TY - GEN
T1 - Managing the weakest link
T2 - 18th European Symposium on Research in Computer Security, ESORICS 2013
AU - Laszka, Aron
AU - Johnson, Benjamin
AU - Schöttle, Pascal
AU - Grossklags, Jens
AU - Böhme, Rainer
PY - 2013
Y1 - 2013
N2 - We introduce a two-player stochastic game for modeling secure team selection to add resilience against insider threats. A project manager, Alice, has a secret she wants to protect but must share with a team of individuals selected from within her organization; while an adversary, Eve, wants to learn this secret by bribing one potential team member. Eve does not know which individuals will be chosen by Alice, but both players have information about the bribeability of each potential team member. Specifically, the amount required to successfully bribe each such individual is given by a random variable with a known distribution but an unknown realization. We characterize best-response strategies for both players, and give necessary conditions for determining the game's equilibria. We find that Alice's best strategy involves minimizing the information available to Eve about the team composition. In particular, she should select each potential team member with a non-zero probability, unless she has a perfectly secure strategy. In the special case where the bribeability of each employee is given by a uniformly-distributed random variable, the equilibria can be divided into two outcomes - either Alice is perfectly secure, or her protection is based only on the randomness of her selection.
AB - We introduce a two-player stochastic game for modeling secure team selection to add resilience against insider threats. A project manager, Alice, has a secret she wants to protect but must share with a team of individuals selected from within her organization; while an adversary, Eve, wants to learn this secret by bribing one potential team member. Eve does not know which individuals will be chosen by Alice, but both players have information about the bribeability of each potential team member. Specifically, the amount required to successfully bribe each such individual is given by a random variable with a known distribution but an unknown realization. We characterize best-response strategies for both players, and give necessary conditions for determining the game's equilibria. We find that Alice's best strategy involves minimizing the information available to Eve about the team composition. In particular, she should select each potential team member with a non-zero probability, unless she has a perfectly secure strategy. In the special case where the bribeability of each employee is given by a uniformly-distributed random variable, the equilibria can be divided into two outcomes - either Alice is perfectly secure, or her protection is based only on the randomness of her selection.
KW - Access Control
KW - Computer Security
KW - Cyberespionage
KW - Game Theory
KW - Insider Threats
UR - http://www.scopus.com/inward/record.url?scp=84884766446&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-40203-6_16
DO - 10.1007/978-3-642-40203-6_16
M3 - Conference contribution
AN - SCOPUS:84884766446
SN - 9783642402029
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 273
EP - 290
BT - Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings
Y2 - 9 September 2013 through 13 September 2013
ER -