Cyber Epidemic Models with Dependences
|
|
- Brianne Tate
- 8 years ago
- Views:
Transcription
1 Cyber Epidemic Models wit Dependences Maocao Xu 1, Gaofeng Da 2 and Souuai Xu 3 1 Department of Matematics, Illinois State University mxu2@ilstu.edu 2 Institute for Cyber Security, University of Texas at San Antonio dagfvc@gmail.com 3 Department of Computer Science, University of Texas at San Antonio sxu@cs.utsa.edu corresponding autor Abstract Studying models of cyber epidemics over arbitrary complex networks can deepen our understanding of cyber security from a wole-system perspective. In tis paper, we initiate te investigation of cyber epidemic models tat accommodate te dependences between te cyber attack events. Due to te notorious difficulty in dealing wit suc dependences, essentially all existing cyber epidemic models ave assumed tem away. Specifically, we introduce te idea of Copulas into cyber epidemic models for accommodating te dependences between te cyber attack events. We investigate te epidemic equilibrium tresolds as well as te bounds for bot equilibrium and nonequilibrium infection probabilities. We furter caracterize te side-effects of assuming away te due dependences between te cyber attack events, by sowing tat te results tereof are unnecessarily restrictive or even incorrect. Keywords: Copula, Cyber epidemics, dependence, epidemic tresold, spectral radius, infection probability 1 Introduction Cyberspace or Internet is peraps te most complex man-made system. Wile cyberspace as become an indispensable part of te society, economy and national security, cyber attacks also ave become an increasingly devastating problem. Despite studies and progresses in te past decades, our understanding of cyber security from a wole-system perspective, rater tan from a component or building-block perspective, is still at its infant stage. Tis is caused by many factors, including te deart of powerful matematical models tat can capture and reason te interactions between te cyber attacks and te cyber defenses. Recently, researcers ave started pursuing te cyber-security value of biological epidemics -like matematical models. Wile conceptually attractive, biological epidemic models cannot be directly used to describe cyber security because tere are many cyber-specific issues. One particular issue, wic we initiate its study in te present paper, is te dependences between te cyber attack events. To te best of our knowledge, tese dependences ave been explicitly assumed away in essentially all existing cyber epidemic models, peraps because tey are notoriously difficult to cope wit. Indeed, accommodating te dependences introduces yet anoter dimension of difficulty to cyber epidemic models tat incorporate arbitrary complex network structures. However, te dependences are inerent because, for example, te events tat computers get infected are not independent of eac oter, and a malware may first infect some computers because te users visit some malicious websites and ten spread over te network. Moreover, cyber attacks may be well coordinated by intelligent malwares, and te coordination causes positive dependences between te attack events. 1.1 Our contributions In tis paper, we initiate te systematic study of a new sub-field in cyber epidemic models, namely understanding and caracterizing te importance of te dependences between te attack events in cyber epidemic models tat accommodate arbitrary complex network structures. Tis is demonstrated troug a non-trivial generalization of te 1
2 powerful pus- and pull-based cyber epidemic model tat was recently investigated in [19]. Specifically, we capture te dependences between te cyber attack events by incorporating te idea of Copulas into cyber epidemic models. To te best of our knowledge, tis is te first systematic study of cyber epidemic models tat accommodate dependences, rater tan assuming tem away. Specifically, we make two contributions. First, we derive epidemic equilibrium tresolds, namely sufficient conditions under wic te epidemic spreading enters a non-negative equilibrium te spreading never dies out wen tere are pull-based attacks, meaning tat only positive equilibrium is relevant under tis circumstance. Some of te sufficient conditions are less restrictive but require ard-to-obtain information i.e., tese conditions are teoretically more interesting, and te oters are more restrictive but require easy-to-obtain information i.e., tese conditions are practically more useful. We also derive bounds for te equilibrium infection probabilities and discuss teir tigtness. Te bounds are easy to obtain/compute, and are useful especially wen it is infeasible to obtain te equilibrium infection probabilities numerically let alone analytically. For example, te s can be treated as te worst-case scenarios wen provisioning defense resources. For Erdős-Rényi ER and power-law networks, we furter propose to approximate te equilibrium infection probabilities by taking advantage of te bounds. Te approximation results are smaller tan te s and would not underestimate te number of infected nodes, meaning tat te approximation results can lead to more cost-effective defense. We furter present bounds for non-equilibrium infection probabilities, no matter weter te spreading converges to equilibrium or not. All te results are obtained by explicitly accommodating te dependence structures between te cyber attack events. Second, we caracterize te side-effects of assuming away te due dependences on te bounds for equilibrium infection probabilities, on te epidemic equilibrium tresolds, and on te non-equilibrium infection probabilities. We sow tat assuming away te due dependences can make te results tereof unnecessarily restrictive or even incorrect. We furter discuss te cyber security implications of te side-effects. It is wort mentioning tat as a first step towards ultimately tackling te dependence problem in cyber epidemic models, te Copulas tecnique, wic we use in te present paper, is appealing because of te following. On one and, it leads to tractable models, wile capable of coping wit ig-dimensional dependence i.e., dependence between a large vector of random variables. On te oter and, tere are families of copula structures tat ave been extensively investigated in te literature of Applied Probability Teory and Risk Management, and various metods ave been developed for estimating te types and parameters of copula structures in practice. Of course, muc researc remains to be done before we can answer questions suc as: Wat approac is te most appropriate for accommodating dependence in cyber epidemic models, under wat circumstances? 1.2 Related work Biological epidemic models can be traced back to McKendrick and Kermack [13, 10]. Suc omogeneous biological epidemic models were introduced to computer science for caracterizing te spreading of computer viruses in [9]. Heterogeneous epidemic models, especially te ones tat accommodate arbitrary network structures, were not studied until recently [17, 6, 1]. Tese studies led to te full-fledged pus- and pull-based cyber epidemic model [19], wic is te starting point of te present paper. To te best of our knowledge, all existing cyber epidemic models, wic aim to accommodate arbitrary network structures including oter recent studies suc as [16, 11, 20] and te references terein, assumed tat te attacks are independent of eac oter. Tis is plausible because accommodating arbitrary network structures in cyber epidemic models already make te resulting models difficult to analyze, and accommodating dependences introduces, as we sow in te present paper, anoter dimension of difficulty to te models. Te only exception is due to our recent study [18], wic is based on a different approac to modeling cyber epidemics [11]. Te main contribution of [18] is to get rid of te exponential distribution assumptions for certain random variables. Moreover, te model in [18] can only accommodate te specific Marsall-Olkin dependence structure between te attack events. In contrast, we ere accommodate arbitrary dependence structures between te attack events, wile investigating te epidemic equilibrium tresolds, te equilibrium and non-equilibrium infection probabilities, and te side-effects of assuming away te due dependences. Many of tese issues are not studied in te context of [18] because its focus is different. Tis explains wy te present paper is te first systematic treatment of dependences in 2
3 cyber epidemic models. Te dependence modeled in te present paper is static i.e., time-invariant. Tis study inspired [5], wic makes a furter step towards modeling dynamic dependence between cyber attacks, but using a different modeling approac. Te rest of te paper is organized as follows. In Section 2 we briefly review some facts about Copulas. In Section 3 we investigate te generalized cyber epidemic model tat accommodates te dependences between te cyber attack events. In Section 4 we caracterize te side-effects as caused by assuming away te due dependences. In Section 5, we conclude te paper wit future researc problems. Te following table summarizes te main notations used in te paper. G = V, E te grap/network in wic cyber epidemics occurs, were V is te node set and E is te edge set degv te degree of node v in grap G = V, E, wic can be represented by adjacency matrix A I v t, I v,j t te state of node v at time t: I v t = 1 means infected and 0 means secure; I v,j t is te state of te jt neigbor of node v 1 means infected and 0 means secure, were 1 j degv i v t te probability tat node v V is infected at time t i v,j t te condition probability tat at time t node v V is secure but te jt neigbor of node v is infected i v, i + v lower and s for te non-equilibrium infection probability lim t i v t, were te system does not converge to any equilibrium i v, i v,j te equilibrium infection probabilities tat node v and its jt neigbor are infected, respectively i, i + v i is te for te equilibrium infection probability i v for every v, i + v is te for te equilibrium infection probability i v of node v i, i v i = i 1,..., i N were N = V, i v = i v,1,..., i v,degv α te probability tat a secure node v V is infected by pull-based cyber attacks at a time step β te probability tat an infected node v V becomes secure at a time step γ te probability tat an infected node u successfully attacks node v over u, v E at a time step ρm spectral radius of matrix M C v degv-copula describing te dependence between te pus-based cyber attacks against node v C 2-copula describing te dependence between te pull-based attacks and te pus-based attacks against a node δ C te diagonal section of copula C, i.e., δ C u = Cu,..., u 2 Preliminaries Copulas can model dependences by relating te individual marginal distributions to teir multivariate joint distribution. In tis paper we will use te n-copulas [8, 15]. Specifically, a function C : [0, 1] n [0, 1] is called n-copula if: Cu 1,..., u n is increasing in eac component u z, z {1,..., n}. Cu 1,..., u z 1, 0, u z+1,..., u n = 0 for all u j [0, 1], j = 1,..., n, j z. C1,..., 1, u z, 1,..., 1 = u z for all u z [0, 1], z = 1,..., n. C is n-increasing, i.e., for all u 1,1,..., u 1,n and u 2,1,..., u 2,n in [0, 1] n wit u 1,j u 2,j and for all j = 1,..., n, it olds tat n j=1 z j Cu z1,1,..., u zn,n 0. z 1 =1 z n =1 Let R 1,..., R n be random variables wit distribution functions F 1,..., F n, respectively. Te joint distribution function is F r 1,..., r n = P R 1 r 1,..., R n r n. Te well-known Sklar s teorem states tat tere exists an n-copula C suc tat F r 1,..., r n = C F 1 r 1,..., F n r n. 3
4 Tere are many families of copulas [8, 15]. One example is te Gaussian copula wit Cu 1,..., u n = Φ Φ 1 u 1,..., Φ 1 u n, were Φ 1 is te inverse cumulative distribution function of te standard normal distribution and Φ is te joint cumulative distribution function of a multivariate normal distribution wit mean vector zero and covariance matrix equal to te correlation matrix. For simplicity, we assume tat te correlation matrix as te form = 1 σ... σ σ 1 σ σ... σ σ... 1 were σ measures te correlation between two random variables. Terefore, te Gaussian copula can be rewritten as Anoter example is te Arcimedean family wit, Cu 1,..., u n = Φ σ Φ 1 u 1,..., Φ 1 u n. Cu 1,..., u n = ϕ 1 ϕu ϕu n, were function ϕ is called a generator of C and satisfies certain properties see [14] for details. Te Arcimedean family contains many well-known copula functions suc as te Clayton and Frank copulas [15, 3]. Te generator of te Clayton copula is ϕ θ u = u θ 1, and we ave n Cu 1,..., u n = j=1 j n + 1 u θ 1/θ, θ > 0. Te generator of te Frank copula is ψ ξ u = log e ξu 1, and we ave e ξ 1 Cu 1,..., u n = 1 n } {1 ξ log j=1 + e ξu j 1 e ξ 1 n 1, ξ > 0. For illustration purpose, we will use te Gaussian, Clayton and Frank copulas as examples. In order to compare te effects of dependences, we need to compare te degrees of dependences. For tis purpose, we use te concordance order [15, 8]. Let C 1 and C 2 be two copulas, we say C 1 is less tan C 2 in concordance order if C 1 u 1,..., u n C 2 u 1,..., u n for all 0 u i 1, i = 1,..., n. In particular, Gaussian copulas and Clayton copulas are increasing in σ and θ in concordance order, respectively. Te following lemmas will be used in te paper. Lemma 1 [15] Let C be any n-copula, ten n max u j n + 1, 0 Cu 1,..., u n min{u 1,..., u n }. j=1 Lemma 2 [15] Let C be an n-copula, ten Cu 1,..., u n Cv 1,..., v n n u j v j. j=1 4
5 3 Cyber Epidemic Model Wit Arbitrary Dependences Now we present and investigate te cyber epidemic model tat accommodates te dependences between te cyber attack events. Tis is te first systematic treatment of dependences in cyber epidemic models. 3.1 Te Model As in [19], we consider an undirected finite network grap G = V, E, were V = {1, 2,..., N} is te set of N = V nodes vertices tat can abstract computers or software components at an appropriate resolution, and E = {u, v : u, v V} is te set of edges. Note tat G abstracts te network structure according to wic te pus-based cyber attacks take place e.g., malware spreading, were u, v E abstracts tat node u can attack node v. In bot principle and practice, G can range from a complete grap i.e., any u V can directly attack any v V to any specific grap structure i.e., node u may not be able to attack node v directly because, for example, te traffic from node u is filtered or u is blacklisted by v, wic explains wy we sould pursue general results witout restricting te network/grap structures. Denote by A = a vu te adjacency matrix of G, were a vu = 1 if and only if u, v E, and a vu = 0 oterwise. Note tat te problem setting naturally implies a vv = 0. Denote by degv te degree of node v. In a discrete-time model, node v V is eiter secure but vulnerable to attacks or infected and can attack oter nodes at any time t = 0, 1,.... At eac time step, an infected node v becomes secure wit probability β, wic abstracts te defense power. Te model accommodates two large classes of cyber attacks: a secure node v can become infected because of i pull-based cyber attacks wit probability α, wic include drive-by-download attacks i.e., node v getting infected because its user visits a malicious website and insider attacks i.e., te user intentionally runs a malware on node v, or ii pus-based cyber attacks launced by v s infected neigbor u over edge u, v E wit probability γ. Our extension to te above model is to accommodate te dependences between te pus-based attacks as well as te dependences between te pus-based attacks and te pull-based attacks. Tese attacks are not independent because te events tat te nodes get infected are not independent of eac oter, and because te pus-based attacks are not independent of te pull-based attacks e.g., a malware could first infect some nodes via te pull-based cyber attacks and ten launc te pus-based cyber attacks from te infected nodes. Moreover, te dependences between te pus-based attacks can model tat intelligent malwares launc coordinated attacks against te secure nodes. Specifically, let I v t denote te state of node v at time t, were I v t = 1 means v is infected and 0 means v is secure. Let I v,1 t,..., I v,degv t denote te state vector of node v s neigbors at time t, were { 1, te jt neigbor of node v is infected at time t, I v,j t = 0, oterwise. Define i v t = PI v t = 1 and i v,j t = PI v,j t = 1 I v t = 0 were j = 1,..., degv. Let X v t = 1 denote te event tat node v is infected at time t + 1 because of te pus-based cyber attacks, and X v t = 0 oterwise. Let X v,j t + 1 = 1 denote te event tat node v is infected at time t + 1 by its jt neigbor, and X v,j t + 1 = 0 oterwise. Note tat PX v,j t + 1 = 1 I v t = 0 = γ i v,j t. Since any dependence structure between X v,1 t + 1,..., X v,degv t + 1 always can be accommodated by some copula function C v, we ave PX v t + 1 = 0 I v t = 0 = C v 1 PXv,1 t + 1 = 1 I v t = 0,..., 1 PX v,degv t + 1 = 1 I v t = 0 = C v 1 γiv,1 t,..., 1 γi v,degv t. 1 Similarly, let Y v t + 1 = 1 denote te event tat node v is infected at time t + 1 because of te pull-based cyber attacks. Ten, we ave PY v t + 1 = 1 I v t = 0 = α. By furter accommodating te dependence structure between te pus-based attacks and te pull-based attacks via some copula function C, we ave PI v t + 1 = 1 I v t = 0 = 1 P X v t + 1 = 0, Y v t + 1 = 0 I v t = 0 = 1 C C v 1 γiv,1 t,..., 1 γi v,degv t. 2 5
6 Note tat PI v t + 1 = 1 I v t = 1 = 1 βi v t. 3 From Eqs. 1, 2 and 3, we obtain te probability tat node v V is infected at time t + 1 as: i v t + 1 = PI v t + 1 = 1 = PI v t + 1 = 1 I v t = 1PI v t = 1 + PI v t + 1 = 1 I v t = 0PI v t = 0 = 1 β i v t + PI v t + 1 = 1 I v t = 0 1 i v t = 1 βi v t + [ 1 C C v 1 γiv,1 t,..., 1 γi v,degv t ] 1 i v t. 4 We will analyze Eq. 4 for v V to caracterize te effects of te dependence structures C and C v and te side-effects of assuming tem away. Note tat for te special case tat te X v,j s are independent of eac oter and te pus-based attacks and te pull-based attacks are also independent of eac oter, Eq. 4 degenerates to te model in [19]. Note also tat in order to caracterize te side-effects of assuming away te dependences, we need to accommodate te dependences at a iger-level of abstraction tan te model parameters α and γ. Tis is because te parameters are indeed relatively easier to obtain in experiments/practice e.g., considering a single compromised neigbor tat is launcing te pus-based attacks, and considering te pull-based attacks in te absence of te pusbased attacks. 3.2 Epidemic Equilibrium Tresold and Bounds for Equilibrium Infection Probabilities Te concept of epidemic equilibrium tresold [19] naturally extends te well-known concept of epidemic tresold in tat te former describes te condition under wic te epidemic spreading converges to a non-negative equilibrium, wereas te latter traditionally describes te condition under wic te epidemic spreading converges to 0 i.e., te spreading dies out. Note tat α > 0 implies tat te spreading will never die out and tat α = 0 is necessary for te spreading to die out. Denote by i v te equilibrium infection probability for node v V. In te equilibrium, Eq. 4 becomes: [ ] i v = 1 βi v + 1 C C v 1 γi v,1,..., 1 γi v,degv 1 i v, v V. 5 In wat follows, Teorem 1 gives a general epidemic equilibrium tresold i.e., sufficient condition under wic te spreading enters te equilibrium, and Teorem 2 gives a more succinct but more restrictive sufficient condition. Lemma 3 Let A be te adjacency matrix of G. If ρa < β + α2, 6 γβ ten system 4 as a unique equilibrium i 1,..., i N [0, 1]N. Proof For any v V, define f v x : [0, 1] N [0, 1] as f v x = 1 C C v 1 γxv,1,..., 1 γx v,degv β + 1 C C v 1 γxv,1,..., 1 γx v,degv, v = 1,..., N, were x = x 1,..., x N [0, 1] N. Define f : [0, 1] N [0, 1] N, were fx = f 1 x,..., f N x. According to te Banac fixed-point teorem [7], it is sufficient to sow tat fx = x as a unique solution i ; tat is, we need to prove tat f is a contraction mapping. Let x, y [0, 1] N. Consider te distance between tem in te Euclidean norm, fx fy = N f v x f v y 2 = N 2 βγv, v=1 6 v=1 v
7 were Γ v = C C v 1 γxv,1,..., 1 γx v,degv C Cv 1 γyv,1,..., 1 γy v,degv, v = β + 1 C C v 1 γxv,1,..., 1 γx v,degv By Lemmas 1 and 2, it follows tat Terefore, we ave Moreover, degv N x v,k y v,k v=1 k=1 β + 1 C C v 1 γyv,1,..., 1 γy v,degv. degv Γ v γ x v,k y v,k and v β + α 2. k=1 2 degv βγ N fx fy β + α 2 x v,k y v,k. 2 v=1 k=1 = x 1 y 1,..., x N y N A 2 x 1 y 1,..., x N y N T x 1 y 1,..., x N y N 2 A 2 = x y 2 A 2, were A denotes te operator norm of A. Since A is symmetric matrix, we ave From condition 6, it follows tat wic means tat f is a contraction mapping. A = ρa. fx fy βγρa 2 x y < x y, β + α Teorem 1 general epidemic equilibrium tresold Let A be te adjacency matrix of G and D be te diagonal matrix wit te vt 1 v N diagonal element equal to α, β, γ, i v = C C v 1 γi v,1,..., 1 γi v,degv β, were i v is te equilibrium infection probability tat satisfies Eq. 5. Let W = D+γA. If condition 6 olds, namely tat system 4 as a unique equilibrium, and te spectral radius ρw < 1, ten lim t i v t = i v exponentially for all v V. Proof According to Lemma 3, tere is a unique solution for i v under condition 6. Denote by r v t = i v t i v. We want to identify a sufficient condition under wic lim t r v t = 0 for all v V. Note tat [ ] r v t + 1 = r v t C C v 1 γi v,1,..., 1 γi v,degv β + 1 i v t [ C C v 1 γi v,1,..., 1 γi v,degv C C v 1 γiv,1 t,..., 1 γi v,degv t ]. 7
8 By Lemma 2, we ave r v t + 1 r v t α, β, γ, i v + 1 i v t C v 1 γi v,1,..., 1 γi v,degv C v 1 γiv,1 t,..., 1 γi v,degv t degv r v t α, β, γ, i v + γ 1 i v t i v,j i v,j t j=1 degv r v t α, β, γ, i v + γ r v,j t, j=1 were α, β, γ, i v = C C v 1 γi v,1,..., 1 γi v,degv β. Define degv z v t + 1 = z v tα, β, γ, i v + γ z v,j t, wit z v 0 r v 0 and z v,j 0 r v,j 0 for j = 1,..., degv. We see r v t z v t for any t. Let zt = z 1 t,..., z n t T. Ten, we ave te following matrix form j=1 zt + 1 = W zt = W t+1 z0, 7 were W = D + γa, D is te diagonal matrix wit diagonal element α, β, γ, i v, and A is te adjacency matrix of G. Since matrix W is nonnegative and symmetric, te Spectral Teorem [12] says tat ρw is real. By using te well-known Gelfand formula, if ρw < 1, ten lim t W t = 0 and terefore lim t zt = 0. Since ρw = lim t W t 1/t and W t [ρw ] t, t, were is te norm in real space R n, we conclude tat W t converges to 0 exponentially wen ρw < 1. Tis means tat te convergence rate of lim t it = i is at least exponential. Use of te sufficient condition given by Teorem 1 requires to know i i.e., i v for all v, wic is difficult to obtain analytically. It is terefore important to weaken tis requirement. Now we present a sufficient condition tat only requires te equilibrium infection probability i v for some v rater tan for all v V. According to [4], we ave ρw max v V α, β, γ, i v + γρa. Terefore, a more restrictive tan te one given by Teorem 1 sufficient condition is to require max α, β, γ, v V i v + γρa < 1, namely ρa < 1 max v V α, β, γ, i v. γ According to Eq. 5, we ave α, β, γ, i v = 1 β 1 i. v Terefore, we obtain te following more restrictive, but more succinct, sufficient condition: Corollary 1 lim t i v t = i v exponentially for all v V, if { 1 maxv V 1 β/1 i ρa min v, γ } β + α2. 8 γβ 8
9 Applying te above sufficient condition still requires to know te minimal and maximal i v s, wic is ard to obtain analytically. Altoug it is always possible to obtain tem numerically, we would want to ave some more general results witout relying on s. In wat follows we present suc a sufficient condition Teorem 2, wic requires te following Proposition 1 tat presents bounds for te equilibrium infection probability. Te bounds are certainly of independent value. Proposition 1 bounds for equilibrium infection probabilities For any dependence structures C and C v, wic may be unknown, te equilibrium infection probability i v for v V satisfies i i v i + v, were { } i = γ β I{γ > α + β} + α min α + γdegv I{γ α + β}, γ β + α i + β+1, 1 v = { }. β + min α + γdegv β+1, 1 Proof Rewrite Eq. 5 as i v = 1 C C v 1 γi v,1,..., 1 γi v,degv. 9 β + 1 C C v 1 γi v,1,..., 1 γi v,degv By noticing te monotonicity in 9 and applying Lemma 1, we obtain } { max {γi v,1,..., γi v,degv, α min α + γ } degv } i β + max {γi j=1 i v,j, 1 v,1,..., γi v,degv, α v { β + min α + γ }. 10 degv j=1 i v,j, 1 Let us first consider te. Note tat for eac v V, By substituting x 1 for i v,j in Ineq. 10, we ave i v x 1 def = α β + α. i v x 2 = max {γx 1, α} β + max {γx 1, α}. By substituting x 2 for i v,j in Ineq. 10, we obtain x 3. By repeating te substitution, we obtain a sequence {x n, n 1} wit x n = max {γx n 1, α} β + max {γx n 1, α}, x 0 = 0. Since {x n, n 1} is increasing and bounded, we can get its limit, namely i, by solving te following equation max{γx, α} β + max{γx, α} = x. For te, note tat i v β for v V. By substituting 1/β + 1 for i v,j in Ineq. 10, we get i + v. It is useful to know wen te bounds in Proposition 1 are tigt. For tis purpose, we observe tat if β+1 degv 0, meaning tat γ degv << 1 and tat te attack-power is not strong, we ave i + v i = β + α. Tis means α tat te bounds are tigt wen te attack-power is not strong. On te oter and, Proposition 1 allows us to derive te following more succinct, but more restrictive tan Corollary 1 and terefore Teorem 1, sufficient condition for te epidemic spreading converges to te equilibrium i.e., epidemic equilibrium tresold. Te new sufficient condition involves te bounds i and i + v only i.e., none of te equilibrium probabilities tat are ard to obtain analytically. 9 γ
10 Teorem 2 succinct epidemic equilibrium tresold Te spreading enters te unique equilibrium if { { }} β 1 max max 1 v V 1 i ρa, β 1 1 i + v, γ were i and i + v are defined in Proposition 1. Proof Note tat for any v V, we ave max α, β, γ, v V i v = max v V 1 β { { 1 i max β max 1 v v V 1 i, 1 Note tat wic implies Terefore, 1 max v V { max { 1 { { max max 1 v V 1 β 1 i, 1 β 1 i β 1 i, 1 β 1 i + v According to Corollary 1, we obtain te desired result. }} β + α2 1, β β 1 i + v }} 1 β + α2. β β 1 i + v { min 1 max 1 β/1 v V i v, }}. } β + α2. β 3.3 Tigter Bounds for Equilibrium Infection Probabilities in Star and Regular Networks Star networks. A star-saped network consists of a ub and N 1 leaves tat are connected only to te ub. Hence, te adjacency matrix A can be represented as A = Te spectral radius is ρa = N 1. In tis case, Eq. 5 becomes: N N i = 1 C δ C 1 γi l β + 1 C δ C 1 γi 11 l, i l = 1 C 1 γi 1 + β C 1 γi 12, were i and i l are te equilibrium probabilities tat te ub and te leaves are infected, respectively. Note tat te effect of te copula C on te equilibrium probabilities only depends on its diagonal section δ C. In wat follows we present two results about te equilibrium infection probabilities, wic are not implied by te above general results tat apply to arbitrary network structures. First, we can prove i i l. Proposition 2 For te star networks, it olds tat i i l. 10
