Economic Modeling of Restricting the cryptocurrency market on ransomware attacks
Subject Areas : Labor and Demographic EconomicsMehran Garmehi 1 , Sarah Rahimi Devin 2
1 - Assistant Professor at Department of Computer Engineering, University of Bojnord, Iran
2 - BSc. of Information Technology, Bojnord, Iran
Keywords: Crypto currency, E41, JEL Classification: C51, Cyber Attack, Economic Modeling, Economic Mechanism, E42 Keywords: Ransom ware,
Abstract :
The purpose of this article is to investigate the effect of policies restricting access to the cryptocurrency market on the process of countering ransomware attacks. To this purpose, by reflecting on the details of a ransomware attack, we model the economy of these attacks and examine the impact of economic variables on the damage caused by them, and through the data obtained from a field study, it has been shown that the relationship between attackers' profits and the damage caused by the attack is non-linear and has local maximums and minimums, and any countermeasures in response to these attacks must be carefully considered in the consequences from an economic point of view.The results show that in a ransomware attack, an attacker may achieve almost the same profit by setting several different amounts of ransom and inflicting several different amounts of total damage. Thus, it is demonstrated that it is important not to adopt policies that may lead the attacker to demand the amounts of ransom that cause further damage.
- لیسکا، آلن، گالو، تیموتی (1396). باجافزار و روشهای دفاع در برابر باجگیری دیجیتال، ویرایش دوم. ترجمه مهران گرمهء، میلاد حضرتی و سارا رحیمی دوین. گسترش علوم پایه. تهران.
- Fayi, S. Y. A. (2018). What Petya/NotPetya ransomware is and what its remidiations are. In Information Technology-New Generations. Springer, Cham: 93-100.
- Gazet, A. (2010). Comparative analysis of various ransom ware vii. Journal in Computer Virology, 6(1):77–90.
- Goldberg, A. V., & Hartline, J. D. (2003). Envy-free auctions for digital goods. In Proceedings of the 4th ACM conference on Electronic commerce (pp. 29-35).
- Guruswami, V. (2005).On profit-maximizing envy-free pricing, in sixteenth annual ACM-SIAM symposium on Discrete algorithms Society for Industrial and Applied Mathematics: 1164-1173.
- Hernandez-Castro, J., Cartwright, A., & Cartwright, E. (2020). An economic analysis of ransom ware and its welfare consequences. Royal Society Opens Science, 7(3): 190023.
- Hurwicz L. & Reiter, S., (2006). Designing economic mechanisms. New York, US: Cambridge University Press.
- IBM. (2016). Businesses more likely to pay ransom ware than consumers. Industry report. Available at: www-03. ibm. Com/ press/us/ en/ pressrelease/51230.
- Kharraz, A. Arshad, S. Mulliner, C. Robertson, W. & Kirda, E. (2016). UNVEIL: A large-scale, automated approach to detecting ransom ware. In Proceedings of the 25th USENIX Security Symposium (USENIX Security): 757–772.
- Kharraz, A. Robertson, W. Balzarotti, D. Bilge, L. & Kirda, E. (2015). Cutting the gordian knot: A look under the hood of ransomware attacks. In Proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Springer: 3–24.
- Laszka A., Farhang S., Grossklags J. (2017). On the economics of ransomware. In: Rass S., An B., Kiekintveld C., Fang F., Schauer S. (eds) Decision and Game Theory for Security. GameSec Lecture Notes in Computer Science, 10575. Springer, Cham.
- Liao, K. Zhao, Z. Doup´e, A. & Ahn, Gail-Joon. (2016). Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin. In Proceedings of the 2016 APWG Symposium on Electronic Crime Research (eCrime).
- Luo, X. & Liao, Q. (2007). Awareness education as the key to ransom ware prevention. Information Systems Security, 16(4):195–202.
- Noam, N. Roughgarden, T., & Tardos, E. (2007). Algorithmic Game Theory. Cambridge University Press.
- The Law Library of Congress, Global Legal Research Center. (June 2018). Regulation of Cryptocurrency around the World, Report. Available at: https://www.loc.gov/law/help/cryptocurrency/cryptocurrency-world-survey. pdf
- Wikipedia (2019). Mechanism design, January, Available at: https://en.wikipedia.org/wiki/Mechanism_design
- Wikipedia. (2017). WannaCry ransomware attack. Available at: https://en.wikipedia.org/wiki/WannaCry_ransomware_attack.
_||_