Cyber Epidemic Models with Dependences

Size: px
Start display at page:

Download "Cyber Epidemic Models with Dependences"

Transcription

1 Cyber Epidemic Models wit Dependences Maocao Xu 1, Gaofeng Da 2 and Souuai Xu 3 1 Department of Matematics, Illinois State University mxu2@ilstu.edu 2 Institute for Cyber Security, University of Texas at San Antonio dagfvc@gmail.com 3 Department of Computer Science, University of Texas at San Antonio sxu@cs.utsa.edu corresponding autor Abstract Studying models of cyber epidemics over arbitrary complex networks can deepen our understanding of cyber security from a wole-system perspective. In tis paper, we initiate te investigation of cyber epidemic models tat accommodate te dependences between te cyber attack events. Due to te notorious difficulty in dealing wit suc dependences, essentially all existing cyber epidemic models ave assumed tem away. Specifically, we introduce te idea of Copulas into cyber epidemic models for accommodating te dependences between te cyber attack events. We investigate te epidemic equilibrium tresolds as well as te bounds for bot equilibrium and nonequilibrium infection probabilities. We furter caracterize te side-effects of assuming away te due dependences between te cyber attack events, by sowing tat te results tereof are unnecessarily restrictive or even incorrect. Keywords: Copula, Cyber epidemics, dependence, epidemic tresold, spectral radius, infection probability 1 Introduction Cyberspace or Internet is peraps te most complex man-made system. Wile cyberspace as become an indispensable part of te society, economy and national security, cyber attacks also ave become an increasingly devastating problem. Despite studies and progresses in te past decades, our understanding of cyber security from a wole-system perspective, rater tan from a component or building-block perspective, is still at its infant stage. Tis is caused by many factors, including te deart of powerful matematical models tat can capture and reason te interactions between te cyber attacks and te cyber defenses. Recently, researcers ave started pursuing te cyber-security value of biological epidemics -like matematical models. Wile conceptually attractive, biological epidemic models cannot be directly used to describe cyber security because tere are many cyber-specific issues. One particular issue, wic we initiate its study in te present paper, is te dependences between te cyber attack events. To te best of our knowledge, tese dependences ave been explicitly assumed away in essentially all existing cyber epidemic models, peraps because tey are notoriously difficult to cope wit. Indeed, accommodating te dependences introduces yet anoter dimension of difficulty to cyber epidemic models tat incorporate arbitrary complex network structures. However, te dependences are inerent because, for example, te events tat computers get infected are not independent of eac oter, and a malware may first infect some computers because te users visit some malicious websites and ten spread over te network. Moreover, cyber attacks may be well coordinated by intelligent malwares, and te coordination causes positive dependences between te attack events. 1.1 Our contributions In tis paper, we initiate te systematic study of a new sub-field in cyber epidemic models, namely understanding and caracterizing te importance of te dependences between te attack events in cyber epidemic models tat accommodate arbitrary complex network structures. Tis is demonstrated troug a non-trivial generalization of te 1

2 powerful pus- and pull-based cyber epidemic model tat was recently investigated in [19]. Specifically, we capture te dependences between te cyber attack events by incorporating te idea of Copulas into cyber epidemic models. To te best of our knowledge, tis is te first systematic study of cyber epidemic models tat accommodate dependences, rater tan assuming tem away. Specifically, we make two contributions. First, we derive epidemic equilibrium tresolds, namely sufficient conditions under wic te epidemic spreading enters a non-negative equilibrium te spreading never dies out wen tere are pull-based attacks, meaning tat only positive equilibrium is relevant under tis circumstance. Some of te sufficient conditions are less restrictive but require ard-to-obtain information i.e., tese conditions are teoretically more interesting, and te oters are more restrictive but require easy-to-obtain information i.e., tese conditions are practically more useful. We also derive bounds for te equilibrium infection probabilities and discuss teir tigtness. Te bounds are easy to obtain/compute, and are useful especially wen it is infeasible to obtain te equilibrium infection probabilities numerically let alone analytically. For example, te s can be treated as te worst-case scenarios wen provisioning defense resources. For Erdős-Rényi ER and power-law networks, we furter propose to approximate te equilibrium infection probabilities by taking advantage of te bounds. Te approximation results are smaller tan te s and would not underestimate te number of infected nodes, meaning tat te approximation results can lead to more cost-effective defense. We furter present bounds for non-equilibrium infection probabilities, no matter weter te spreading converges to equilibrium or not. All te results are obtained by explicitly accommodating te dependence structures between te cyber attack events. Second, we caracterize te side-effects of assuming away te due dependences on te bounds for equilibrium infection probabilities, on te epidemic equilibrium tresolds, and on te non-equilibrium infection probabilities. We sow tat assuming away te due dependences can make te results tereof unnecessarily restrictive or even incorrect. We furter discuss te cyber security implications of te side-effects. It is wort mentioning tat as a first step towards ultimately tackling te dependence problem in cyber epidemic models, te Copulas tecnique, wic we use in te present paper, is appealing because of te following. On one and, it leads to tractable models, wile capable of coping wit ig-dimensional dependence i.e., dependence between a large vector of random variables. On te oter and, tere are families of copula structures tat ave been extensively investigated in te literature of Applied Probability Teory and Risk Management, and various metods ave been developed for estimating te types and parameters of copula structures in practice. Of course, muc researc remains to be done before we can answer questions suc as: Wat approac is te most appropriate for accommodating dependence in cyber epidemic models, under wat circumstances? 1.2 Related work Biological epidemic models can be traced back to McKendrick and Kermack [13, 10]. Suc omogeneous biological epidemic models were introduced to computer science for caracterizing te spreading of computer viruses in [9]. Heterogeneous epidemic models, especially te ones tat accommodate arbitrary network structures, were not studied until recently [17, 6, 1]. Tese studies led to te full-fledged pus- and pull-based cyber epidemic model [19], wic is te starting point of te present paper. To te best of our knowledge, all existing cyber epidemic models, wic aim to accommodate arbitrary network structures including oter recent studies suc as [16, 11, 20] and te references terein, assumed tat te attacks are independent of eac oter. Tis is plausible because accommodating arbitrary network structures in cyber epidemic models already make te resulting models difficult to analyze, and accommodating dependences introduces, as we sow in te present paper, anoter dimension of difficulty to te models. Te only exception is due to our recent study [18], wic is based on a different approac to modeling cyber epidemics [11]. Te main contribution of [18] is to get rid of te exponential distribution assumptions for certain random variables. Moreover, te model in [18] can only accommodate te specific Marsall-Olkin dependence structure between te attack events. In contrast, we ere accommodate arbitrary dependence structures between te attack events, wile investigating te epidemic equilibrium tresolds, te equilibrium and non-equilibrium infection probabilities, and te side-effects of assuming away te due dependences. Many of tese issues are not studied in te context of [18] because its focus is different. Tis explains wy te present paper is te first systematic treatment of dependences in 2

3 cyber epidemic models. Te dependence modeled in te present paper is static i.e., time-invariant. Tis study inspired [5], wic makes a furter step towards modeling dynamic dependence between cyber attacks, but using a different modeling approac. Te rest of te paper is organized as follows. In Section 2 we briefly review some facts about Copulas. In Section 3 we investigate te generalized cyber epidemic model tat accommodates te dependences between te cyber attack events. In Section 4 we caracterize te side-effects as caused by assuming away te due dependences. In Section 5, we conclude te paper wit future researc problems. Te following table summarizes te main notations used in te paper. G = V, E te grap/network in wic cyber epidemics occurs, were V is te node set and E is te edge set degv te degree of node v in grap G = V, E, wic can be represented by adjacency matrix A I v t, I v,j t te state of node v at time t: I v t = 1 means infected and 0 means secure; I v,j t is te state of te jt neigbor of node v 1 means infected and 0 means secure, were 1 j degv i v t te probability tat node v V is infected at time t i v,j t te condition probability tat at time t node v V is secure but te jt neigbor of node v is infected i v, i + v lower and s for te non-equilibrium infection probability lim t i v t, were te system does not converge to any equilibrium i v, i v,j te equilibrium infection probabilities tat node v and its jt neigbor are infected, respectively i, i + v i is te for te equilibrium infection probability i v for every v, i + v is te for te equilibrium infection probability i v of node v i, i v i = i 1,..., i N were N = V, i v = i v,1,..., i v,degv α te probability tat a secure node v V is infected by pull-based cyber attacks at a time step β te probability tat an infected node v V becomes secure at a time step γ te probability tat an infected node u successfully attacks node v over u, v E at a time step ρm spectral radius of matrix M C v degv-copula describing te dependence between te pus-based cyber attacks against node v C 2-copula describing te dependence between te pull-based attacks and te pus-based attacks against a node δ C te diagonal section of copula C, i.e., δ C u = Cu,..., u 2 Preliminaries Copulas can model dependences by relating te individual marginal distributions to teir multivariate joint distribution. In tis paper we will use te n-copulas [8, 15]. Specifically, a function C : [0, 1] n [0, 1] is called n-copula if: Cu 1,..., u n is increasing in eac component u z, z {1,..., n}. Cu 1,..., u z 1, 0, u z+1,..., u n = 0 for all u j [0, 1], j = 1,..., n, j z. C1,..., 1, u z, 1,..., 1 = u z for all u z [0, 1], z = 1,..., n. C is n-increasing, i.e., for all u 1,1,..., u 1,n and u 2,1,..., u 2,n in [0, 1] n wit u 1,j u 2,j and for all j = 1,..., n, it olds tat n j=1 z j Cu z1,1,..., u zn,n 0. z 1 =1 z n =1 Let R 1,..., R n be random variables wit distribution functions F 1,..., F n, respectively. Te joint distribution function is F r 1,..., r n = P R 1 r 1,..., R n r n. Te well-known Sklar s teorem states tat tere exists an n-copula C suc tat F r 1,..., r n = C F 1 r 1,..., F n r n. 3

4 Tere are many families of copulas [8, 15]. One example is te Gaussian copula wit Cu 1,..., u n = Φ Φ 1 u 1,..., Φ 1 u n, were Φ 1 is te inverse cumulative distribution function of te standard normal distribution and Φ is te joint cumulative distribution function of a multivariate normal distribution wit mean vector zero and covariance matrix equal to te correlation matrix. For simplicity, we assume tat te correlation matrix as te form = 1 σ... σ σ 1 σ σ... σ σ... 1 were σ measures te correlation between two random variables. Terefore, te Gaussian copula can be rewritten as Anoter example is te Arcimedean family wit, Cu 1,..., u n = Φ σ Φ 1 u 1,..., Φ 1 u n. Cu 1,..., u n = ϕ 1 ϕu ϕu n, were function ϕ is called a generator of C and satisfies certain properties see [14] for details. Te Arcimedean family contains many well-known copula functions suc as te Clayton and Frank copulas [15, 3]. Te generator of te Clayton copula is ϕ θ u = u θ 1, and we ave n Cu 1,..., u n = j=1 j n + 1 u θ 1/θ, θ > 0. Te generator of te Frank copula is ψ ξ u = log e ξu 1, and we ave e ξ 1 Cu 1,..., u n = 1 n } {1 ξ log j=1 + e ξu j 1 e ξ 1 n 1, ξ > 0. For illustration purpose, we will use te Gaussian, Clayton and Frank copulas as examples. In order to compare te effects of dependences, we need to compare te degrees of dependences. For tis purpose, we use te concordance order [15, 8]. Let C 1 and C 2 be two copulas, we say C 1 is less tan C 2 in concordance order if C 1 u 1,..., u n C 2 u 1,..., u n for all 0 u i 1, i = 1,..., n. In particular, Gaussian copulas and Clayton copulas are increasing in σ and θ in concordance order, respectively. Te following lemmas will be used in te paper. Lemma 1 [15] Let C be any n-copula, ten n max u j n + 1, 0 Cu 1,..., u n min{u 1,..., u n }. j=1 Lemma 2 [15] Let C be an n-copula, ten Cu 1,..., u n Cv 1,..., v n n u j v j. j=1 4

5 3 Cyber Epidemic Model Wit Arbitrary Dependences Now we present and investigate te cyber epidemic model tat accommodates te dependences between te cyber attack events. Tis is te first systematic treatment of dependences in cyber epidemic models. 3.1 Te Model As in [19], we consider an undirected finite network grap G = V, E, were V = {1, 2,..., N} is te set of N = V nodes vertices tat can abstract computers or software components at an appropriate resolution, and E = {u, v : u, v V} is te set of edges. Note tat G abstracts te network structure according to wic te pus-based cyber attacks take place e.g., malware spreading, were u, v E abstracts tat node u can attack node v. In bot principle and practice, G can range from a complete grap i.e., any u V can directly attack any v V to any specific grap structure i.e., node u may not be able to attack node v directly because, for example, te traffic from node u is filtered or u is blacklisted by v, wic explains wy we sould pursue general results witout restricting te network/grap structures. Denote by A = a vu te adjacency matrix of G, were a vu = 1 if and only if u, v E, and a vu = 0 oterwise. Note tat te problem setting naturally implies a vv = 0. Denote by degv te degree of node v. In a discrete-time model, node v V is eiter secure but vulnerable to attacks or infected and can attack oter nodes at any time t = 0, 1,.... At eac time step, an infected node v becomes secure wit probability β, wic abstracts te defense power. Te model accommodates two large classes of cyber attacks: a secure node v can become infected because of i pull-based cyber attacks wit probability α, wic include drive-by-download attacks i.e., node v getting infected because its user visits a malicious website and insider attacks i.e., te user intentionally runs a malware on node v, or ii pus-based cyber attacks launced by v s infected neigbor u over edge u, v E wit probability γ. Our extension to te above model is to accommodate te dependences between te pus-based attacks as well as te dependences between te pus-based attacks and te pull-based attacks. Tese attacks are not independent because te events tat te nodes get infected are not independent of eac oter, and because te pus-based attacks are not independent of te pull-based attacks e.g., a malware could first infect some nodes via te pull-based cyber attacks and ten launc te pus-based cyber attacks from te infected nodes. Moreover, te dependences between te pus-based attacks can model tat intelligent malwares launc coordinated attacks against te secure nodes. Specifically, let I v t denote te state of node v at time t, were I v t = 1 means v is infected and 0 means v is secure. Let I v,1 t,..., I v,degv t denote te state vector of node v s neigbors at time t, were { 1, te jt neigbor of node v is infected at time t, I v,j t = 0, oterwise. Define i v t = PI v t = 1 and i v,j t = PI v,j t = 1 I v t = 0 were j = 1,..., degv. Let X v t = 1 denote te event tat node v is infected at time t + 1 because of te pus-based cyber attacks, and X v t = 0 oterwise. Let X v,j t + 1 = 1 denote te event tat node v is infected at time t + 1 by its jt neigbor, and X v,j t + 1 = 0 oterwise. Note tat PX v,j t + 1 = 1 I v t = 0 = γ i v,j t. Since any dependence structure between X v,1 t + 1,..., X v,degv t + 1 always can be accommodated by some copula function C v, we ave PX v t + 1 = 0 I v t = 0 = C v 1 PXv,1 t + 1 = 1 I v t = 0,..., 1 PX v,degv t + 1 = 1 I v t = 0 = C v 1 γiv,1 t,..., 1 γi v,degv t. 1 Similarly, let Y v t + 1 = 1 denote te event tat node v is infected at time t + 1 because of te pull-based cyber attacks. Ten, we ave PY v t + 1 = 1 I v t = 0 = α. By furter accommodating te dependence structure between te pus-based attacks and te pull-based attacks via some copula function C, we ave PI v t + 1 = 1 I v t = 0 = 1 P X v t + 1 = 0, Y v t + 1 = 0 I v t = 0 = 1 C C v 1 γiv,1 t,..., 1 γi v,degv t. 2 5

6 Note tat PI v t + 1 = 1 I v t = 1 = 1 βi v t. 3 From Eqs. 1, 2 and 3, we obtain te probability tat node v V is infected at time t + 1 as: i v t + 1 = PI v t + 1 = 1 = PI v t + 1 = 1 I v t = 1PI v t = 1 + PI v t + 1 = 1 I v t = 0PI v t = 0 = 1 β i v t + PI v t + 1 = 1 I v t = 0 1 i v t = 1 βi v t + [ 1 C C v 1 γiv,1 t,..., 1 γi v,degv t ] 1 i v t. 4 We will analyze Eq. 4 for v V to caracterize te effects of te dependence structures C and C v and te side-effects of assuming tem away. Note tat for te special case tat te X v,j s are independent of eac oter and te pus-based attacks and te pull-based attacks are also independent of eac oter, Eq. 4 degenerates to te model in [19]. Note also tat in order to caracterize te side-effects of assuming away te dependences, we need to accommodate te dependences at a iger-level of abstraction tan te model parameters α and γ. Tis is because te parameters are indeed relatively easier to obtain in experiments/practice e.g., considering a single compromised neigbor tat is launcing te pus-based attacks, and considering te pull-based attacks in te absence of te pusbased attacks. 3.2 Epidemic Equilibrium Tresold and Bounds for Equilibrium Infection Probabilities Te concept of epidemic equilibrium tresold [19] naturally extends te well-known concept of epidemic tresold in tat te former describes te condition under wic te epidemic spreading converges to a non-negative equilibrium, wereas te latter traditionally describes te condition under wic te epidemic spreading converges to 0 i.e., te spreading dies out. Note tat α > 0 implies tat te spreading will never die out and tat α = 0 is necessary for te spreading to die out. Denote by i v te equilibrium infection probability for node v V. In te equilibrium, Eq. 4 becomes: [ ] i v = 1 βi v + 1 C C v 1 γi v,1,..., 1 γi v,degv 1 i v, v V. 5 In wat follows, Teorem 1 gives a general epidemic equilibrium tresold i.e., sufficient condition under wic te spreading enters te equilibrium, and Teorem 2 gives a more succinct but more restrictive sufficient condition. Lemma 3 Let A be te adjacency matrix of G. If ρa < β + α2, 6 γβ ten system 4 as a unique equilibrium i 1,..., i N [0, 1]N. Proof For any v V, define f v x : [0, 1] N [0, 1] as f v x = 1 C C v 1 γxv,1,..., 1 γx v,degv β + 1 C C v 1 γxv,1,..., 1 γx v,degv, v = 1,..., N, were x = x 1,..., x N [0, 1] N. Define f : [0, 1] N [0, 1] N, were fx = f 1 x,..., f N x. According to te Banac fixed-point teorem [7], it is sufficient to sow tat fx = x as a unique solution i ; tat is, we need to prove tat f is a contraction mapping. Let x, y [0, 1] N. Consider te distance between tem in te Euclidean norm, fx fy = N f v x f v y 2 = N 2 βγv, v=1 6 v=1 v

7 were Γ v = C C v 1 γxv,1,..., 1 γx v,degv C Cv 1 γyv,1,..., 1 γy v,degv, v = β + 1 C C v 1 γxv,1,..., 1 γx v,degv By Lemmas 1 and 2, it follows tat Terefore, we ave Moreover, degv N x v,k y v,k v=1 k=1 β + 1 C C v 1 γyv,1,..., 1 γy v,degv. degv Γ v γ x v,k y v,k and v β + α 2. k=1 2 degv βγ N fx fy β + α 2 x v,k y v,k. 2 v=1 k=1 = x 1 y 1,..., x N y N A 2 x 1 y 1,..., x N y N T x 1 y 1,..., x N y N 2 A 2 = x y 2 A 2, were A denotes te operator norm of A. Since A is symmetric matrix, we ave From condition 6, it follows tat wic means tat f is a contraction mapping. A = ρa. fx fy βγρa 2 x y < x y, β + α Teorem 1 general epidemic equilibrium tresold Let A be te adjacency matrix of G and D be te diagonal matrix wit te vt 1 v N diagonal element equal to α, β, γ, i v = C C v 1 γi v,1,..., 1 γi v,degv β, were i v is te equilibrium infection probability tat satisfies Eq. 5. Let W = D+γA. If condition 6 olds, namely tat system 4 as a unique equilibrium, and te spectral radius ρw < 1, ten lim t i v t = i v exponentially for all v V. Proof According to Lemma 3, tere is a unique solution for i v under condition 6. Denote by r v t = i v t i v. We want to identify a sufficient condition under wic lim t r v t = 0 for all v V. Note tat [ ] r v t + 1 = r v t C C v 1 γi v,1,..., 1 γi v,degv β + 1 i v t [ C C v 1 γi v,1,..., 1 γi v,degv C C v 1 γiv,1 t,..., 1 γi v,degv t ]. 7

8 By Lemma 2, we ave r v t + 1 r v t α, β, γ, i v + 1 i v t C v 1 γi v,1,..., 1 γi v,degv C v 1 γiv,1 t,..., 1 γi v,degv t degv r v t α, β, γ, i v + γ 1 i v t i v,j i v,j t j=1 degv r v t α, β, γ, i v + γ r v,j t, j=1 were α, β, γ, i v = C C v 1 γi v,1,..., 1 γi v,degv β. Define degv z v t + 1 = z v tα, β, γ, i v + γ z v,j t, wit z v 0 r v 0 and z v,j 0 r v,j 0 for j = 1,..., degv. We see r v t z v t for any t. Let zt = z 1 t,..., z n t T. Ten, we ave te following matrix form j=1 zt + 1 = W zt = W t+1 z0, 7 were W = D + γa, D is te diagonal matrix wit diagonal element α, β, γ, i v, and A is te adjacency matrix of G. Since matrix W is nonnegative and symmetric, te Spectral Teorem [12] says tat ρw is real. By using te well-known Gelfand formula, if ρw < 1, ten lim t W t = 0 and terefore lim t zt = 0. Since ρw = lim t W t 1/t and W t [ρw ] t, t, were is te norm in real space R n, we conclude tat W t converges to 0 exponentially wen ρw < 1. Tis means tat te convergence rate of lim t it = i is at least exponential. Use of te sufficient condition given by Teorem 1 requires to know i i.e., i v for all v, wic is difficult to obtain analytically. It is terefore important to weaken tis requirement. Now we present a sufficient condition tat only requires te equilibrium infection probability i v for some v rater tan for all v V. According to [4], we ave ρw max v V α, β, γ, i v + γρa. Terefore, a more restrictive tan te one given by Teorem 1 sufficient condition is to require max α, β, γ, v V i v + γρa < 1, namely ρa < 1 max v V α, β, γ, i v. γ According to Eq. 5, we ave α, β, γ, i v = 1 β 1 i. v Terefore, we obtain te following more restrictive, but more succinct, sufficient condition: Corollary 1 lim t i v t = i v exponentially for all v V, if { 1 maxv V 1 β/1 i ρa min v, γ } β + α2. 8 γβ 8