11 Proof Denote by fx = 1 C δ C 1 γx β + 1 C δ C 1 γx and gx = 1 C 1 γx 1 + β C 1 γx were x [0, 1]. Since δ C x x, we ave fx gx. Suppose i < i l and i, i l is a solution to Eqs. 11 and 12. Ten, i = fi l = g 1 i l < i l. Since gx is increasing in x and so is g 1, we ave i l gi l and fi l < i l gi l, wic contradicts wit fx gx for x [0, 1]. Second, we present refined bounds for equilibrium infection probabilities i and i l. Te bounds are useful because even in te case of star networks, it is ard to derive analytic expressions and infeasible to numerically compute especially for complex dependence structures i and i l. Proposition 3 tigter s for te equilibrium infection probabilities in star networks For star networks and regardless of te dependence structures wic can be unknown, we ave i i i + and i i l i + l, were i is defined in Proposition 1 and { i = β + 1 I β α } N 1γ and + N 1γ α β + N 1γ α β 2 + 4N 1γα I 2N 1γ i + l = 1 { 1 β + 1 I β α } γ { 1 β + 1 < + γ α β + γ α β 2 { + 4γα 1 I 2γ β + 1 < 1 α }. γ Proof Te i is te same as in Proposition 1. Let s focus on i +. From Ineq. 10, we ave i min{α + N 1γi l, 1} β + min{α + N 1γi l, 1} = fi l. Since te rigt-and side of te above inequality increases in i l, by Proposition 2 we ave and terefore i i + For te i + l, were i + i fi, is te solution to equation 1 α }. N 1γ x = fx. 13, we can similarly obtain te desired result by solving equation x x = f N Now we explain wy te s i + and i + l given by Proposition 3 are smaller i.e., tigter tan te general s tat can be derived from Proposition 1 by instantiating G = V, E as star networks. To see tis, we note tat i + is te solution to Eq. 13 and i + 1 β+1, meaning tat { } min α + N 1 γ i + β+1 {, 1 }, β + min α + N 1 γ β+1, 1 were te rigt-and side of te inequality is exactly te tat can be derived from Proposition 1 by substituting degv wit te degree of te ub. Tis means tat i + is smaller tan te given by Proposition 11
12 1. Similarly, we can sow tat i + l is smaller tan te given by Proposition 1. Moreover, by comparing 13 and 14, we see tat i + i + l. Since te i is te same as te given by Proposition 1, we conclude tat te bounds given by Proposition 3 are tigter tan te bounds given by Proposition 1. To see te tigtness of te bounds given by Proposition 3, we consider two combinations of dependence structures: C, C v =Gaussian,Frank and C, C v =Gaussian, Clayton wit parameters σ = θ = ξ = 0.1 as reviewed in Section 2. Figure 1 plots i, i l, i, i +, and i + l for N = 3,..., 81 wit α, β, γ = 0.5, 0.1, 0.1; all tese parameter settings satisfy condition 8. We observe tat te i + becomes flat for N 5, because it causes i + = 1 β+1 i.e., independent of N; wereas, te i + l is flat because it is always independent of N. We observe tat te for ub node, i +, becomes extremely tigt for dense star networks wit N > 40. However, te for leave nodes almost always exibits tat i + l i l i.e., te upper bound overestimates about 0.88 infected nodes for a star network of N = 80 nodes. In any case, te s only somewat overestimate te s i v s and tus can be used for decision-making purpose wen i v s are infeasible to compute Star Leaves Star Leaves Star Leaves Star Leaves a Hub: Gaussian, Frank b Leaves: Gaussian, Frank c Hub: Gaussian, Clayton d Leaves: Gaussian, Clayton Figure 1: Star networks: i + for ub i + l for leaves vs. i for ub i l i for bot ub and leaves wit respect to α, β, γ = 0.5, 0.1, 0.1 and C, C v. for leaves vs. Regular networks. For regular networks, eac node v V as degree d for some d [1, N 1] and ρa = d. According to Proposition 1, we ave i v = 1 C C v 1 γi v,1,..., 1 γi v,d β + 1 C C v 1 γi v,1,..., 1 γi, v V. v,d Now we want to present refined bounds for equilibrium infection probability i v. Proposition 4 tigter for te equilibrium infection probability in regular networks For regular network G = V, E and regardless of te dependence structures wic can be unknown, we ave i i v i + for any v V, were i is defined in Proposition 1 and i + = 1 { 1 β + 1 I β α } γd + γd α β + γd α β 2 { + 4γαd 1 I 2γd β + 1 < 1 α }. γd Proof Define function fx = min{α + γdx, 1} β + min{α + γdx, 1} and a sequence {x n, n 0} wit x n = fx n 1, x 0 = 1/β + 1. Observe tat for all v V, we ave i v x 0 and ence from Ineq. 10, it follows tat i v x 1 for all v V. By repeating tis process, we ave i v x n for all n. Since fx is increasing and x 1 x 0, x n is decreasing in n. Tus, we ave i v i +, wic is te solution 1 of te equation x = fx. If β+1 1 α γd, ten i + = 1 β+1 ; oterwise, i + is te positive solution to equation γdx 2 + α + β γdx α = 0. Tus, we obtain te desired result. 12
13 Note tat te i + given by Proposition 4 is smaller tan te i + v obtained by instantiating degv = d in Proposition 1, because i + v is exactly te x 1 defined in te proof of Proposition 4. To see te tigtness of bounds i and i + given by Proposition 4, we consider C, C v =Gaussian,Frank and C, C v =Gaussian, Clayton wit parameters σ = θ = ξ = 0.1 as reviewed in Section 2. Figure 2 plots numerical i v, i and i + wit respect to node degree d = 2,..., 80 wit α, β, γ = 0.5, 0.1, 0.01; all tese parameter settings satisfy condition 8. We observe tat i + v becomes flat for sufficiently dense regular networks. Tis is because i + v = 1 β+1 wen d 1 αβ+1 γ. For C, C v =Gaussian,Frank, we furter observe tat te i + v is reasonably tigt especially for relatively sparse regular networks, wit i + v i v < for d < 20 i.e., for a sparse regular network of N = 1000 nodes, te only overestimates at most 21 infected nodes. Even for dense regular network wit d > 20, we ave i + v i v i.e., for a dense regular network of N = 1000 nodes, te only overestimates at most 38 infected nodes, were equality olds for d = 54. For C, C v =Gaussian, Clayton, we also observe tat te i + v is tigt especially for relatively sparse regular networks wit d < 20 and i + v i v < i.e., for a sparse regular network of N = 1000 nodes, te only overestimates at most 21 infected nodes. Even for dense regular network wit d > 20, we ave i + v i v 0.039, were equality olds for d = 54. Tis means tat for decision-making purpose, te defender can use te i + v instead of te i v, especially wen i v is infeasible to compute Regular Regular a Gaussian,Frank,0.5,0.1,0.01 b Gaussian,Clayton,0.5,0.1,0.01 Figure 2: Regular networks: i + v vs. i v vs. i v C, C v, α, β, γ wit respect to 3.4 Approximating Equilibrium Infection Probabilities in ER and Power-law Networks For star and regular networks, we ave derived tigter bounds for equilibrium infection probabilities tan te general bounds given by Proposition 1. Unfortunately, we do not know ow to derive tigter bounds for ER and power-law networks. As an alternative, we propose to approximate equilibrium infection probabilities by taking advantage of te upper and s. Te approximation is useful because it is often smaller tan te, wic never underestimates, but may substantially overestimate, te treats in terms of equilibrium infection probabilities. Tat is, te approximation metod can lead to more cost-effective defense tan te. Te approximation metod is te following: We first compute s, s, and s for a feasible number of instances of G, C, C v, α, β, γ, based on given computer resources. We ten use te resulting data to derive via statistical metods some function of te lower and s. For even larger G of te same type as well as C, C v of te same kind, te resulting function would be smaller tan te and would not underestimate te equilibrium infection probabilities. Te key insigt is tat we can compute, for networks of any size, te upper and s according to Proposition 1. Tis means tat we can approximate te equilibrium infection probabilities for arbitrarily large networks, for wic it is often infeasible to numerically let alone analytically compute te equilibrium infection probabilities. To illustrate te approximation metod, we also consider C, C v =Gaussian,Frank and C, C v =Gaussian, Clayton wit parameters σ = θ = ξ = 0.1 as reviewed in Section 2. We use te erdos.renyi.game generator of te igrap package in te R system to generate a random ER network of N = 1000 nodes and edge probability 0.01; te resulting network instance as spectral radius We use te static.power.law.game 13
