of externalities of information security investment,the Gordon-Loeb model was extended to a multi-organization game environment.The relationships of the optimal information security investment with vulnerability,potential loss and investment effectiveness when confronted with different attack types under the positive and negative externalities were obtained respectively,and the difference with the optimal information security investment under the social optimum condition was compared.The results show that there were some similarities in the varying pattern of information security investment between the condition of the positive externality and a single organization,but information security investment under the negative externality changes greatly and was generally more cautious,and attack types also have important impacts on information security investment.

Key words: information security investment, Gordon-Loeb model, externality, attack type

中图分类号: 

No Suggested Reading articles found!