9 Applying te above sufficient condition still requires to know te minimal and maximal i v s, wic is ard to obtain analytically. Altoug it is always possible to obtain tem numerically, we would want to ave some more general results witout relying on s. In wat follows we present suc a sufficient condition Teorem 2, wic requires te following Proposition 1 tat presents bounds for te equilibrium infection probability. Te bounds are certainly of independent value. Proposition 1 bounds for equilibrium infection probabilities For any dependence structures C and C v, wic may be unknown, te equilibrium infection probability i v for v V satisfies i i v i + v, were { } i = γ β I{γ > α + β} + α min α + γdegv I{γ α + β}, γ β + α i + β+1, 1 v = { }. β + min α + γdegv β+1, 1 Proof Rewrite Eq. 5 as i v = 1 C C v 1 γi v,1,..., 1 γi v,degv. 9 β + 1 C C v 1 γi v,1,..., 1 γi v,degv By noticing te monotonicity in 9 and applying Lemma 1, we obtain } { max {γi v,1,..., γi v,degv, α min α + γ } degv } i β + max {γi j=1 i v,j, 1 v,1,..., γi v,degv, α v { β + min α + γ }. 10 degv j=1 i v,j, 1 Let us first consider te. Note tat for eac v V, By substituting x 1 for i v,j in Ineq. 10, we ave i v x 1 def = α β + α. i v x 2 = max {γx 1, α} β + max {γx 1, α}. By substituting x 2 for i v,j in Ineq. 10, we obtain x 3. By repeating te substitution, we obtain a sequence {x n, n 1} wit x n = max {γx n 1, α} β + max {γx n 1, α}, x 0 = 0. Since {x n, n 1} is increasing and bounded, we can get its limit, namely i, by solving te following equation max{γx, α} β + max{γx, α} = x. For te, note tat i v β for v V. By substituting 1/β + 1 for i v,j in Ineq. 10, we get i + v. It is useful to know wen te bounds in Proposition 1 are tigt. For tis purpose, we observe tat if β+1 degv 0, meaning tat γ degv << 1 and tat te attack-power is not strong, we ave i + v i = β + α. Tis means α tat te bounds are tigt wen te attack-power is not strong. On te oter and, Proposition 1 allows us to derive te following more succinct, but more restrictive tan Corollary 1 and terefore Teorem 1, sufficient condition for te epidemic spreading converges to te equilibrium i.e., epidemic equilibrium tresold. Te new sufficient condition involves te bounds i and i + v only i.e., none of te equilibrium probabilities tat are ard to obtain analytically. 9 γ

10 Teorem 2 succinct epidemic equilibrium tresold Te spreading enters te unique equilibrium if { { }} β 1 max max 1 v V 1 i ρa, β 1 1 i + v, γ were i and i + v are defined in Proposition 1. Proof Note tat for any v V, we ave max α, β, γ, v V i v = max v V 1 β { { 1 i max β max 1 v v V 1 i, 1 Note tat wic implies Terefore, 1 max v V { max { 1 { { max max 1 v V 1 β 1 i, 1 β 1 i β 1 i, 1 β 1 i + v According to Corollary 1, we obtain te desired result. }} β + α2 1, β β 1 i + v }} 1 β + α2. β β 1 i + v { min 1 max 1 β/1 v V i v, }}. } β + α2. β 3.3 Tigter Bounds for Equilibrium Infection Probabilities in Star and Regular Networks Star networks. A star-saped network consists of a ub and N 1 leaves tat are connected only to te ub. Hence, te adjacency matrix A can be represented as A = Te spectral radius is ρa = N 1. In tis case, Eq. 5 becomes: N N i = 1 C δ C 1 γi l β + 1 C δ C 1 γi 11 l, i l = 1 C 1 γi 1 + β C 1 γi 12, were i and i l are te equilibrium probabilities tat te ub and te leaves are infected, respectively. Note tat te effect of te copula C on te equilibrium probabilities only depends on its diagonal section δ C. In wat follows we present two results about te equilibrium infection probabilities, wic are not implied by te above general results tat apply to arbitrary network structures. First, we can prove i i l. Proposition 2 For te star networks, it olds tat i i l. 10

11 Proof Denote by fx = 1 C δ C 1 γx β + 1 C δ C 1 γx and gx = 1 C 1 γx 1 + β C 1 γx were x [0, 1]. Since δ C x x, we ave fx gx. Suppose i < i l and i, i l is a solution to Eqs. 11 and 12. Ten, i = fi l = g 1 i l < i l. Since gx is increasing in x and so is g 1, we ave i l gi l and fi l < i l gi l, wic contradicts wit fx gx for x [0, 1]. Second, we present refined bounds for equilibrium infection probabilities i and i l. Te bounds are useful because even in te case of star networks, it is ard to derive analytic expressions and infeasible to numerically compute especially for complex dependence structures i and i l. Proposition 3 tigter s for te equilibrium infection probabilities in star networks For star networks and regardless of te dependence structures wic can be unknown, we ave i i i + and i i l i + l, were i is defined in Proposition 1 and { i = β + 1 I β α } N 1γ and + N 1γ α β + N 1γ α β 2 + 4N 1γα I 2N 1γ i + l = 1 { 1 β + 1 I β α } γ { 1 β + 1 < + γ α β + γ α β 2 { + 4γα 1 I 2γ β + 1 < 1 α }. γ Proof Te i is te same as in Proposition 1. Let s focus on i +. From Ineq. 10, we ave i min{α + N 1γi l, 1} β + min{α + N 1γi l, 1} = fi l. Since te rigt-and side of te above inequality increases in i l, by Proposition 2 we ave and terefore i i + For te i + l, were i + i fi, is te solution to equation 1 α }. N 1γ x = fx. 13, we can similarly obtain te desired result by solving equation x x = f N Now we explain wy te s i + and i + l given by Proposition 3 are smaller i.e., tigter tan te general s tat can be derived from Proposition 1 by instantiating G = V, E as star networks. To see tis, we note tat i + is te solution to Eq. 13 and i + 1 β+1, meaning tat { } min α + N 1 γ i + β+1 {, 1 }, β + min α + N 1 γ β+1, 1 were te rigt-and side of te inequality is exactly te tat can be derived from Proposition 1 by substituting degv wit te degree of te ub. Tis means tat i + is smaller tan te given by Proposition 11

12 1. Similarly, we can sow tat i + l is smaller tan te given by Proposition 1. Moreover, by comparing 13 and 14, we see tat i + i + l. Since te i is te same as te given by Proposition 1, we conclude tat te bounds given by Proposition 3 are tigter tan te bounds given by Proposition 1. To see te tigtness of te bounds given by Proposition 3, we consider two combinations of dependence structures: C, C v =Gaussian,Frank and C, C v =Gaussian, Clayton wit parameters σ = θ = ξ = 0.1 as reviewed in Section 2. Figure 1 plots i, i l, i, i +, and i + l for N = 3,..., 81 wit α, β, γ = 0.5, 0.1, 0.1; all tese parameter settings satisfy condition 8. We observe tat te i + becomes flat for N 5, because it causes i + = 1 β+1 i.e., independent of N; wereas, te i + l is flat because it is always independent of N. We observe tat te for ub node, i +, becomes extremely tigt for dense star networks wit N > 40. However, te for leave nodes almost always exibits tat i + l i l i.e., te upper bound overestimates about 0.88 infected nodes for a star network of N = 80 nodes. In any case, te s only somewat overestimate te s i v s and tus can be used for decision-making purpose wen i v s are infeasible to compute Star Leaves Star Leaves Star Leaves Star Leaves a Hub: Gaussian, Frank b Leaves: Gaussian, Frank c Hub: Gaussian, Clayton d Leaves: Gaussian, Clayton Figure 1: Star networks: i + for ub i + l for leaves vs. i for ub i l i for bot ub and leaves wit respect to α, β, γ = 0.5, 0.1, 0.1 and C, C v. for leaves vs. Regular networks. For regular networks, eac node v V as degree d for some d [1, N 1] and ρa = d. According to Proposition 1, we ave i v = 1 C C v 1 γi v,1,..., 1 γi v,d β + 1 C C v 1 γi v,1,..., 1 γi, v V. v,d Now we want to present refined bounds for equilibrium infection probability i v. Proposition 4 tigter for te equilibrium infection probability in regular networks For regular network G = V, E and regardless of te dependence structures wic can be unknown, we ave i i v i + for any v V, were i is defined in Proposition 1 and i + = 1 { 1 β + 1 I β α } γd + γd α β + γd α β 2 { + 4γαd 1 I 2γd β + 1 < 1 α }. γd Proof Define function fx = min{α + γdx, 1} β + min{α + γdx, 1} and a sequence {x n, n 0} wit x n = fx n 1, x 0 = 1/β + 1. Observe tat for all v V, we ave i v x 0 and ence from Ineq. 10, it follows tat i v x 1 for all v V. By repeating tis process, we ave i v x n for all n. Since fx is increasing and x 1 x 0, x n is decreasing in n. Tus, we ave i v i +, wic is te solution 1 of te equation x = fx. If β+1 1 α γd, ten i + = 1 β+1 ; oterwise, i + is te positive solution to equation γdx 2 + α + β γdx α = 0. Tus, we obtain te desired result. 12

13 Note tat te i + given by Proposition 4 is smaller tan te i + v obtained by instantiating degv = d in Proposition 1, because i + v is exactly te x 1 defined in te proof of Proposition 4. To see te tigtness of bounds i and i + given by Proposition 4, we consider C, C v =Gaussian,Frank and C, C v =Gaussian, Clayton wit parameters σ = θ = ξ = 0.1 as reviewed in Section 2. Figure 2 plots numerical i v, i and i + wit respect to node degree d = 2,..., 80 wit α, β, γ = 0.5, 0.1, 0.01; all tese parameter settings satisfy condition 8. We observe tat i + v becomes flat for sufficiently dense regular networks. Tis is because i + v = 1 β+1 wen d 1 αβ+1 γ. For C, C v =Gaussian,Frank, we furter observe tat te i + v is reasonably tigt especially for relatively sparse regular networks, wit i + v i v < for d < 20 i.e., for a sparse regular network of N = 1000 nodes, te only overestimates at most 21 infected nodes. Even for dense regular network wit d > 20, we ave i + v i v i.e., for a dense regular network of N = 1000 nodes, te only overestimates at most 38 infected nodes, were equality olds for d = 54. For C, C v =Gaussian, Clayton, we also observe tat te i + v is tigt especially for relatively sparse regular networks wit d < 20 and i + v i v < i.e., for a sparse regular network of N = 1000 nodes, te only overestimates at most 21 infected nodes. Even for dense regular network wit d > 20, we ave i + v i v 0.039, were equality olds for d = 54. Tis means tat for decision-making purpose, te defender can use te i + v instead of te i v, especially wen i v is infeasible to compute Regular Regular a Gaussian,Frank,0.5,0.1,0.01 b Gaussian,Clayton,0.5,0.1,0.01 Figure 2: Regular networks: i + v vs. i v vs. i v C, C v, α, β, γ wit respect to 3.4 Approximating Equilibrium Infection Probabilities in ER and Power-law Networks For star and regular networks, we ave derived tigter bounds for equilibrium infection probabilities tan te general bounds given by Proposition 1. Unfortunately, we do not know ow to derive tigter bounds for ER and power-law networks. As an alternative, we propose to approximate equilibrium infection probabilities by taking advantage of te upper and s. Te approximation is useful because it is often smaller tan te, wic never underestimates, but may substantially overestimate, te treats in terms of equilibrium infection probabilities. Tat is, te approximation metod can lead to more cost-effective defense tan te. Te approximation metod is te following: We first compute s, s, and s for a feasible number of instances of G, C, C v, α, β, γ, based on given computer resources. We ten use te resulting data to derive via statistical metods some function of te lower and s. For even larger G of te same type as well as C, C v of te same kind, te resulting function would be smaller tan te and would not underestimate te equilibrium infection probabilities. Te key insigt is tat we can compute, for networks of any size, te upper and s according to Proposition 1. Tis means tat we can approximate te equilibrium infection probabilities for arbitrarily large networks, for wic it is often infeasible to numerically let alone analytically compute te equilibrium infection probabilities. To illustrate te approximation metod, we also consider C, C v =Gaussian,Frank and C, C v =Gaussian, Clayton wit parameters σ = θ = ξ = 0.1 as reviewed in Section 2. We use te erdos.renyi.game generator of te igrap package in te R system to generate a random ER network of N = 1000 nodes and edge probability 0.01; te resulting network instance as spectral radius We use te static.power.law.game 13

14 generator of te igrap package in te R system to generate a random power-law network of N = 1000 nodes, 5000 edges, and power-law exponent 2.1 note tat 2.1 is te power-law exponent of te Internet AS-level network [6]; te resulting network instance as spectral radius We consider combinations of α, β, γ tat satisfy condition 8, were α {0.01, 0.05, 0.1, 0.2, 0.3, 0.4, 0.5}, β {0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9}, γ {0.01, 0.02, 0.03, 0.04, 0.05, 0.06, 0.07, 0.08, 0.09, 0.1}. It turns out tat for C, C v =Gaussian, Frank, te ER network as 307 combinations of α, β, γ tat satisfy condition 8; te power-law network as 125 combinations of α, β, γ tat satisfy condition 8, because te spectral radius is larger. For C, C v =Gaussian, Clayton, te ER network as 307 combinations of α, β, γ tat satisfy condition 8; te power-law network as 126 combinations of α, β, γ tat satisfy condition 8. We compute equilibrium infection probability i v numerically by solving Eqs. 5 for v V via te BB package in te R system. We compute te upper and s, namely i and i + v, according to Proposition 1. Since it is infeasible to numerically compute i v for large networks, we propose to approximate i v for node v V via î v = 1 2 ĩ v + iv +, were ĩ v = f C,Cvi, i + v, degv = k 0 + k 1 i + k 2 i + v + k 3 degv can be statistically derived from te data. Note tat te euristic function î v could be refined via more extensive numerical studies. We define te approximation error for network G as err G = v V î v i v, because v V i v is an important factor for cyber defense decision-making. For practical use, it is desired tat err G 0, meaning tat te defender never underestimates te treats, and at te same time err G 0, meaning tat te defender does not overestimate te treats i.e., does not overprovision defense resources too muc. ER networks. For te ER network, we obtain te following formulas : For C, C v =Gaussian, Frank, we ave î v = i i + v degv. For C, C v =Gaussian, Clayton, we ave î v = i i + v degv. For C, C v =Gaussian, Frank, te average of te err G s over te 307 combinations of C, C v, α, β, γ is 46, meaning tat te approximation metod only overestimates 46 infected nodes in an ER network of 1000 nodes. In comparison, te average of te v V i + v i v s over te 307 combinations of C, C v, α, β, γ is 93, meaning tat te overestimates 93 infected nodes i.e., te approximation metod is indeed better; te average of te v V i i v s is -52.7, meaning tat te underestimates 52.7 infected nodes in an ER network of 1000 nodes. Finally, we note tat among te 307 combinations of C, C v, α, β, γ, te maximum err G is 165.2, wic is elaborated in Figure 3a and will be discussed furter, and te minimum err G is 4.1, wic is elaborated in Figure 3b and will be discussed furter as well. For C, C v =Gaussian, Clayton, te average of te err G s over te 307 combinations of C, C v, α, β, γ is 46.5, meaning tat te approximation metod only overestimates 46.5 infected nodes in an ER network of 1000 nodes. In comparison, te average of te v V i + v i v s over te 307 combinations of C, C v, α, β, γ is 93, meaning tat te overestimates 93 infected nodes in an ER network of 1000 nodes; te average of te 307 v V i i v s is -52.5, meaning tat te underestimates 52.5 infected nodes in an ER network of 1000 nodes. Among te 307 instances, te maximum err G is 165.0, wic is elaborated in Figure 3d and will be discussed furter, and te minimum err G is 4.2, wic is elaborated in Figure 3e and will be discussed furter. In summary, cyber defense decision-making can be based on te approximation metod, wic takes advantage of te upper and s and would be better smaller tan te. As a side-product, we would like to igligt te penomenon tat te equilibrium infection probability i v increases wit node degree degv. Tis penomenon was observed in [19] in te absence of dependence, and persists, i v, î v and i wit respect to distinct node degrees, by taking te average over te nodes of te same degree wen needed. For C, C v =Gaussian,Frank, Figures 3a-3b plot te infection probabilities corresponding to te α, β, γ tat leads to te maximum and minimum err G, respectively; Figure 3c plots te infection probabilities averaged over te 307 combinations of α, β, γ tat satisfy condition 8. For C, C v =Gaussian,Clayton, Figures 3d-3e plot te infection probabilities corresponding to in te presence of dependence as we elaborate below. We consider i + v 14

15 ER approximation ER approximation ER approximation a Gaussian,Frank, 0.01,0.4,0.03 b Gaussian,Frank, 0.3,0.9,0.01 c Gaussian,Frank ER approximation ER approximation ER approximation d Gaussian,Clayton, 0.01,0.4,0.03 e Gaussian,Clayton, 0.3,0.9,0.01 f Gaussian,Clayton Figure 3: ER networks: vs. approximation vs. vs. wit respect to C, C v, α, β, γ or C, C v. te α, β, γ tat leads to te maximum and minimum err G, respectively; Figure 4f plots te infection probabilities averaged over te 307 combinations of α, β, γ tat satisfy condition 8. We observe tat te approximation î v can sligtly underestimate te infection probability i v for node v of degree degv 5, but te overall estimation v V î v is still above te actual treats v V i v as mentioned above. More importantly, we observe tat i v solid curves increases wit degv. Tis ints tat tere migt be some universal scaling laws, in te presence or absence of dependence. It is an interesting future work to identify te possible scaling law. Power-law networks. For power-law networks, we obtain te following formulas in a similar fasion: For C, C v =Gaussian, Frank, we ave î v = i i + v For C, C v =Gaussian, Clayton, we ave î v = i i + v degv degv. For C, C v =Gaussian, Frank, te average of te err G s over te 125 combinations of C, C v, α, β, γ is 25, meaning tat te approximation only overestimates 25 infected nodes in a power-law network of 1000 nodes. In comparison, te average of te v V i + v i v s over te 125 combinations of C, C v, α, β, γ is 50.8, meaning tat te overestimates 50.8 infected nodes i.e., te approximation metod is better; te average of te v V i i v s is -26, meaning tat te underestimates 26 infected nodes. Among te 125 combinations of C, C v, α, β, γ, te maximum err G is 84.5, wic is elaborated in Figure 4a and will be discussed furter, and te minimum err G is 7.1, wic is elaborated in Figure 4b. For C, C v =Gaussian, Clayton, te average of te err G s over te 126 combinations of C, C v, α, β, γ is 25.4, meaning tat te approximation only overestimates 25.4 infected nodes in a power-law network of 1000 nodes. In comparison, te average of te v V i + v i v s over te 126 combinations of C, C v, α, β, γ is 50.8, meaning tat te overestimates 50.8 infected nodes; te average of te 126 v V i i v s is -26, meaning tat te underestimates 26 infected nodes. Among te 126 instances, te maximum err G is 84.5, wic is elaborated in Figure 4d, and te minimum err G is 7.2, wic 15

16 is elaborated in Figure 4e. In summary, cyber defense decision-making can use te approximation metod, wic takes advantage of te upper and s Power law approximation Power law approximation Power law approximation a Gaussian,Frank, 0.01,0.5,0.02 b Gaussian,Frank, 0.2,0.1,0.01 c Gaussian,Frank Power law approximation Power law approximation Power law approximation d Gaussian,Clayton, 0.01,0.5,0.02 e Gaussian,Clayton, 0.2,0.1,0.01 f Gaussian,Clayton Figure 4: Power-law networks: vs. approximation vs. vs. wit respect to C, C v, α, β, γ or C, C v. In Figures 4b and 4e, te approximation result matces te almost perfectly. We also would like to igligt te penomenon tat te equilibrium infection probability i v increases wit node degree degv in power-law networks. Similarly, for C, C v =Gaussian,Frank, Figures 4a-4b plot respectively te infection probabilities corresponding to te α, β, γ tat leads to te maximum and minimum err G, and Figure 4c plots te infection probabilities averaged over te 125 combinations of C, C v, α, β, γ tat satisfy condition 8. For C, C v =Gaussian,Clayton, Figures 4a-4b plot respectively te infection probabilities corresponding to te α, β, γ tat leads to te maximum err G, and Figure 4c plots te infection probabilities averaged over te 126 combinations of C, C v, α, β, γ tat satisfy condition 8. We observe tat te approximation î v never underestimates te infection probability i v for any node v. We also observe tat i v solid curves increases wit degv, but exibits a iger nonlinearity wen compared wit te ER networks. 3.5 Bounds for Non-Equilibrium Infection Probabilities It is important to caracterize te beavior of i v t even if it never enters any equilibrium. For tis purpose, we want to seek some bounds for i v t, no matter weter te system converges to an equilibrium or not. Suc caracterization is useful because, for example, te can be used for te worst-case scenario decision-making. It is wort mentioning tat non-equilibrium states/beaviors are always ard to caracterize. Proposition 5 bounds for non-equilibrium probabilities Let lim t i v t and lim t i v t denote te upper and lower limits of i v t, v V. Ten, i v lim t i v t lim t i v t i + v, 16

17 were i v = 1 Cδ Cv 1 γν β + 1 Cδ Cv 1 γν, Cδ C v 1 γν β, [β Cδ Cv 1 γν] 1 µ v + 1 β, oterwise, and 1 C C v 1 γµv,1,..., 1 γµ v,degv i + v = β + 1 C, C C v 1 γµv,1,..., 1 γµ C v 1 γµv,1,..., 1 γµ v,degv v,degv > β [ ] β C Cv 1 γµv,1,..., 1 γµ v,degv 1 i v + 1 β, oterwise wit δ Cv 1 γν = C v 1 γν,..., 1 γν, µ v = max {1 β, min{γdegv + α, 1}} and ν = min{1 β, α}. Proof By observing te monotonicity in Eq. 4, we note tat i v t ν for all v V. Replacing i v,j t wit ν in Eq. 4 yields i v t βi v t + [1 C δ Cv 1 γν] 1 i v t = [C δ Cv 1 γν β] i v t + 1 C δ Cv 1 γν. If C δ Cv 1 γν > β, by taking te lower limit on bot sides we obtain If C δ Cv 1 γν β, we ave lim t i v t C δ C v 1 γν β + 1 C δ Cv 1 γν. i v t + 1 [C δ Cv 1 γν β] µ v + 1 C δ Cv 1 γν = [β Cδ Cv 1 γν] 1 µ v + 1 β. Hence, lim t i v t i v. For te, by applying Lemma 1 to Eq. 4 we ave i v t βi v t + [1 max {max {2 γdegv α} 1, 0}] 1 i v t = 1 βi v t + min {γdegv + α, 1} 1 i v t max {1 β, min{γdegv + α, 1}} = µ v. 15 By replacing i v,j wit µ v,j s in Eq. 4 yields i v t βi v t + [ 1 C C v 1 γµv,1,..., 1 γµ v,degv ] 1 iv t = [ C C v 1 γµv,1,..., 1 γµ v,degv β ] iv t If C C v 1 γµv,1,..., 1 γµ v,degv > β, ten +1 C C v 1 γµv,1,..., 1 γµ v,degv. lim t 1 C C v 1 γµv,1,..., 1 γµ v,degv β + 1 C C v 1 γµv,1,..., 1 γµ v,degv. If C C v 1 γµv,1,..., 1 γµ v,degv β, ten we ave {[ ] lim t i v t + 1 lim t C Cv 1 γµv,1,..., 1 γµ v,degv β iv t +1 C } C v 1 γµv,1,..., 1 γµ v,degv [ C ] C v 1 γµv,1,..., 1 γµ v,degv β limt i v t +1 C C v 1 γµv,1,..., 1 γµ v,degv [ C ] C v 1 γµv,1,..., 1 γµ v,degv β i v +1 C C v 1 γµv,1,..., 1 γµ v,degv. 17

18 Hence, we ave lim t i v t + 1 i + v. Wen are te bounds tigt? It is important to know wen te bounds are tigt because te defender can use te i + v for decision-making, especially wen te spreading never enters any equilibrium. Note tat wen γ << 1, it olds tat Cδ Cv 1 γν C1 = 1 α, and C C v 1 γµv,1,..., 1 γµ v,degv C Cv 1,..., 1 = 1 α. Terefore, in te case γ << 1 and α + β < 1, we ave i v i + v 1 Cδ Cv 1 γν β + 1 Cδ Cv 1 γν α β + α, 1 C C v 1 γµv,1,..., 1 γµ v,degv β + 1 C C v 1 γµv,1,..., 1 γµ v,degv Tis means tat te bounds are tigt wen te attack-power is not strong. In te case γ degv << 1 and α + β 1, we can similarly ave i v α2 α β, i + v β + α 1 [1 α2 α β] + 1 β. Terefore, te difference between te and is i + v i v αα + β 1 2. Terefore, te bounds are tigt wen α + β is not far from 1 or α is close to zero. α β + α. Are te equilibrium bounds always tigter tan te non-equilibrium bounds? We observe te following: under te condition γ degv << 1, we ave i i + v α/α+β; under te condition γ degv << 1 and te condition α + β < 1, we ave i v i + v α/α + β. Tis means tat te equilibrium bounds are widely applicable tan te same non-equilibrium bounds, namely tat te equilibrium bounds are strictly tigter tan te non-equilibrium bounds. 4 Side-Effects of Assuming Away te Dependences In te above we ave caracterized epidemic equilibrium tresolds, equilibrium infection probabilities, and nonequilibrium infection probabilities wile accommodating arbitrary dependences. In order to caracterize te sideeffects of assuming away te dependences, we consider te degree of dependences as captured by te concordance order between copulas reviewed in Section 2. In order to draw cyber security insigts at a iger level of abstraction, we also consider tree kinds of qualitative dependences: positive dependence, independence and negative dependence, wose degrees of dependence are in decreasing order. Specifically, positive negative dependence between te pusbased attacks means degv 1 C v 1 γiv,1,..., 1 γi v,degv 1 j=1 1 γi v,j, and positive negative dependence between te pus-based attacks and te pull-based attacks means 1 C C v 1 γiv,1 t,..., 1 γi v,degv t 1 1 αc v 1 γiv,1 t,..., 1 γi v,degv t, were equality means independence. To simplify te notations, let pd stand for positive dependence, ind stand for independence, and nd stand for negative dependence. Let x {pd, ind, nd} denote te dependence structure between te pus-based attacks and te pull-based attacks, as captured by copula C. Let y {pd, ind, nd} denote te dependence structure between te pus-based attacks, as captured by copula C v. Terefore, te dependence structures can be represented by a pair x, y. 18

19 4.1 Side-Effects on Equilibrium Infection Probabilities and Tresolds For fixed G = V, E, α, β, γ, we compare te effects of two groups of dependences i.e., copulas {C, C v, v V} and {C, C v, v V}. Corresponding to te two groups of copulas, we denote by i v t and i vt te respective infection probabilities of node v V at time t 0. Let i v,x,y denote te equilibrium infection probability of node v, namely i v, under dependence structure x, y. Side-effects on te equilibrium infection probabilities. We present a result about te impact of te dependence structures on te equilibrium infection probabilities. Tis result will allow us to derive te side-effects of assuming away te dependences. Proposition 6 comparison between te effects of different dependence structures on equilibrium infection probabilities Suppose te condition underlying Lemma 3 olds, namely ρa < so tat system 4 as a unique β + α2 γβ equilibrium. If for all v V, we ave C C v u1,..., u degv, u0 C C v u1,..., u degv, u0, 16 were 0 u j 1 for j = 0,..., degv, ten we ave i i. Proof Note tat i and i are respectively te unique positive solutions of fi = 0 and gi = 0, were f = f 1,..., f N and g = g 1,..., g N wit f v i = [ 1 C ] C v 1 γiv,1,..., 1 γi v,degv 1 iv βi v, v V g v i = [ 1 C C v ] 1 γiv,1,..., 1 γi v,degv 1 iv βi v, v V. Since f0 = g0 = α > 0 and f g, we ave gi fi = 0. Since bot f and g are continuous, we ave i i. Te cyber security insigts/implications of Proposition 6 is: Te stronger te negative positive dependences between te attack events, te lower iger te equilibrium infection probabilities. More specifically, we ave i v,pd,y i v,ind,y i v,nd,y for any y {pd, ind, nd} and i v,x,pd i v,x,ind i v,x,nd for any x {pd, ind, nd}. Terefore, te side-effects of assuming away te dependences between attack events are: If te positive negative dependence is assumed away, te resulting equilibrium infection probability underestimates overestimates te actual equilibrium infection probability. Tis means te following: wen te positive dependence between attack events is assumed away, te cyber defense decisions based on i v,ind,ind < i v,pd,pd can render te deployed defense useless; wen te negative dependence is assumed away between attack events, te cyber defense decisions based on i v,ind,ind > i v,nd,nd can waste defense resources. We will use numerical examples below to confirm tese insigts. Anoter important insigt is: if te defender can seek to impose negative dependence on te cyber attacks, te cyber defense effect is better of. We believe tat tis insigt will sed ligt on researc of future cyber defense mecanisms, and igligts te value of teoretical studies in terms of teir practical guidance. Side-effects on te epidemic equilibrium tresold. Corollary 1 gives a sufficient condition under wic te epidemic spreading enters te equilibrium. Here we define { τ def 1 maxv V 1 β/1 i = min v, γ } β + α2, 17 γβ wit respect to a group of copulas {C, C v, v V}. According to Eq. 8, ρa τ means tat te epidemic spreading converges to te equilibrium. Similarly, we can define τ wit respect to anoter group of copulas {C, C v, v V}. We want to compare τ and τ wit respect to te relation between {C, C v, v V} and {C, C v, v V}. 19

20 β + α2 Proposition 7 Under te conditions of Proposition 6, namely ρa < so tat system 4 as a unique γβ equilibrium and C C v u1,..., u degv, u0 C C v u1,..., u degv, u0 for all v V, we ave i if 1 β i, ten τ τ ; ii if 1 β i +, ten τ τ, were i + def = max v V i + v, i and i + v are defined in Proposition 1. Proof According to Proposition 1, we know tat i i v i + β, wic implies β 1 i 1 i β. According v 1 i + to Eq. 17, τ is decreasing in max v V 1 β 1 i. Terefore, τ is decreasing in i v wen 1 β i, and increasing v in i v wen 1 β i +. By Proposition 6, we get te desired results. In order to draw insigts wile simplifying te discussion, let τ x,y denote te τ as defined in Eq. 17 wit respect to dependence structures x, y. Te cyber security implication of Proposition 7 is: First, under some circumstances, te stronger te dependences between te cyber attacks, te more restrictive te epidemic equilibrium tresold. More specifically, under te condition 1 β i, we ave for all v V: τ nd,y τ ind,y τ pd,y and τ x,nd τ x,ind τ x,pd. Tis means tat under te above circumstances, assuming away te positive dependences between te attacks will lead to incorrect epidemic equilibrium tresold, and assuming away te negative dependences between te make te epidemic equilibrium tresold unnecessarily restrictive. Tis furter igligts te value for te defender to render te dependences negative, provided tat 1 β i. Second, under certain oter circumstances, te stronger te dependences, te less restrictive te epidemic equilibrium tresold. More specifically, under te condition 1 β i +, we ave τ nd,y τ ind,y τ pd,y and τ x,nd τ x,ind τ x,pd. Tis means tat assuming away te negative dependences between te attacks will lead to incorrect epidemic equilibrium tresold, and assuming away te positive dependences will make te epidemic equilibrium tresold unnecessarily restrictive. Moreover, wile rendering te dependences negative can lead to smaller equilibrium infection probabilities, it imposes a very restrictive epidemic equilibrium tresold wen 1 β i +. Tis means tat wen applying te above insigts to guide practice, te defender must be aware of te parameter regions corresponding to te cyber security posture. Numerical examples. In order to illustrate te above analytic results, we consider te example of star network wit N = 11 nodes. We assume tat te dependence between te pus-based and te pull-based attacks can be captured by te Gaussian copula C wit parameter σ and te dependence between te pus-based attacks launced from te leaves against te ub can be captured by copula C v, wic is te Clayton copula wit parameter θ. Tese two copulas are reviewed in Section 2. We consider two sets of parameters α, β, γ = 0.2, 0.5, 0.05 and α, β, γ = 0.4, 0.7, From Eqs. 11 and 12, we can compute te equilibrium infection probabilities i for te ub and i l for te leaves, and te tresold τ as defined in 17. Note tat te copulas are increasing in teir parameters in te concordance order. By Proposition 6, bot i and i l are decreasing in θ σ given σ θ, as confirmed by Tables 1-2. Note tat for star networks, te condition 1 β i + in Proposition 7 can be relaxed as 1 β i +, were i + is defined in Proposition 3. Wen α, β, γ = 0.2, 0.5, 0.05, it is easy to verify 1 β i +, meaning tat τ is decreasing in θ σ for fixed σ θ. Tis is confirmed in Table 1. Wen α, β, γ = 0.4, 0.7, 0.05, te condition 1 β i in Proposition 7 is satisfied, meaning tat τ is increasing in θ σ for fixed σ θ. Tis is confirmed in Table 2. Tese examples also confirm te conclusion i i l given by Proposition 2. 20

The EOQ Inventory Formula

The EOQ Inventory Formula Te EOQ Inventory Formula James M. Cargal Matematics Department Troy University Montgomery Campus A basic problem for businesses and manufacturers is, wen ordering supplies, to determine wat quantity of

More information

Distances in random graphs with infinite mean degrees

Distances in random graphs with infinite mean degrees Distances in random graps wit infinite mean degrees Henri van den Esker, Remco van der Hofstad, Gerard Hoogiemstra and Dmitri Znamenski April 26, 2005 Abstract We study random graps wit an i.i.d. degree

More information

Verifying Numerical Convergence Rates

Verifying Numerical Convergence Rates 1 Order of accuracy Verifying Numerical Convergence Rates We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, suc as te grid size or time step, and

More information

2 Limits and Derivatives

2 Limits and Derivatives 2 Limits and Derivatives 2.7 Tangent Lines, Velocity, and Derivatives A tangent line to a circle is a line tat intersects te circle at exactly one point. We would like to take tis idea of tangent line

More information

FINITE DIFFERENCE METHODS

FINITE DIFFERENCE METHODS FINITE DIFFERENCE METHODS LONG CHEN Te best known metods, finite difference, consists of replacing eac derivative by a difference quotient in te classic formulation. It is simple to code and economic to

More information

Can a Lump-Sum Transfer Make Everyone Enjoy the Gains. from Free Trade?

Can a Lump-Sum Transfer Make Everyone Enjoy the Gains. from Free Trade? Can a Lump-Sum Transfer Make Everyone Enjoy te Gains from Free Trade? Yasukazu Icino Department of Economics, Konan University June 30, 2010 Abstract I examine lump-sum transfer rules to redistribute te

More information

Tangent Lines and Rates of Change

Tangent Lines and Rates of Change Tangent Lines and Rates of Cange 9-2-2005 Given a function y = f(x), ow do you find te slope of te tangent line to te grap at te point P(a, f(a))? (I m tinking of te tangent line as a line tat just skims

More information

CHAPTER 7. Di erentiation

CHAPTER 7. Di erentiation CHAPTER 7 Di erentiation 1. Te Derivative at a Point Definition 7.1. Let f be a function defined on a neigborood of x 0. f is di erentiable at x 0, if te following it exists: f 0 fx 0 + ) fx 0 ) x 0 )=.

More information

Unemployment insurance/severance payments and informality in developing countries

Unemployment insurance/severance payments and informality in developing countries Unemployment insurance/severance payments and informality in developing countries David Bardey y and Fernando Jaramillo z First version: September 2011. Tis version: November 2011. Abstract We analyze

More information

An inquiry into the multiplier process in IS-LM model

An inquiry into the multiplier process in IS-LM model An inquiry into te multiplier process in IS-LM model Autor: Li ziran Address: Li ziran, Room 409, Building 38#, Peing University, Beijing 00.87,PRC. Pone: (86) 00-62763074 Internet Address: jefferson@water.pu.edu.cn

More information

Pre-trial Settlement with Imperfect Private Monitoring

Pre-trial Settlement with Imperfect Private Monitoring Pre-trial Settlement wit Imperfect Private Monitoring Mostafa Beskar University of New Hampsire Jee-Hyeong Park y Seoul National University July 2011 Incomplete, Do Not Circulate Abstract We model pretrial

More information

Derivatives Math 120 Calculus I D Joyce, Fall 2013

Derivatives Math 120 Calculus I D Joyce, Fall 2013 Derivatives Mat 20 Calculus I D Joyce, Fall 203 Since we ave a good understanding of its, we can develop derivatives very quickly. Recall tat we defined te derivative f x of a function f at x to be te

More information

SAMPLE DESIGN FOR THE TERRORISM RISK INSURANCE PROGRAM SURVEY

SAMPLE DESIGN FOR THE TERRORISM RISK INSURANCE PROGRAM SURVEY ASA Section on Survey Researc Metods SAMPLE DESIG FOR TE TERRORISM RISK ISURACE PROGRAM SURVEY G. ussain Coudry, Westat; Mats yfjäll, Statisticon; and Marianne Winglee, Westat G. ussain Coudry, Westat,

More information

ON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE

ON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE ON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE Byeong U. Park 1 and Young Kyung Lee 2 Department of Statistics, Seoul National University, Seoul, Korea Tae Yoon Kim 3 and Ceolyong Park

More information

Instantaneous Rate of Change:

Instantaneous Rate of Change: Instantaneous Rate of Cange: Last section we discovered tat te average rate of cange in F(x) can also be interpreted as te slope of a scant line. Te average rate of cange involves te cange in F(x) over

More information

Comparison between two approaches to overload control in a Real Server: local or hybrid solutions?

Comparison between two approaches to overload control in a Real Server: local or hybrid solutions? Comparison between two approaces to overload control in a Real Server: local or ybrid solutions? S. Montagna and M. Pignolo Researc and Development Italtel S.p.A. Settimo Milanese, ITALY Abstract Tis wor

More information

The modelling of business rules for dashboard reporting using mutual information

The modelling of business rules for dashboard reporting using mutual information 8 t World IMACS / MODSIM Congress, Cairns, Australia 3-7 July 2009 ttp://mssanz.org.au/modsim09 Te modelling of business rules for dasboard reporting using mutual information Gregory Calbert Command, Control,

More information

Computer Science and Engineering, UCSD October 7, 1999 Goldreic-Levin Teorem Autor: Bellare Te Goldreic-Levin Teorem 1 Te problem We æx a an integer n for te lengt of te strings involved. If a is an n-bit

More information

Strategic trading and welfare in a dynamic market. Dimitri Vayanos

Strategic trading and welfare in a dynamic market. Dimitri Vayanos LSE Researc Online Article (refereed) Strategic trading and welfare in a dynamic market Dimitri Vayanos LSE as developed LSE Researc Online so tat users may access researc output of te Scool. Copyrigt

More information

Strategic trading in a dynamic noisy market. Dimitri Vayanos

Strategic trading in a dynamic noisy market. Dimitri Vayanos LSE Researc Online Article (refereed) Strategic trading in a dynamic noisy market Dimitri Vayanos LSE as developed LSE Researc Online so tat users may access researc output of te Scool. Copyrigt and Moral

More information

In other words the graph of the polynomial should pass through the points

In other words the graph of the polynomial should pass through the points Capter 3 Interpolation Interpolation is te problem of fitting a smoot curve troug a given set of points, generally as te grap of a function. It is useful at least in data analysis (interpolation is a form

More information

How To Ensure That An Eac Edge Program Is Successful

How To Ensure That An Eac Edge Program Is Successful Introduction Te Economic Diversification and Growt Enterprises Act became effective on 1 January 1995. Te creation of tis Act was to encourage new businesses to start or expand in Newfoundland and Labrador.

More information

Lecture 10: What is a Function, definition, piecewise defined functions, difference quotient, domain of a function

Lecture 10: What is a Function, definition, piecewise defined functions, difference quotient, domain of a function Lecture 10: Wat is a Function, definition, piecewise defined functions, difference quotient, domain of a function A function arises wen one quantity depends on anoter. Many everyday relationsips between

More information

Schedulability Analysis under Graph Routing in WirelessHART Networks

Schedulability Analysis under Graph Routing in WirelessHART Networks Scedulability Analysis under Grap Routing in WirelessHART Networks Abusayeed Saifulla, Dolvara Gunatilaka, Paras Tiwari, Mo Sa, Cenyang Lu, Bo Li Cengjie Wu, and Yixin Cen Department of Computer Science,

More information

Improved dynamic programs for some batcing problems involving te maximum lateness criterion A P M Wagelmans Econometric Institute Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam Te Neterlands

More information

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of

More information

Optimized Data Indexing Algorithms for OLAP Systems

Optimized Data Indexing Algorithms for OLAP Systems Database Systems Journal vol. I, no. 2/200 7 Optimized Data Indexing Algoritms for OLAP Systems Lucian BORNAZ Faculty of Cybernetics, Statistics and Economic Informatics Academy of Economic Studies, Bucarest

More information

Bonferroni-Based Size-Correction for Nonstandard Testing Problems

Bonferroni-Based Size-Correction for Nonstandard Testing Problems Bonferroni-Based Size-Correction for Nonstandard Testing Problems Adam McCloskey Brown University October 2011; Tis Version: October 2012 Abstract We develop powerful new size-correction procedures for

More information

f(a + h) f(a) f (a) = lim

f(a + h) f(a) f (a) = lim Lecture 7 : Derivative AS a Function In te previous section we defined te derivative of a function f at a number a (wen te function f is defined in an open interval containing a) to be f (a) 0 f(a + )

More information

Math 113 HW #5 Solutions

Math 113 HW #5 Solutions Mat 3 HW #5 Solutions. Exercise.5.6. Suppose f is continuous on [, 5] and te only solutions of te equation f(x) = 6 are x = and x =. If f() = 8, explain wy f(3) > 6. Answer: Suppose we ad tat f(3) 6. Ten

More information

Referendum-led Immigration Policy in the Welfare State

Referendum-led Immigration Policy in the Welfare State Referendum-led Immigration Policy in te Welfare State YUJI TAMURA Department of Economics, University of Warwick, UK First version: 12 December 2003 Updated: 16 Marc 2004 Abstract Preferences of eterogeneous

More information

OPTIMAL DISCONTINUOUS GALERKIN METHODS FOR THE ACOUSTIC WAVE EQUATION IN HIGHER DIMENSIONS

OPTIMAL DISCONTINUOUS GALERKIN METHODS FOR THE ACOUSTIC WAVE EQUATION IN HIGHER DIMENSIONS OPTIMAL DISCONTINUOUS GALERKIN METHODS FOR THE ACOUSTIC WAVE EQUATION IN HIGHER DIMENSIONS ERIC T. CHUNG AND BJÖRN ENGQUIST Abstract. In tis paper, we developed and analyzed a new class of discontinuous

More information

MATHEMATICS FOR ENGINEERING DIFFERENTIATION TUTORIAL 1 - BASIC DIFFERENTIATION

MATHEMATICS FOR ENGINEERING DIFFERENTIATION TUTORIAL 1 - BASIC DIFFERENTIATION MATHEMATICS FOR ENGINEERING DIFFERENTIATION TUTORIAL 1 - BASIC DIFFERENTIATION Tis tutorial is essential pre-requisite material for anyone stuing mecanical engineering. Tis tutorial uses te principle of

More information

College Planning Using Cash Value Life Insurance

College Planning Using Cash Value Life Insurance College Planning Using Cas Value Life Insurance CAUTION: Te advisor is urged to be extremely cautious of anoter college funding veicle wic provides a guaranteed return of premium immediately if funded

More information

Note nine: Linear programming CSE 101. 1 Linear constraints and objective functions. 1.1 Introductory example. Copyright c Sanjoy Dasgupta 1

Note nine: Linear programming CSE 101. 1 Linear constraints and objective functions. 1.1 Introductory example. Copyright c Sanjoy Dasgupta 1 Copyrigt c Sanjoy Dasgupta Figure. (a) Te feasible region for a linear program wit two variables (see tet for details). (b) Contour lines of te objective function: for different values of (profit). Te

More information

Pretrial Settlement with Imperfect Private Monitoring

Pretrial Settlement with Imperfect Private Monitoring Pretrial Settlement wit Imperfect Private Monitoring Mostafa Beskar Indiana University Jee-Hyeong Park y Seoul National University April, 2016 Extremely Preliminary; Please Do Not Circulate. Abstract We

More information

Geometric Stratification of Accounting Data

Geometric Stratification of Accounting Data Stratification of Accounting Data Patricia Gunning * Jane Mary Horgan ** William Yancey *** Abstract: We suggest a new procedure for defining te boundaries of te strata in igly skewed populations, usual

More information

CHAPTER 8: DIFFERENTIAL CALCULUS

CHAPTER 8: DIFFERENTIAL CALCULUS CHAPTER 8: DIFFERENTIAL CALCULUS 1. Rules of Differentiation As we ave seen, calculating erivatives from first principles can be laborious an ifficult even for some relatively simple functions. It is clearly

More information

Theoretical calculation of the heat capacity

Theoretical calculation of the heat capacity eoretical calculation of te eat capacity Principle of equipartition of energy Heat capacity of ideal and real gases Heat capacity of solids: Dulong-Petit, Einstein, Debye models Heat capacity of metals

More information

Welfare, financial innovation and self insurance in dynamic incomplete markets models

Welfare, financial innovation and self insurance in dynamic incomplete markets models Welfare, financial innovation and self insurance in dynamic incomplete markets models Paul Willen Department of Economics Princeton University First version: April 998 Tis version: July 999 Abstract We

More information

TRADING AWAY WIDE BRANDS FOR CHEAP BRANDS. Swati Dhingra London School of Economics and CEP. Online Appendix

TRADING AWAY WIDE BRANDS FOR CHEAP BRANDS. Swati Dhingra London School of Economics and CEP. Online Appendix TRADING AWAY WIDE BRANDS FOR CHEAP BRANDS Swati Dingra London Scool of Economics and CEP Online Appendix APPENDIX A. THEORETICAL & EMPIRICAL RESULTS A.1. CES and Logit Preferences: Invariance of Innovation

More information

Solutions by: KARATUĞ OZAN BiRCAN. PROBLEM 1 (20 points): Let D be a region, i.e., an open connected set in

Solutions by: KARATUĞ OZAN BiRCAN. PROBLEM 1 (20 points): Let D be a region, i.e., an open connected set in KOÇ UNIVERSITY, SPRING 2014 MATH 401, MIDTERM-1, MARCH 3 Instructor: BURAK OZBAGCI TIME: 75 Minutes Solutions by: KARATUĞ OZAN BiRCAN PROBLEM 1 (20 points): Let D be a region, i.e., an open connected set

More information

2.23 Gambling Rehabilitation Services. Introduction

2.23 Gambling Rehabilitation Services. Introduction 2.23 Gambling Reabilitation Services Introduction Figure 1 Since 1995 provincial revenues from gambling activities ave increased over 56% from $69.2 million in 1995 to $108 million in 2004. Te majority

More information

Multivariate time series analysis: Some essential notions

Multivariate time series analysis: Some essential notions Capter 2 Multivariate time series analysis: Some essential notions An overview of a modeling and learning framework for multivariate time series was presented in Capter 1. In tis capter, some notions on

More information

Staffing and routing in a two-tier call centre. Sameer Hasija*, Edieal J. Pinker and Robert A. Shumsky

Staffing and routing in a two-tier call centre. Sameer Hasija*, Edieal J. Pinker and Robert A. Shumsky 8 Int. J. Operational Researc, Vol. 1, Nos. 1/, 005 Staffing and routing in a two-tier call centre Sameer Hasija*, Edieal J. Pinker and Robert A. Sumsky Simon Scool, University of Rocester, Rocester 1467,

More information

ACT Math Facts & Formulas

ACT Math Facts & Formulas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationals: fractions, tat is, anyting expressable as a ratio of integers Reals: integers plus rationals plus special numbers suc as

More information

Equilibria in sequential bargaining games as solutions to systems of equations

Equilibria in sequential bargaining games as solutions to systems of equations Economics Letters 84 (2004) 407 411 www.elsevier.com/locate/econbase Equilibria in sequential bargaining games as solutions to systems of equations Tasos Kalandrakis* Department of Political Science, Yale

More information

- 1 - Handout #22 May 23, 2012 Huffman Encoding and Data Compression. CS106B Spring 2012. Handout by Julie Zelenski with minor edits by Keith Schwarz

- 1 - Handout #22 May 23, 2012 Huffman Encoding and Data Compression. CS106B Spring 2012. Handout by Julie Zelenski with minor edits by Keith Schwarz CS106B Spring 01 Handout # May 3, 01 Huffman Encoding and Data Compression Handout by Julie Zelenski wit minor edits by Keit Scwarz In te early 1980s, personal computers ad ard disks tat were no larger

More information

Writing Mathematics Papers

Writing Mathematics Papers Writing Matematics Papers Tis essay is intended to elp your senior conference paper. It is a somewat astily produced amalgam of advice I ave given to students in my PDCs (Mat 4 and Mat 9), so it s not

More information

M(0) = 1 M(1) = 2 M(h) = M(h 1) + M(h 2) + 1 (h > 1)

M(0) = 1 M(1) = 2 M(h) = M(h 1) + M(h 2) + 1 (h > 1) Insertion and Deletion in VL Trees Submitted in Partial Fulfillment of te Requirements for Dr. Eric Kaltofen s 66621: nalysis of lgoritms by Robert McCloskey December 14, 1984 1 ackground ccording to Knut

More information

To motivate the notion of a variogram for a covariance stationary process, { Ys ( ): s R}

To motivate the notion of a variogram for a covariance stationary process, { Ys ( ): s R} 4. Variograms Te covariogram and its normalized form, te correlogram, are by far te most intuitive metods for summarizing te structure of spatial dependencies in a covariance stationary process. However,

More information

Projective Geometry. Projective Geometry

Projective Geometry. Projective Geometry Euclidean versus Euclidean geometry describes sapes as tey are Properties of objects tat are uncanged by rigid motions» Lengts» Angles» Parallelism Projective geometry describes objects as tey appear Lengts,

More information

Research on the Anti-perspective Correction Algorithm of QR Barcode

Research on the Anti-perspective Correction Algorithm of QR Barcode Researc on te Anti-perspective Correction Algoritm of QR Barcode Jianua Li, Yi-Wen Wang, YiJun Wang,Yi Cen, Guoceng Wang Key Laboratory of Electronic Tin Films and Integrated Devices University of Electronic

More information

Area-Specific Recreation Use Estimation Using the National Visitor Use Monitoring Program Data

Area-Specific Recreation Use Estimation Using the National Visitor Use Monitoring Program Data United States Department of Agriculture Forest Service Pacific Nortwest Researc Station Researc Note PNW-RN-557 July 2007 Area-Specific Recreation Use Estimation Using te National Visitor Use Monitoring

More information

SAT Math Must-Know Facts & Formulas

SAT Math Must-Know Facts & Formulas SAT Mat Must-Know Facts & Formuas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationas: fractions, tat is, anyting expressabe as a ratio of integers Reas: integers pus rationas

More information

For Sale By Owner Program. We can help with our for sale by owner kit that includes:

For Sale By Owner Program. We can help with our for sale by owner kit that includes: Dawn Coen Broker/Owner For Sale By Owner Program If you want to sell your ome By Owner wy not:: For Sale Dawn Coen Broker/Owner YOUR NAME YOUR PHONE # Look as professional as possible Be totally prepared

More information

Multigrid computational methods are

Multigrid computational methods are M ULTIGRID C OMPUTING Wy Multigrid Metods Are So Efficient Originally introduced as a way to numerically solve elliptic boundary-value problems, multigrid metods, and teir various multiscale descendants,

More information

Free Shipping and Repeat Buying on the Internet: Theory and Evidence

Free Shipping and Repeat Buying on the Internet: Theory and Evidence Free Sipping and Repeat Buying on te Internet: eory and Evidence Yingui Yang, Skander Essegaier and David R. Bell 1 June 13, 2005 1 Graduate Scool of Management, University of California at Davis (yiyang@ucdavis.edu)

More information

f(x) f(a) x a Our intuition tells us that the slope of the tangent line to the curve at the point P is m P Q =

f(x) f(a) x a Our intuition tells us that the slope of the tangent line to the curve at the point P is m P Q = Lecture 6 : Derivatives and Rates of Cange In tis section we return to te problem of finding te equation of a tangent line to a curve, y f(x) If P (a, f(a)) is a point on te curve y f(x) and Q(x, f(x))

More information

Training Robust Support Vector Regression via D. C. Program

Training Robust Support Vector Regression via D. C. Program Journal of Information & Computational Science 7: 12 (2010) 2385 2394 Available at ttp://www.joics.com Training Robust Support Vector Regression via D. C. Program Kuaini Wang, Ping Zong, Yaoong Zao College

More information

THE IMPACT OF INTERLINKED INDEX INSURANCE AND CREDIT CONTRACTS ON FINANCIAL MARKET DEEPENING AND SMALL FARM PRODUCTIVITY

THE IMPACT OF INTERLINKED INDEX INSURANCE AND CREDIT CONTRACTS ON FINANCIAL MARKET DEEPENING AND SMALL FARM PRODUCTIVITY THE IMPACT OF INTERLINKED INDEX INSURANCE AND CREDIT CONTRACTS ON FINANCIAL MARKET DEEPENING AND SMALL FARM PRODUCTIVITY Micael R. Carter Lan Ceng Alexander Sarris University of California, Davis University

More information

SAT Subject Math Level 1 Facts & Formulas

SAT Subject Math Level 1 Facts & Formulas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reals: integers plus fractions, decimals, and irrationals ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences: PEMDAS (Parenteses

More information

A system to monitor the quality of automated coding of textual answers to open questions

A system to monitor the quality of automated coding of textual answers to open questions Researc in Official Statistics Number 2/2001 A system to monitor te quality of automated coding of textual answers to open questions Stefania Maccia * and Marcello D Orazio ** Italian National Statistical

More information

Global Sourcing of Complex Production Processes

Global Sourcing of Complex Production Processes Global Sourcing of Complex Production Processes December 2013 Cristian Scwarz Jens Suedekum Abstract We develop a teory of a firm in an incomplete contracts environment wic decides on te complexity, te

More information

FINANCIAL SECTOR INEFFICIENCIES AND THE DEBT LAFFER CURVE

FINANCIAL SECTOR INEFFICIENCIES AND THE DEBT LAFFER CURVE INTERNATIONAL JOURNAL OF FINANCE AND ECONOMICS Int. J. Fin. Econ. 10: 1 13 (2005) Publised online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/ijfe.251 FINANCIAL SECTOR INEFFICIENCIES

More information

On a Satellite Coverage

On a Satellite Coverage I. INTRODUCTION On a Satellite Coverage Problem DANNY T. CHI Kodak Berkeley Researc Yu T. su National Ciao Tbng University Te eart coverage area for a satellite in an Eart syncronous orbit wit a nonzero

More information

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Saring Scemes Based on General Access Structure (Corrected Version) Ventzislav Nikov 1, Svetla Nikova 2, Bart

More information

Mathematics Course 111: Algebra I Part IV: Vector Spaces

Mathematics Course 111: Algebra I Part IV: Vector Spaces Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are

More information

f(x + h) f(x) h as representing the slope of a secant line. As h goes to 0, the slope of the secant line approaches the slope of the tangent line.

f(x + h) f(x) h as representing the slope of a secant line. As h goes to 0, the slope of the secant line approaches the slope of the tangent line. Derivative of f(z) Dr. E. Jacobs Te erivative of a function is efine as a limit: f (x) 0 f(x + ) f(x) We can visualize te expression f(x+) f(x) as representing te slope of a secant line. As goes to 0,

More information

2.1: The Derivative and the Tangent Line Problem

2.1: The Derivative and the Tangent Line Problem .1.1.1: Te Derivative and te Tangent Line Problem Wat is te deinition o a tangent line to a curve? To answer te diiculty in writing a clear deinition o a tangent line, we can deine it as te iting position

More information

1.6. Analyse Optimum Volume and Surface Area. Maximum Volume for a Given Surface Area. Example 1. Solution

1.6. Analyse Optimum Volume and Surface Area. Maximum Volume for a Given Surface Area. Example 1. Solution 1.6 Analyse Optimum Volume and Surface Area Estimation and oter informal metods of optimizing measures suc as surface area and volume often lead to reasonable solutions suc as te design of te tent in tis

More information

Compute the derivative by definition: The four step procedure

Compute the derivative by definition: The four step procedure Compute te derivative by definition: Te four step procedure Given a function f(x), te definition of f (x), te derivative of f(x), is lim 0 f(x + ) f(x), provided te limit exists Te derivative function

More information

Tis Problem and Retail Inventory Management

Tis Problem and Retail Inventory Management Optimizing Inventory Replenisment of Retail Fasion Products Marsall Fiser Kumar Rajaram Anant Raman Te Warton Scool, University of Pennsylvania, 3620 Locust Walk, 3207 SH-DH, Piladelpia, Pennsylvania 19104-6366

More information

The Dynamics of Movie Purchase and Rental Decisions: Customer Relationship Implications to Movie Studios

The Dynamics of Movie Purchase and Rental Decisions: Customer Relationship Implications to Movie Studios Te Dynamics of Movie Purcase and Rental Decisions: Customer Relationsip Implications to Movie Studios Eddie Ree Associate Professor Business Administration Stoneill College 320 Wasington St Easton, MA

More information

Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks

Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks Cannel Allocation in Non-Cooperative Multi-Radio Multi-Cannel Wireless Networks Dejun Yang, Xi Fang, Guoliang Xue Arizona State University Abstract Wile tremendous efforts ave been made on cannel allocation

More information

Government Debt and Optimal Monetary and Fiscal Policy

Government Debt and Optimal Monetary and Fiscal Policy Government Debt and Optimal Monetary and Fiscal Policy Klaus Adam Manneim University and CEPR - preliminary version - June 7, 21 Abstract How do di erent levels of government debt a ect te optimal conduct

More information

Simultaneous Location of Trauma Centers and Helicopters for Emergency Medical Service Planning

Simultaneous Location of Trauma Centers and Helicopters for Emergency Medical Service Planning Simultaneous Location of Trauma Centers and Helicopters for Emergency Medical Service Planning Soo-Haeng Co Hoon Jang Taesik Lee Jon Turner Tepper Scool of Business, Carnegie Mellon University, Pittsburg,

More information

Chapter 7 Numerical Differentiation and Integration

Chapter 7 Numerical Differentiation and Integration 45 We ave a abit in writing articles publised in scientiþc journals to make te work as Þnised as possible, to cover up all te tracks, to not worry about te blind alleys or describe ow you ad te wrong idea

More information

A strong credit score can help you score a lower rate on a mortgage

A strong credit score can help you score a lower rate on a mortgage NET GAIN Scoring points for your financial future AS SEEN IN USA TODAY S MONEY SECTION, JULY 3, 2007 A strong credit score can elp you score a lower rate on a mortgage By Sandra Block Sales of existing

More information

A Multigrid Tutorial part two

A Multigrid Tutorial part two A Multigrid Tutorial part two William L. Briggs Department of Matematics University of Colorado at Denver Van Emden Henson Center for Applied Scientific Computing Lawrence Livermore National Laboratory

More information

Working Capital 2013 UK plc s unproductive 69 billion

Working Capital 2013 UK plc s unproductive 69 billion 2013 Executive summary 2. Te level of excess working capital increased 3. UK sectors acieve a mixed performance 4. Size matters in te supply cain 6. Not all companies are overflowing wit cas 8. Excess

More information

What is Advanced Corporate Finance? What is finance? What is Corporate Finance? Deciding how to optimally manage a firm s assets and liabilities.

What is Advanced Corporate Finance? What is finance? What is Corporate Finance? Deciding how to optimally manage a firm s assets and liabilities. Wat is? Spring 2008 Note: Slides are on te web Wat is finance? Deciding ow to optimally manage a firm s assets and liabilities. Managing te costs and benefits associated wit te timing of cas in- and outflows

More information

Determine the perimeter of a triangle using algebra Find the area of a triangle using the formula

Determine the perimeter of a triangle using algebra Find the area of a triangle using the formula Student Name: Date: Contact Person Name: Pone Number: Lesson 0 Perimeter, Area, and Similarity of Triangles Objectives Determine te perimeter of a triangle using algebra Find te area of a triangle using

More information

Design and Analysis of a Fault-Tolerant Mechanism for a Server-Less Video-On-Demand System

Design and Analysis of a Fault-Tolerant Mechanism for a Server-Less Video-On-Demand System Design and Analysis of a Fault-olerant Mecanism for a Server-Less Video-On-Demand System Jack Y. B. Lee Department of Information Engineering e Cinese University of Hong Kong Satin, N.., Hong Kong Email:

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Analyzing the Effects of Insuring Health Risks:

Analyzing the Effects of Insuring Health Risks: Analyzing te Effects of Insuring Healt Risks: On te Trade-off between Sort Run Insurance Benefits vs. Long Run Incentive Costs Harold L. Cole University of Pennsylvania and NBER Soojin Kim University of

More information

Heterogeneous firms and trade costs: a reading of French access to European agrofood

Heterogeneous firms and trade costs: a reading of French access to European agrofood Heterogeneous firms and trade costs: a reading of Frenc access to European agrofood markets Cevassus-Lozza E., Latouce K. INRA, UR 34, F-44000 Nantes, France Abstract Tis article offers a new reading of

More information

Average and Instantaneous Rates of Change: The Derivative

Average and Instantaneous Rates of Change: The Derivative 9.3 verage and Instantaneous Rates of Cange: Te Derivative 609 OBJECTIVES 9.3 To define and find average rates of cange To define te derivative as a rate of cange To use te definition of derivative to

More information

Catalogue no. 12-001-XIE. Survey Methodology. December 2004

Catalogue no. 12-001-XIE. Survey Methodology. December 2004 Catalogue no. 1-001-XIE Survey Metodology December 004 How to obtain more information Specific inquiries about tis product and related statistics or services sould be directed to: Business Survey Metods

More information

Dynamic Competitive Insurance

Dynamic Competitive Insurance Dynamic Competitive Insurance Vitor Farina Luz June 26, 205 Abstract I analyze long-term contracting in insurance markets wit asymmetric information and a finite or infinite orizon. Risk neutral firms

More information

Asymmetric Trade Liberalizations and Current Account Dynamics

Asymmetric Trade Liberalizations and Current Account Dynamics Asymmetric Trade Liberalizations and Current Account Dynamics Alessandro Barattieri January 15, 2015 Abstract Te current account deficits of Spain, Portugal and Greece are te result of large deficits in

More information

100 Austrian Journal of Statistics, Vol. 32 (2003), No. 1&2, 99-129

100 Austrian Journal of Statistics, Vol. 32 (2003), No. 1&2, 99-129 AUSTRIAN JOURNAL OF STATISTICS Volume 3 003, Number 1&, 99 19 Adaptive Regression on te Real Line in Classes of Smoot Functions L.M. Artiles and B.Y. Levit Eurandom, Eindoven, te Neterlands Queen s University,

More information

Guide to Cover Letters & Thank You Letters

Guide to Cover Letters & Thank You Letters Guide to Cover Letters & Tank You Letters 206 Strebel Student Center (315) 792-3087 Fax (315) 792-3370 TIPS FOR WRITING A PERFECT COVER LETTER Te resume never travels alone. Eac time you submit your resume

More information

Human Capital, Asset Allocation, and Life Insurance

Human Capital, Asset Allocation, and Life Insurance Human Capital, Asset Allocation, and Life Insurance By: P. Cen, R. Ibbotson, M. Milevsky and K. Zu Version: February 25, 2005 Note: A Revised version of tis paper is fortcoming in te Financial Analysts

More information

Yale ICF Working Paper No. 05-11 May 2005

Yale ICF Working Paper No. 05-11 May 2005 Yale ICF Working Paper No. 05-11 May 2005 HUMAN CAPITAL, AET ALLOCATION, AND LIFE INURANCE Roger G. Ibbotson, Yale cool of Management, Yale University Peng Cen, Ibbotson Associates Mose Milevsky, culic

More information

DEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES

DEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES DEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES Sara Brown, University of Leicester, UK Karl Taylor, University of Leicester, UK

More information

Lecture 13 Linear quadratic Lyapunov theory

Lecture 13 Linear quadratic Lyapunov theory EE363 Winter 28-9 Lecture 13 Linear quadratic Lyapunov theory the Lyapunov equation Lyapunov stability conditions the Lyapunov operator and integral evaluating quadratic integrals analysis of ARE discrete-time

More information

Chapter 11. Limits and an Introduction to Calculus. Selected Applications

Chapter 11. Limits and an Introduction to Calculus. Selected Applications Capter Limits and an Introduction to Calculus. Introduction to Limits. Tecniques for Evaluating Limits. Te Tangent Line Problem. Limits at Infinit and Limits of Sequences.5 Te Area Problem Selected Applications

More information

Journal of Development Economics

Journal of Development Economics Journal of Development Economics 99 (2012) 92 104 Contents lists available at SciVerse ScienceDirect Journal of Development Economics journal omepage: www.elsevier.com/locate/devec Investor protection

More information

3. Reaction Diffusion Equations Consider the following ODE model for population growth

3. Reaction Diffusion Equations Consider the following ODE model for population growth 3. Reaction Diffusion Equations Consider the following ODE model for population growth u t a u t u t, u 0 u 0 where u t denotes the population size at time t, and a u plays the role of the population dependent

More information