14 generator of te igrap package in te R system to generate a random power-law network of N = 1000 nodes, 5000 edges, and power-law exponent 2.1 note tat 2.1 is te power-law exponent of te Internet AS-level network [6]; te resulting network instance as spectral radius We consider combinations of α, β, γ tat satisfy condition 8, were α {0.01, 0.05, 0.1, 0.2, 0.3, 0.4, 0.5}, β {0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9}, γ {0.01, 0.02, 0.03, 0.04, 0.05, 0.06, 0.07, 0.08, 0.09, 0.1}. It turns out tat for C, C v =Gaussian, Frank, te ER network as 307 combinations of α, β, γ tat satisfy condition 8; te power-law network as 125 combinations of α, β, γ tat satisfy condition 8, because te spectral radius is larger. For C, C v =Gaussian, Clayton, te ER network as 307 combinations of α, β, γ tat satisfy condition 8; te power-law network as 126 combinations of α, β, γ tat satisfy condition 8. We compute equilibrium infection probability i v numerically by solving Eqs. 5 for v V via te BB package in te R system. We compute te upper and s, namely i and i + v, according to Proposition 1. Since it is infeasible to numerically compute i v for large networks, we propose to approximate i v for node v V via î v = 1 2 ĩ v + iv +, were ĩ v = f C,Cvi, i + v, degv = k 0 + k 1 i + k 2 i + v + k 3 degv can be statistically derived from te data. Note tat te euristic function î v could be refined via more extensive numerical studies. We define te approximation error for network G as err G = v V î v i v, because v V i v is an important factor for cyber defense decision-making. For practical use, it is desired tat err G 0, meaning tat te defender never underestimates te treats, and at te same time err G 0, meaning tat te defender does not overestimate te treats i.e., does not overprovision defense resources too muc. ER networks. For te ER network, we obtain te following formulas : For C, C v =Gaussian, Frank, we ave î v = i i + v degv. For C, C v =Gaussian, Clayton, we ave î v = i i + v degv. For C, C v =Gaussian, Frank, te average of te err G s over te 307 combinations of C, C v, α, β, γ is 46, meaning tat te approximation metod only overestimates 46 infected nodes in an ER network of 1000 nodes. In comparison, te average of te v V i + v i v s over te 307 combinations of C, C v, α, β, γ is 93, meaning tat te overestimates 93 infected nodes i.e., te approximation metod is indeed better; te average of te v V i i v s is -52.7, meaning tat te underestimates 52.7 infected nodes in an ER network of 1000 nodes. Finally, we note tat among te 307 combinations of C, C v, α, β, γ, te maximum err G is 165.2, wic is elaborated in Figure 3a and will be discussed furter, and te minimum err G is 4.1, wic is elaborated in Figure 3b and will be discussed furter as well. For C, C v =Gaussian, Clayton, te average of te err G s over te 307 combinations of C, C v, α, β, γ is 46.5, meaning tat te approximation metod only overestimates 46.5 infected nodes in an ER network of 1000 nodes. In comparison, te average of te v V i + v i v s over te 307 combinations of C, C v, α, β, γ is 93, meaning tat te overestimates 93 infected nodes in an ER network of 1000 nodes; te average of te 307 v V i i v s is -52.5, meaning tat te underestimates 52.5 infected nodes in an ER network of 1000 nodes. Among te 307 instances, te maximum err G is 165.0, wic is elaborated in Figure 3d and will be discussed furter, and te minimum err G is 4.2, wic is elaborated in Figure 3e and will be discussed furter. In summary, cyber defense decision-making can be based on te approximation metod, wic takes advantage of te upper and s and would be better smaller tan te. As a side-product, we would like to igligt te penomenon tat te equilibrium infection probability i v increases wit node degree degv. Tis penomenon was observed in [19] in te absence of dependence, and persists, i v, î v and i wit respect to distinct node degrees, by taking te average over te nodes of te same degree wen needed. For C, C v =Gaussian,Frank, Figures 3a-3b plot te infection probabilities corresponding to te α, β, γ tat leads to te maximum and minimum err G, respectively; Figure 3c plots te infection probabilities averaged over te 307 combinations of α, β, γ tat satisfy condition 8. For C, C v =Gaussian,Clayton, Figures 3d-3e plot te infection probabilities corresponding to in te presence of dependence as we elaborate below. We consider i + v 14
15 ER approximation ER approximation ER approximation a Gaussian,Frank, 0.01,0.4,0.03 b Gaussian,Frank, 0.3,0.9,0.01 c Gaussian,Frank ER approximation ER approximation ER approximation d Gaussian,Clayton, 0.01,0.4,0.03 e Gaussian,Clayton, 0.3,0.9,0.01 f Gaussian,Clayton Figure 3: ER networks: vs. approximation vs. vs. wit respect to C, C v, α, β, γ or C, C v. te α, β, γ tat leads to te maximum and minimum err G, respectively; Figure 4f plots te infection probabilities averaged over te 307 combinations of α, β, γ tat satisfy condition 8. We observe tat te approximation î v can sligtly underestimate te infection probability i v for node v of degree degv 5, but te overall estimation v V î v is still above te actual treats v V i v as mentioned above. More importantly, we observe tat i v solid curves increases wit degv. Tis ints tat tere migt be some universal scaling laws, in te presence or absence of dependence. It is an interesting future work to identify te possible scaling law. Power-law networks. For power-law networks, we obtain te following formulas in a similar fasion: For C, C v =Gaussian, Frank, we ave î v = i i + v For C, C v =Gaussian, Clayton, we ave î v = i i + v degv degv. For C, C v =Gaussian, Frank, te average of te err G s over te 125 combinations of C, C v, α, β, γ is 25, meaning tat te approximation only overestimates 25 infected nodes in a power-law network of 1000 nodes. In comparison, te average of te v V i + v i v s over te 125 combinations of C, C v, α, β, γ is 50.8, meaning tat te overestimates 50.8 infected nodes i.e., te approximation metod is better; te average of te v V i i v s is -26, meaning tat te underestimates 26 infected nodes. Among te 125 combinations of C, C v, α, β, γ, te maximum err G is 84.5, wic is elaborated in Figure 4a and will be discussed furter, and te minimum err G is 7.1, wic is elaborated in Figure 4b. For C, C v =Gaussian, Clayton, te average of te err G s over te 126 combinations of C, C v, α, β, γ is 25.4, meaning tat te approximation only overestimates 25.4 infected nodes in a power-law network of 1000 nodes. In comparison, te average of te v V i + v i v s over te 126 combinations of C, C v, α, β, γ is 50.8, meaning tat te overestimates 50.8 infected nodes; te average of te 126 v V i i v s is -26, meaning tat te underestimates 26 infected nodes. Among te 126 instances, te maximum err G is 84.5, wic is elaborated in Figure 4d, and te minimum err G is 7.2, wic 15
