skip to main content
research-article

Improving Cyber-Security via Profitable Insurance Markets

Published:28 August 2018Publication History
Skip Abstract Section

Abstract

Recent work in security has illustrated that solutions aimed at detection and elimination of security threats alone are unlikely to result in a robust cyberspace. As an orthogonal approach to mitigating security problems, some researchers have pursued the use of cyber-insurance as a suitable risk management technique. In this regard, a recent work by the authors in [1] have proposed efficient monopoly cyberinsurance markets that maximize social welfare of users in a communication network via premium discriminating them. However, the work has a major drawback in the insurer not being able to make strictly positive profit in expectation, which in turn might lead to unsuccessful insurance markets. In this paper, we provide a method (based on the model in [1]) to overcome this drawback for the risk-averse premium discriminating monopoly cyber-insurer, and prove it in theory. More specifically, we propose a non-regulatory mechanism to allow monopoly cyber-insurers to make strictly positive profit in expectation. To investigate the general effectiveness of our mechanism beyond a monopoly setting with full coverage, we conduct numerical experiments (comparing social welfare at market equilibrium) on (a) practical Internet-scale network topologies that are formed by users who are free to decide for themselves whether they want to purchase insurance or not, (b) settings of perfect and imperfect market competition, and (c) scenarios with partial insurance coverage.

References

  1. R. Pal, L. Golubchik, K. Psounis, and P. Hui, "Will cyber-insurance improve network security: A market analysis," in To Appear in IEEE INFOCOM, 2014.Google ScholarGoogle Scholar
  2. R. Anderson and T. Moore, "Information security economics and beyond," in Information Security Summit, 2008.Google ScholarGoogle Scholar
  3. M. Lelarge and J. Bolot, "Economic incentives to increase security in the internet: The case for insurance," in IEEE INFOCOM, 2009.Google ScholarGoogle Scholar
  4. P. Naghizadeh and M. Liu, "Voluntary participation in cyber-insurance markets," in WEIS, 2014.Google ScholarGoogle Scholar
  5. S. Romanovsky, Comments to the Department of Commerce on Incentives to Adopt Improved Cyber-Security Practices. April 2013, 2013.Google ScholarGoogle Scholar
  6. Betterly, The Betterly Report: Cyber/Privacy Insurance Market Survey. June, 2012, 2012.Google ScholarGoogle Scholar
  7. Arimic, Arimic Review of Recent Developments in the Cyber-Insurance Market. 2013, 2013Google ScholarGoogle Scholar
  8. M. Thompson, "Why cyber-insurance is the next big thing," in CNBC Report, 2014.Google ScholarGoogle Scholar
  9. R. Bohme and G. Schwartz, "Modeling cyber-insurance: Towards a unifying framework," in WEIS, 2010.Google ScholarGoogle Scholar
  10. A. Mas-Collel, M. D.Winston, and J. R. Green, Microeconomic Theory. Oxford University Press, 1995, 1995.Google ScholarGoogle Scholar
  11. H. Kunreuther and G. Heal, "Interdependent security," Journal of Risk and Uncertainty, vol. 26, 2002.Google ScholarGoogle Scholar
  12. M. Lelarge and J. Bolot, "A local mean field analysis of security investments in networks," in ACM NetEcon, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Lelarge and J. Bolot, "Network externalities and the deployment of security features and protocols in the internet," in ACM SIGMETRICS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Z. Yang and J. Lui, "Security adoption in heterogenous networks: The influence of cyber-insurance market," in IFIP Networking, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Z. Yang and J. C. S. Lui, "Security adoption and influence of cyber-insurance markets in heterogenous networks," Performance Evaluation, vol. 74, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Dionne and S. E. Harrington, Foundations of Insurance Economics: Readings in Economics and Finance. Springer, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  17. R. Pal, L. Golubchik, and K. Psounis, "Aegis: A novel cyber-insurance model," in IEEE/ACM GameSec, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Khouzani, S. Sen, and N. Shroff, "An economic analysis of regulating security investments in the internet," in IEEE INFOCOM, 2013.Google ScholarGoogle Scholar
  19. R. Pal, L. Golubchik, K. Psounis, and P. Hui, "Security pricing as an enabler of cyber-insurance: A first look at differentiated pricing markets," IEEE Transactions on Dependable and Secure Computing, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Pal and P. Hui, "Cyber-insurance for cyber-security: A topological take on modulating insurance premiums," Performance Evaluation Review, vol. 40, no. 3, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Odlyzko, "Economics, psychology, and sociology of security," in Financial Cryptography, 2003.Google ScholarGoogle Scholar
  22. B. Johnson, A. Lazska, and J. Grossklags, "The complexity of estimating systematic risk in networks," in IEEE CSF, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Lazska, B. Johnson, J. Grossklags, and M. Felegyhazi, "Estimating systematic risk in real-world networks," in FC, 2014.Google ScholarGoogle Scholar
  24. A. Mukhopadhyay, S. Chatterjee, D. Saha, A. Mahanti, and S. K. Sadhukan, "Cyber-risk decision models: To insure it or not?," Decision Support Systems, vol. 56, 2013.Google ScholarGoogle Scholar
  25. S. B. Herath and C. T. Herath, "Copula based actuarial model for pricing cyber-insurance policies," Insurance Markets and Companies: Analyses and Actuarial Computations, vol. 2, 2011.Google ScholarGoogle Scholar
  26. M. Baddeley, "Information security: Lessons from behavioral economics," in SHB, 2011.Google ScholarGoogle Scholar
  27. C. Toregas and N. Zahn, Insurance for Cyber-Attacks: The Issue of Setting Premiums in Context. GeorgeWashington University, 2014.Google ScholarGoogle Scholar
  28. M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the internet topology," in ACM SIGCOMM computer communication review, vol. 29, pp. 251?262, ACM, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. T. Bu and D. Towsley, "On distinguishing between internet power law topology generators," in INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, pp. 638?647, IEEE, 2002Google ScholarGoogle Scholar
  30. A. Hoffman, "Internalizing externalities of loss prevention through insurance monopoly," Geneva Risk and Insurance Review, vol. 32, 2007.Google ScholarGoogle Scholar
  31. N.Shetty, G.Schwarz, M.Feleghyazi, and J.Walrand, "Competitive cyber-insurance and internet security," in WEIS, 2009.Google ScholarGoogle Scholar
  32. R. Pal and L. Golubchik, "On economic perspectives of internet security," in ACM SIGMETRICS Workshop on Mathematical Performance Modeling and Analysis (MAMA), 2010.Google ScholarGoogle Scholar
  33. R. Pal and P. Hui, "Modeling internet security investments: The case of tackling topological information uncertainty," in IEEE/ACM GameSec, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Improving Cyber-Security via Profitable Insurance Markets
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGMETRICS Performance Evaluation Review
      ACM SIGMETRICS Performance Evaluation Review  Volume 45, Issue 4
      March 2018
      14 pages
      ISSN:0163-5999
      DOI:10.1145/3273996
      Issue’s Table of Contents

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 August 2018

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader