Security games with market insurance

Benjamin Johnson, Rainer Böhme, Jens Grossklags

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Citations (SciVal)


Security games are characterized by multiple players who strategically adjust their defenses against an abstract attacker, represented by realizations of nature. The defense strategies include both actions where security generates positive externalities and actions that do not. When the players are assumed to be risk averse, market insurance enters as a third strategic option. We formulate a one-shot security game with market insurance, characterize its pure equilibria, and describe how the equilibria compare to established results. Simplifying assumptions include homogeneous players, fair insurance premiums, and complete information except for realizations of nature. The results add more realism to the interpretation of analytical models of security games and might inform policy makers on adjusting incentives to improve network security and foster the development of a market for cyber-insurance.

Original languageEnglish (US)
Title of host publicationDecision and Game Theory for Security - Second International Conference, GameSec 2011, Proceedings
Number of pages14
StatePublished - 2011
Event2nd International Conference on Decision and Game Theory for Security, GameSec 2011 - College Park, MD, United States
Duration: Nov 14 2011Nov 15 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7037 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other2nd International Conference on Decision and Game Theory for Security, GameSec 2011
Country/TerritoryUnited States
CityCollege Park, MD

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Security games with market insurance'. Together they form a unique fingerprint.

Cite this