16 is elaborated in Figure 4e. In summary, cyber defense decision-making can use te approximation metod, wic takes advantage of te upper and s Power law approximation Power law approximation Power law approximation a Gaussian,Frank, 0.01,0.5,0.02 b Gaussian,Frank, 0.2,0.1,0.01 c Gaussian,Frank Power law approximation Power law approximation Power law approximation d Gaussian,Clayton, 0.01,0.5,0.02 e Gaussian,Clayton, 0.2,0.1,0.01 f Gaussian,Clayton Figure 4: Power-law networks: vs. approximation vs. vs. wit respect to C, C v, α, β, γ or C, C v. In Figures 4b and 4e, te approximation result matces te almost perfectly. We also would like to igligt te penomenon tat te equilibrium infection probability i v increases wit node degree degv in power-law networks. Similarly, for C, C v =Gaussian,Frank, Figures 4a-4b plot respectively te infection probabilities corresponding to te α, β, γ tat leads to te maximum and minimum err G, and Figure 4c plots te infection probabilities averaged over te 125 combinations of C, C v, α, β, γ tat satisfy condition 8. For C, C v =Gaussian,Clayton, Figures 4a-4b plot respectively te infection probabilities corresponding to te α, β, γ tat leads to te maximum err G, and Figure 4c plots te infection probabilities averaged over te 126 combinations of C, C v, α, β, γ tat satisfy condition 8. We observe tat te approximation î v never underestimates te infection probability i v for any node v. We also observe tat i v solid curves increases wit degv, but exibits a iger nonlinearity wen compared wit te ER networks. 3.5 Bounds for Non-Equilibrium Infection Probabilities It is important to caracterize te beavior of i v t even if it never enters any equilibrium. For tis purpose, we want to seek some bounds for i v t, no matter weter te system converges to an equilibrium or not. Suc caracterization is useful because, for example, te can be used for te worst-case scenario decision-making. It is wort mentioning tat non-equilibrium states/beaviors are always ard to caracterize. Proposition 5 bounds for non-equilibrium probabilities Let lim t i v t and lim t i v t denote te upper and lower limits of i v t, v V. Ten, i v lim t i v t lim t i v t i + v, 16
17 were i v = 1 Cδ Cv 1 γν β + 1 Cδ Cv 1 γν, Cδ C v 1 γν β, [β Cδ Cv 1 γν] 1 µ v + 1 β, oterwise, and 1 C C v 1 γµv,1,..., 1 γµ v,degv i + v = β + 1 C, C C v 1 γµv,1,..., 1 γµ C v 1 γµv,1,..., 1 γµ v,degv v,degv > β [ ] β C Cv 1 γµv,1,..., 1 γµ v,degv 1 i v + 1 β, oterwise wit δ Cv 1 γν = C v 1 γν,..., 1 γν, µ v = max {1 β, min{γdegv + α, 1}} and ν = min{1 β, α}. Proof By observing te monotonicity in Eq. 4, we note tat i v t ν for all v V. Replacing i v,j t wit ν in Eq. 4 yields i v t βi v t + [1 C δ Cv 1 γν] 1 i v t = [C δ Cv 1 γν β] i v t + 1 C δ Cv 1 γν. If C δ Cv 1 γν > β, by taking te lower limit on bot sides we obtain If C δ Cv 1 γν β, we ave lim t i v t C δ C v 1 γν β + 1 C δ Cv 1 γν. i v t + 1 [C δ Cv 1 γν β] µ v + 1 C δ Cv 1 γν = [β Cδ Cv 1 γν] 1 µ v + 1 β. Hence, lim t i v t i v. For te, by applying Lemma 1 to Eq. 4 we ave i v t βi v t + [1 max {max {2 γdegv α} 1, 0}] 1 i v t = 1 βi v t + min {γdegv + α, 1} 1 i v t max {1 β, min{γdegv + α, 1}} = µ v. 15 By replacing i v,j wit µ v,j s in Eq. 4 yields i v t βi v t + [ 1 C C v 1 γµv,1,..., 1 γµ v,degv ] 1 iv t = [ C C v 1 γµv,1,..., 1 γµ v,degv β ] iv t If C C v 1 γµv,1,..., 1 γµ v,degv > β, ten +1 C C v 1 γµv,1,..., 1 γµ v,degv. lim t 1 C C v 1 γµv,1,..., 1 γµ v,degv β + 1 C C v 1 γµv,1,..., 1 γµ v,degv. If C C v 1 γµv,1,..., 1 γµ v,degv β, ten we ave {[ ] lim t i v t + 1 lim t C Cv 1 γµv,1,..., 1 γµ v,degv β iv t +1 C } C v 1 γµv,1,..., 1 γµ v,degv [ C ] C v 1 γµv,1,..., 1 γµ v,degv β limt i v t +1 C C v 1 γµv,1,..., 1 γµ v,degv [ C ] C v 1 γµv,1,..., 1 γµ v,degv β i v +1 C C v 1 γµv,1,..., 1 γµ v,degv. 17
18 Hence, we ave lim t i v t + 1 i + v. Wen are te bounds tigt? It is important to know wen te bounds are tigt because te defender can use te i + v for decision-making, especially wen te spreading never enters any equilibrium. Note tat wen γ << 1, it olds tat Cδ Cv 1 γν C1 = 1 α, and C C v 1 γµv,1,..., 1 γµ v,degv C Cv 1,..., 1 = 1 α. Terefore, in te case γ << 1 and α + β < 1, we ave i v i + v 1 Cδ Cv 1 γν β + 1 Cδ Cv 1 γν α β + α, 1 C C v 1 γµv,1,..., 1 γµ v,degv β + 1 C C v 1 γµv,1,..., 1 γµ v,degv Tis means tat te bounds are tigt wen te attack-power is not strong. In te case γ degv << 1 and α + β 1, we can similarly ave i v α2 α β, i + v β + α 1 [1 α2 α β] + 1 β. Terefore, te difference between te and is i + v i v αα + β 1 2. Terefore, te bounds are tigt wen α + β is not far from 1 or α is close to zero. α β + α. Are te equilibrium bounds always tigter tan te non-equilibrium bounds? We observe te following: under te condition γ degv << 1, we ave i i + v α/α+β; under te condition γ degv << 1 and te condition α + β < 1, we ave i v i + v α/α + β. Tis means tat te equilibrium bounds are widely applicable tan te same non-equilibrium bounds, namely tat te equilibrium bounds are strictly tigter tan te non-equilibrium bounds. 4 Side-Effects of Assuming Away te Dependences In te above we ave caracterized epidemic equilibrium tresolds, equilibrium infection probabilities, and nonequilibrium infection probabilities wile accommodating arbitrary dependences. In order to caracterize te sideeffects of assuming away te dependences, we consider te degree of dependences as captured by te concordance order between copulas reviewed in Section 2. In order to draw cyber security insigts at a iger level of abstraction, we also consider tree kinds of qualitative dependences: positive dependence, independence and negative dependence, wose degrees of dependence are in decreasing order. Specifically, positive negative dependence between te pusbased attacks means degv 1 C v 1 γiv,1,..., 1 γi v,degv 1 j=1 1 γi v,j, and positive negative dependence between te pus-based attacks and te pull-based attacks means 1 C C v 1 γiv,1 t,..., 1 γi v,degv t 1 1 αc v 1 γiv,1 t,..., 1 γi v,degv t, were equality means independence. To simplify te notations, let pd stand for positive dependence, ind stand for independence, and nd stand for negative dependence. Let x {pd, ind, nd} denote te dependence structure between te pus-based attacks and te pull-based attacks, as captured by copula C. Let y {pd, ind, nd} denote te dependence structure between te pus-based attacks, as captured by copula C v. Terefore, te dependence structures can be represented by a pair x, y. 18
