Browse > Article
http://dx.doi.org/10.13088/jiis.2020.26.3.037

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure  

Lee, Sang-Hoon (Department of MIS, Chungbuk National University)
Kim, Tae-Sung (Department of MIS, Chungbuk National University)
Publication Information
Journal of Intelligence and Information Systems / v.26, no.3, 2020 , pp. 37-50 More about this Journal
Abstract
Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.
Keywords
Game theory; Information security; Investment portfolio;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Bodin, L. D., L. A. Gordon, M. P. Loeb, "Evaluating information security investments using the analytic hierarchy process," Communications of the ACM, Vol.48, No.2(2005), 78-83.   DOI
2 Cavusoglu, H., B. Mishra, S. Raghunathan, "A model for evaluating IT security investments," Communications of the ACM, Vol.47, No.7(2004), 87-92.   DOI
3 Cavusoglu, H., B. Mishra, S. Raghunathan, "The value of intrusion detection systems in information technology security architecture," Information Systems Research, Vol.16, No.1(2005), 28-46.   DOI
4 Cavusoglu, H., S. Raghunathan, W. T. Yue, "Decision-theoretic and game-theoretic approaches to IT security investment," Journal of Management Information Systems, Vol.25, No.2(2008), 281-304.   DOI
5 Fielder, A., E. Panaousis, P. Malacaria, C. Hankin, F. Smeraldi, "Decision support approaches for cyber security investment," Decision Support Systems, Vol.86(2016), 13-23.   DOI
6 Gordon, L. A., M. P. Loeb, "The economics of information security investment," ACM Transactions on Information and System Security, Vol.5, No.4(2002), 438-457.   DOI
7 Gupta, M., J. Rees, A. Chaturvedi, J. Chi, "Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach," Decision Support Systems, Vol.41, No.3(2006), 592-603.   DOI
8 Jeong, G. H., S. R. Jeong, "The effect of information protection control activities on organizational effectiveness: Mediating effects of information application," Journal of Intelligence and Information Systems, Vol.17, No.1(2011), 71-90.   DOI
9 Kong, H. K., T. S. Kim, J. Kim, "An analysis on effects of information security investments: a BSC perspective," Journal of Intelligent Manufacturing, Vol. 23, No.4(2012), 941-953.   DOI
10 Kumar, R. L., S. Park, C. Subramaniam, "Understanding the value of countermeasure portfolios in information systems security," Journal of Management Information Systems, Vol.25, No.2(2008), 241-280.   DOI
11 Kwon, Y. O., "A study on the use of a business intelligence system: the role of explanations," Journal of Intelligence and Information Systems, Vol.20, No.4(2014), 155-169.   DOI
12 National Intelligence Service, Ministry of Science and ICT, Ministry of the Interior and Safety, Korea Communications Commission, Financial Services Commission, 2019 Nation Information Security White Paper, 2019a.
13 Richardson, R., 2010/2011 CSI Computer Crime and Security Survey, 2011.
14 Ministry of Science and ICT, Korea Information Security Industry Association, 2019 Survey on Information Security, 2019b.
15 Nash, J., "Non-cooperative games," Annals of Mathematics, Vol.54, No.2(1951), 286-295.   DOI
16 Rakes, T. R., J. K. Deane, L. P. Rees, "IT security planning under uncertainty for high-impact events," Omega, Vol.40, No.1(2012), 79-88.   DOI
17 Sawik, T., "Selection of optimal countermeasure portfolio in IT security planning," Decision Support Systems, Vol.55, No.1(2013), 156-164.   DOI
18 Seo, B. G., D. H. Park, "The theory of games and the evolution of animal conflicts," Journal of Intelligence and Information Systems, Vol.23, No.1(2017), 143-159.   DOI
19 Smith, J. M., "The theory of games and the evolution of animal conflicts," Journal of Theoretical Biology, Vol.47, No.1(1974), 209-221.   DOI
20 Von Neumann, J., O. Morgenstern, Game Theory and Economic Behavior, John Wiley and Sons, New York, 1944.
21 Von Solms, R., J. Van Niekerk, "From information security to cyber security," Computers & Security, Vol.38(2013), 97-102.   DOI