Skip to main content
Log in

An Optimal Group Decision-Making Approach for Cyber Security Using Improved Selection-Drift Dynamics

  • Published:
Dynamic Games and Applications Aims and scope Submit manuscript

Abstract

In cyber security, balancing investment and risk has always been a dilemmatic problem since the threats often lurk in the shadows. Thus, timely and scientifically credible decision-making will have great significance in such an attack-defense game of incomplete information. To this end, an evolutionary game model of group decision-making is proposed to analyze the behavioral change process of the defender population. In particular, we first introduce the concept of observation error and short-term prediction in network communication and establish an improved selection–drift dynamics in which errors are automatically corrected to a certain extent and the convergence speed is faster than the prototype. By calculating the stable evolutionary equilibrium of the defender population, the optimal group decision-making approach is formulated. Case studies on big data vulnerabilities indicate that the proposed model and approach perform better in robustness and computational efficiency than the 3 typical models under jamming environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

The datasets generated during and/or analyzed during the current study are available in the National Vulnerability Database repository, https://nvd.nist.gov/vuln/search; AND. The datasets generated during and/or analyzed during the current study are available in the Common Weakness Enumeration (CWE) repository, http://cwe.mitre.org/index.html; AND. The datasets generated during and/or analyzed during the current study are available in the Common Attack Pattern Enumeration and Classification (CAPEC) repository, http://capec.mitre.org/; AND. The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request; AND all data generated or analyzed during this study are included in this published article (and its supplementary information files).

References

  1. Akkarajitsakul K, Hossain E, Niyato D, Kim DI (2011) Game theoretic approaches for multiple access in wireless networks: a survey. IEEE Commun Surveys Tutorials 13(3):372–395. https://doi.org/10.1109/SURV.2011.122310.000119

    Article  Google Scholar 

  2. Alpcan T, Başar T (2010) Network security: A decision and game-theoretic approach. Cambridge University Press. London, pp 3–13.

  3. Alshamrani A, Myneni S, Chowdhary A, Dijiang H (2019) A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities. IEEE Commun Surveys Tutorials 21(2):1851–1877. https://doi.org/10.1109/COMST.2019.2891891

    Article  Google Scholar 

  4. Attiah A, Chatterjee M, Zou CC (2018) A game theoretic approach to model cyber attack and defense strategies. In: 2018 IEEE International Conference on Communications (ICC). pp 1–7. doi: https://doi.org/10.1109/ICC.2018.8422719

  5. Boudko S, Aursand P, Abie H (2020) Evolutionary game for confidentiality in IoT-enabled smart grids. Information 11(12):582. https://doi.org/10.3390/info11120582

    Article  Google Scholar 

  6. Chattopadhyay D (2004) A game theoretic model for strategic maintenance and dispatch decisions. IEEE Trans Power Syst 19(4):2014–2021. https://doi.org/10.1109/TPWRS.2004.836180

    Article  MathSciNet  Google Scholar 

  7. Do CT, Tran NH, Hong C, Kamhoua CA, Kwiat KA, Blasch E, Shaolei R, Pissinou N, Iyengar SS (2018) Game theory for cyber security and privacy. ACM Comput Surveys (CSUR) 50(2):1–37. https://doi.org/10.1145/3057268

    Article  Google Scholar 

  8. Du J, Jiang C, Chen KC, Ren Y, Poor HV (2017) Community-structured evolutionary game for privacy protection in social networks. IEEE Trans Inf Forensics Secur 13(3):574–589. https://doi.org/10.1109/TIFS.2017.2758756

    Article  Google Scholar 

  9. Galov N, (2022) "53 Cybersecurity Statistics from 2021: Stay Safe in the New Decade." Feb.18, 2022. Accessed: Feb.28, 2022. [Online]. Available: https://hostingtribunal.com/blog/cybersecurity-statistics/

  10. Gordon LA, Loeb MP, Lucyshyn W, Richardson R (2005) CSI/FBI computer crime and security survey. Comput Secur J 21(3):1

