Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Modelling cybersecurity strategies with game theory and cyber kill chain
Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.ORCID iD: 0000-0003-0734-0959
Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.ORCID iD: 0000-0002-0055-2740
Luleå University of Technology, Department of Civil, Environmental and Natural Resources Engineering, Operation, Maintenance and Acoustics.ORCID iD: 0000-0003-2268-5277
2025 (English)In: International Journal of Systems Assurance Engineering and Management, ISSN 0975-6809, E-ISSN 0976-4348Article in journal (Refereed) Epub ahead of print
Abstract [en]

Digitalisation within industries has many posi- tive opportunities but poses many cybersecurity-related threats. Cybersecurity is a critical concern for many indus- tries, such as railway, aviation, mining, construction, health- care, and finance, where vital information and operational security are at risk of being compromised. Today, research- ers are looking into various solutions to tackle cybersecurity risks while still retaining the desired functionality of the system. However, it is believed that these challenges can be approached by integrating game theory and the cyber kill chain (CKC), which describes the different stages of a cyberattack, to understand the complexities of cybersecu- rity. Thus, the primary objective of this paper is to demon- strate the application of a strategic game model within the context of cybersecurity, specifically using the cyber kill chain (CKC) model. The focus is on validating the proposed strategic game model through a case study. The case study involves a scenario where defenders select strategies such as “monitor system,” “detecting system,” and “respond to attack,” while attackers choose various attack strategies like “monitoring attack,” “scan the organization’s website,” and “develop malicious payloads” within the stages of the CKC. This approach aims to enhance understanding of the complex challenges and facilitate the development of effective cyber- security solutions. This approach will help in evaluating the effectiveness of different security strategies. The proposed strategic approach uses a non-cooperative game based on mixed strategies. The authors have defined a scenario for simultaneous-move games by estimating values for various elements of the game. By analysing the behaviour of both attacker and defender, the proposed game-based model can help industries develop more effective and efficient security strategies. Further, the proposed model will provide a better understanding of the complex challenges of cybersecurity in industrial contexts. It can also be used to develop appropri- ate strategies to mitigate cybersecurity risks.

Place, publisher, year, edition, pages
Springer Nature , 2025.
Keywords [en]
Game theory, Cyber kill chain, Strategic approach, Probabilities, Case study, Cybersecurity
National Category
Computer and Information Sciences
Research subject
Operation and Maintenance Engineering
Identifiers
URN: urn:nbn:se:ltu:diva-111723DOI: 10.1007/s13198-025-02733-4ISI: 001427337000001Scopus ID: 2-s2.0-85219188193OAI: oai:DiVA.org:ltu-111723DiVA, id: diva2:1939673
Funder
Vinnova, 2019-05140Swedish Energy Agency
Note

Full text license: CC BY

Available from: 2025-02-24 Created: 2025-02-24 Last updated: 2025-10-21

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Kour, RavdeepKarim, RaminDersin, Pierre

Search in DiVA

By author/editor
Kour, RavdeepKarim, RaminDersin, Pierre
By organisation
Operation, Maintenance and Acoustics
In the same journal
International Journal of Systems Assurance Engineering and Management
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 137 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf