A Non-Zero-Sum Game Model for Optimal Cyber Defense Strategies

📅 2025-05-21
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Optimizing defense–attack strategies in dynamic, resource-constrained networks remains challenging due to interdependent node vulnerabilities, heterogeneous attack vectors, and budget limitations. Method: This paper proposes the first non-zero-sum game-theoretic model for such settings, integrating node criticality, attack success probability, defense cost, and honeypot deployment overhead into a multi-factor weighted payoff function; Nash equilibrium is computed to derive optimal defense policies. Contribution/Results: We uncover a novel mechanism—network scale expansion dilutes attacker efficacy and improves defender payoff—contrary to conventional assumptions of diminishing returns. Large-scale simulations demonstrate that high-probability, low-cost attacks (e.g., phishing, social engineering) dominate adversarial behavior and thus warrant prioritized mitigation. Furthermore, defender expenditure scales sublinearly with network size, validating the model’s strong scalability and operational effectiveness in real-world deployments.

Technology Category

Application Category

📝 Abstract
In the contemporary digital landscape, cybersecurity has become a critical issue due to the increasing frequency and sophistication of cyber attacks. This study utilizes a non-zero-sum game theoretical framework to model the strategic interactions between cyber attackers and defenders, with the objective of identifying optimal strategies for both. By defining precise payoff functions that incorporate the probabilities and costs associated with various exploits, as well as the values of network nodes and the costs of deploying honeypots, we derive Nash equilibria that inform strategic decisions. The proposed model is validated through extensive simulations, demonstrating its effectiveness in enhancing network security. Our results indicate that high-probability, low-cost exploits like Phishing and Social Engineering are more likely to be used by attackers, necessitating prioritized defense mechanisms. Our findings also show that increasing the number of network nodes dilutes the attacker's efforts, thereby improving the defender's payoff. This study provides valuable insights into optimizing resource allocation for cybersecurity and highlights the scalability and practical applicability of the game-theoretic approach.
Problem

Research questions and friction points this paper is trying to address.

Modeling attacker-defender interactions using non-zero-sum game theory
Identifying optimal defense strategies against high-probability cyber exploits
Optimizing resource allocation to enhance scalable network security
Innovation

Methods, ideas, or system contributions that make the work stand out.

Non-zero-sum game models cyber attacker-defender interactions
Payoff functions include exploit probabilities and costs
Nash equilibria guide optimal defense strategies
🔎 Similar Papers
No similar papers found.
D
Dongyoung Park
Department of Computer Science, Boise State University, Boise, Idaho
Gaby G. Dagher
Gaby G. Dagher
Boise State University
CybersecurityApplied CryprographyData Privacy