    Google Scholar 

  11. Hu H, Liu Y, Chen C, Zhang H, Liu Y (2020) Optimal decision making approach for cyber security defense using evolutionary game. IEEE Trans Netw Serv Manage 17(3):1683–1700. https://doi.org/10.1109/TNSM.2020.2995713

    Article  Google Scholar 

  12. Hu H, Liu Y, Zhang H, Pan R (2018) Optimal network defense strategy selection based on incomplete information evolutionary game. IEEE Access 6:29806–29821. https://doi.org/10.1109/ACCESS.2018.2841885

    Article  Google Scholar 

  13. Hubbard DW, Seiersen R, (2016) How to measure anything in cybersecurity risk. John Wiley & Sons. pp 4–10.

  14. Kamhoua CA, Pissinou N, Makki K (2011) Game theoretic modeling and evolution of trust in autonomous multi-hop networks: application to network security and privacy. In: 2011 IEEE International Conference on Communications (ICC). pp 1–6. doi: https://doi.org/10.1109/icc.2011.5962511

  15. Komarova NL, Niyogi P, Nowak MA (2001) The evolutionary dynamics of grammar acquisition. J Theor Biol 209(1):43–59. https://doi.org/10.1006/jtbi.2000.2240

    Article  Google Scholar 

  16. Leonard NE (2014) Multi-agent system dynamics: Bifurcation and behavior of animal groups. Annu Rev Control 38(2):171–183. https://doi.org/10.1016/j.arcontrol.2014.09.002

    Article  Google Scholar 

  17. Li B, Chen Y, Huang S, Yao R, Xia Y, Mei S (2019) Graphical evolutionary game model of virus-based intrusion to power system for long-term cyber-security risk evaluation. IEEE Access 7:178605–178617. https://doi.org/10.1109/ACCESS.2019.2958856

    Article  Google Scholar 

  18. Li Y, Deng Y, Xiao Y, Wu J (2019) Attack and defense strategies in complex networks based on game theory. J Syst Sci Complexity 32(6):1630–1640. https://doi.org/10.1007/s11424-019-7420-0

    Article  MATH  Google Scholar 

  19. Manshaei MH, Zhu Q, Alpcan T, Başar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surveys (CSUR) 45(3):1–39. https://doi.org/10.1145/2480741.2480742

    Article  MATH  Google Scholar 

  20. Massaquoi SG (1999) Modeling the function of the cerebellum in scheduled linear servo control of simple horizontal planar arm movements. Massachusetts Institute of Technology. uri: http://hdl.handle.net/1721.1/9083

  21. Olfati SR (2007) Evolutionary dynamics of behavior in social networks. In: 2007 46th IEEE conference on decision and control. pp 4051–4056. doi: https://doi.org/10.1109/CDC.2007.4435009

  22. Perc M, Szolnoki A (2010) Coevolutionary games—a mini review. BioSystems 99(2):109–125. https://doi.org/10.1016/j.biosystems.2009.10.003

    Article  Google Scholar 

  23. Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q, (2010) A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences. pp 1–10. https://doi.org/10.1109/HICSS.2010.35

  24. Ruan N, Gao L, Zhu H, Jia W, Li X, Hu Q, (2016) Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). pp 364–373. doi: https://doi.org/10.1109/ICDCS.2016.66

  25. Sandholm WH (2020) Evolutionary game theory. Complex Social Behavioral Systems: Game Theory Agent-Based Models. https://doi.org/10.1007/978-1-0716-0368-0_188

    Article  MATH  Google Scholar 

  26. Selten R (1980) A note on evolutionarily stable strategies in asymmetric animal conflicts. J Theoretical Biol 84(1):93–101. https://doi.org/10.1016/S0022-5193(80)81038-1

    Article  MathSciNet  Google Scholar 

  27. Shadmehr R (2017) Distinct neural circuits for control of movement vs. holding still. J Neurophys 117(4):1431–1460. https://doi.org/10.1152/jn.00840.2016

