首页 | 本学科首页   官方微博 | 高级检索  
     

基于stackelberg博弈的供应链企业间信息安全决策分析
引用本文:潘崇霞, 仲伟俊, 梅姝娥. 一定预算约束下面对系统不同脆弱性的企业网络安全投资策略研究[J]. 电子科技大学学报社科版, 2018, 20(4): 27-34. DOI: 10.14071/j.1008-8105(2017)-1013
作者姓名:潘崇霞  仲伟俊  梅姝娥
作者单位:1.东南大学 南京 211189
摘    要:针对网络系统不同的脆弱性,通过建模分析了网络暴露程度、黑客攻击概率、黑客入侵概率、安全投资效率等因素对企业的网络安全投资策略的影响,研究了一定预算约束下的企业网络安全投资策略。研究表明:在企业网络系统防御随机攻击能力较强,防御定向攻击能力较弱的情况下,当安全投资总额非常大的时候,对随机攻击类型的投资分配应随着安全投资总额的增大而增大,对定向攻击类型的投资分配应随着安全投资总额的增大而减小;当安全投资总额非常小时,投资分配情况视网络暴露程度的大小而定。

关 键 词:信息安全经济学  网络安全投资  预算约束  随机攻击  定向攻击  网络脆弱性
收稿时间:2017-03-09

Information security investment for competitive firms with hacker behavior and security requirements
PAN Chong-xia, ZHONG Wei-jun, MEI Shu-e. Enterprise Network Security Investment Strategies When Facing Different Vulnerabilities With Budget Constraints[J]. Journal of University of Electronic Science and Technology of China(SOCIAL SCIENCES EDITION), 2018, 20(4): 27-34. DOI: 10.14071/j.1008-8105(2017)-1013
Authors:PAN Chong-xia  ZHONG Wei-jun  MEI Shu-e
Affiliation:1.Southeast University  Nanjing 211189 China
Abstract:This paper develops a model to study enterprise network security investment strategies when facing different vulnerabilities with budget constraints. It analyzes the impact factors such as the network exposure, the attack probability, the breach probability, and security investment efficiency on network security investment strategies. The result shows that under the circumstance that the network system has a stronger ability to defend against an opportunistic attack and a weaker ability to defend against a targeted attack, when the optimal security investment is very high, the investment allocation to the opportunistic attacks increases with an increase in the total investment while investment allocation to the targeted attacks decreases with an increase in the total investment; when the optimal security investment is very small, the allocation of investment depends on the degree of network exposure.
Keywords:economics of information security  network security investment  budget constraints  opportunistic attack  targeted attack  network vulnerability
点击此处可从《电子科技大学学报(社会科学版)》浏览原始摘要信息
点击此处可从《电子科技大学学报(社会科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号