    Article  Google Scholar 

  28. Tan S, Wang Y, Chen Y, Wang Z (2016) Evolutionary dynamics of collective behavior selection and drift: flocking, collapse, and oscillation. IEEE Trans Cyber 47(7):1694–1705. https://doi.org/10.1109/TCYB.2016.2555316

    Article  Google Scholar 

  29. Tan, S., Wang, Y., Vasilakos, A.V., 2021. Distributed population dynamics for searching generalized nash equilibria of population games with graphical strategy interactions. IEEE Transactions on Systems, Man, and Cybernetics: Systems (Early Access). doi: https://doi.org/10.1109/TSMC.2021.3062827

  30. Tanimoto J (2015) Fundamentals of evolutionary game theory and its applications. Springer, Japan, pp 69–90

    Book  MATH  Google Scholar 

  31. Tenable®. (2022) "Nessus Vulnerability Scanner." Accessed Feb.22, 2022. [Online]. Available: https://www.tenable.com/downloads/nessus

  32. Tian Z, Gao X, Su S, Qiu J, Du X, Guizani M (2019) Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory. IEEE Trans Veh Technol 68(6):5971–5980. https://doi.org/10.1109/TVT.2019.2910217

    Article  Google Scholar 

  33. Tosh D, Sengupta S, Kamhoua CA, Kwiat KA (2018) Establishing evolutionary game models for CYBer security information exchange (CYBEX). J Comput Syst Sci 98:27–52. https://doi.org/10.1016/j.jcss.2016.08.005

    Article  MathSciNet  MATH  Google Scholar 

  34. United States Department of Commerce, (2022) "National vulnerability database." https://nvd.nist.gov/vuln/search (accessed Feb.22, 2022)

  35. United States Department of Homeland Security (DHS), (2022) "Common attack pattern enumeration and classification (CAPEC)." http://capec.mitre.org/ (accessed Feb.22, 2022)

  36. United States Department of Homeland Security (DHS), (2022) "Common weakness enumeration (CWE)." http://cwe.mitre.org/index.html (accessed Feb.22, 2022)

  37. Wang Y, Nakao A, Vasilakos AV, Ma J (2011) P2P soft security: On evolutionary dynamics of P2P incentive mechanism. Comput Commun 34(3):241–249. https://doi.org/10.1016/j.comcom.2010.01.021

    Article  Google Scholar 

  38. Wang Z, Wang L, Szolnoki A, Perc M (2015) Evolutionary games on multilayer networks: a colloquium. Eur Phys J B 88(5):1–15. https://doi.org/10.1140/epjb/e2015-60270-7

    Article  Google Scholar 

  39. Xu X, Chen Z, Si G, Hu X, Jiang Y, Xu X (2011) The chaotic dynamics of the social behavior selection networks in crowd simulation. Nonlinear Dyn 64(1):117–126. https://doi.org/10.1007/s11071-010-9850-z

    Article  MathSciNet  MATH  Google Scholar 

  40. Yang Y, Che B, Zeng Y, Cheng Y, Li C (2019) MAIAD: a multistage asymmetric information attack and defense model based on evolutionary game theory. Symmetry 11(2):215. https://doi.org/10.3390/sym11020215

    Article  MATH  Google Scholar 

  41. Yang P, Gao F, Zhang H (2021) Multi-player evolutionary game of network attack and defense based on system dynamics. Mathematics 9(23):3014. https://doi.org/10.3390/math9233014

    Article  Google Scholar 

Download references

Acknowledgement

National Natural Science Foundation of China, Grant Number 61902426

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gang Wang.

Ethics declarations

Conflict of interest

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled, “An Optimal Group Decision-Making Approach for Cyber Security Using Improved Selection-Drift Dynamics.”

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, E., Wang, G., Ma, R. et al. An Optimal Group Decision-Making Approach for Cyber Security Using Improved Selection-Drift Dynamics. Dyn Games Appl 13, 980–1004 (2023). https://doi.org/10.1007/s13235-022-00476-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13235-022-00476-6

Keywords

Navigation