19 4.1 Side-Effects on Equilibrium Infection Probabilities and Tresolds For fixed G = V, E, α, β, γ, we compare te effects of two groups of dependences i.e., copulas {C, C v, v V} and {C, C v, v V}. Corresponding to te two groups of copulas, we denote by i v t and i vt te respective infection probabilities of node v V at time t 0. Let i v,x,y denote te equilibrium infection probability of node v, namely i v, under dependence structure x, y. Side-effects on te equilibrium infection probabilities. We present a result about te impact of te dependence structures on te equilibrium infection probabilities. Tis result will allow us to derive te side-effects of assuming away te dependences. Proposition 6 comparison between te effects of different dependence structures on equilibrium infection probabilities Suppose te condition underlying Lemma 3 olds, namely ρa < so tat system 4 as a unique β + α2 γβ equilibrium. If for all v V, we ave C C v u1,..., u degv, u0 C C v u1,..., u degv, u0, 16 were 0 u j 1 for j = 0,..., degv, ten we ave i i. Proof Note tat i and i are respectively te unique positive solutions of fi = 0 and gi = 0, were f = f 1,..., f N and g = g 1,..., g N wit f v i = [ 1 C ] C v 1 γiv,1,..., 1 γi v,degv 1 iv βi v, v V g v i = [ 1 C C v ] 1 γiv,1,..., 1 γi v,degv 1 iv βi v, v V. Since f0 = g0 = α > 0 and f g, we ave gi fi = 0. Since bot f and g are continuous, we ave i i. Te cyber security insigts/implications of Proposition 6 is: Te stronger te negative positive dependences between te attack events, te lower iger te equilibrium infection probabilities. More specifically, we ave i v,pd,y i v,ind,y i v,nd,y for any y {pd, ind, nd} and i v,x,pd i v,x,ind i v,x,nd for any x {pd, ind, nd}. Terefore, te side-effects of assuming away te dependences between attack events are: If te positive negative dependence is assumed away, te resulting equilibrium infection probability underestimates overestimates te actual equilibrium infection probability. Tis means te following: wen te positive dependence between attack events is assumed away, te cyber defense decisions based on i v,ind,ind < i v,pd,pd can render te deployed defense useless; wen te negative dependence is assumed away between attack events, te cyber defense decisions based on i v,ind,ind > i v,nd,nd can waste defense resources. We will use numerical examples below to confirm tese insigts. Anoter important insigt is: if te defender can seek to impose negative dependence on te cyber attacks, te cyber defense effect is better of. We believe tat tis insigt will sed ligt on researc of future cyber defense mecanisms, and igligts te value of teoretical studies in terms of teir practical guidance. Side-effects on te epidemic equilibrium tresold. Corollary 1 gives a sufficient condition under wic te epidemic spreading enters te equilibrium. Here we define { τ def 1 maxv V 1 β/1 i = min v, γ } β + α2, 17 γβ wit respect to a group of copulas {C, C v, v V}. According to Eq. 8, ρa τ means tat te epidemic spreading converges to te equilibrium. Similarly, we can define τ wit respect to anoter group of copulas {C, C v, v V}. We want to compare τ and τ wit respect to te relation between {C, C v, v V} and {C, C v, v V}. 19
20 β + α2 Proposition 7 Under te conditions of Proposition 6, namely ρa < so tat system 4 as a unique γβ equilibrium and C C v u1,..., u degv, u0 C C v u1,..., u degv, u0 for all v V, we ave i if 1 β i, ten τ τ ; ii if 1 β i +, ten τ τ, were i + def = max v V i + v, i and i + v are defined in Proposition 1. Proof According to Proposition 1, we know tat i i v i + β, wic implies β 1 i 1 i β. According v 1 i + to Eq. 17, τ is decreasing in max v V 1 β 1 i. Terefore, τ is decreasing in i v wen 1 β i, and increasing v in i v wen 1 β i +. By Proposition 6, we get te desired results. In order to draw insigts wile simplifying te discussion, let τ x,y denote te τ as defined in Eq. 17 wit respect to dependence structures x, y. Te cyber security implication of Proposition 7 is: First, under some circumstances, te stronger te dependences between te cyber attacks, te more restrictive te epidemic equilibrium tresold. More specifically, under te condition 1 β i, we ave for all v V: τ nd,y τ ind,y τ pd,y and τ x,nd τ x,ind τ x,pd. Tis means tat under te above circumstances, assuming away te positive dependences between te attacks will lead to incorrect epidemic equilibrium tresold, and assuming away te negative dependences between te make te epidemic equilibrium tresold unnecessarily restrictive. Tis furter igligts te value for te defender to render te dependences negative, provided tat 1 β i. Second, under certain oter circumstances, te stronger te dependences, te less restrictive te epidemic equilibrium tresold. More specifically, under te condition 1 β i +, we ave τ nd,y τ ind,y τ pd,y and τ x,nd τ x,ind τ x,pd. Tis means tat assuming away te negative dependences between te attacks will lead to incorrect epidemic equilibrium tresold, and assuming away te positive dependences will make te epidemic equilibrium tresold unnecessarily restrictive. Moreover, wile rendering te dependences negative can lead to smaller equilibrium infection probabilities, it imposes a very restrictive epidemic equilibrium tresold wen 1 β i +. Tis means tat wen applying te above insigts to guide practice, te defender must be aware of te parameter regions corresponding to te cyber security posture. Numerical examples. In order to illustrate te above analytic results, we consider te example of star network wit N = 11 nodes. We assume tat te dependence between te pus-based and te pull-based attacks can be captured by te Gaussian copula C wit parameter σ and te dependence between te pus-based attacks launced from te leaves against te ub can be captured by copula C v, wic is te Clayton copula wit parameter θ. Tese two copulas are reviewed in Section 2. We consider two sets of parameters α, β, γ = 0.2, 0.5, 0.05 and α, β, γ = 0.4, 0.7, From Eqs. 11 and 12, we can compute te equilibrium infection probabilities i for te ub and i l for te leaves, and te tresold τ as defined in 17. Note tat te copulas are increasing in teir parameters in te concordance order. By Proposition 6, bot i and i l are decreasing in θ σ given σ θ, as confirmed by Tables 1-2. Note tat for star networks, te condition 1 β i + in Proposition 7 can be relaxed as 1 β i +, were i + is defined in Proposition 3. Wen α, β, γ = 0.2, 0.5, 0.05, it is easy to verify 1 β i +, meaning tat τ is decreasing in θ σ for fixed σ θ. Tis is confirmed in Table 1. Wen α, β, γ = 0.4, 0.7, 0.05, te condition 1 β i in Proposition 7 is satisfied, meaning tat τ is increasing in θ σ for fixed σ θ. Tis is confirmed in Table 2. Tese examples also confirm te conclusion i i l given by Proposition 2. 20
The EOQ Inventory Formula
Te EOQ Inventory Formula James M. Cargal Matematics Department Troy University Montgomery Campus A basic problem for businesses and manufacturers is, wen ordering supplies, to determine wat quantity of
More informationDistances in random graphs with infinite mean degrees
Distances in random graps wit infinite mean degrees Henri van den Esker, Remco van der Hofstad, Gerard Hoogiemstra and Dmitri Znamenski April 26, 2005 Abstract We study random graps wit an i.i.d. degree
More informationVerifying Numerical Convergence Rates
1 Order of accuracy Verifying Numerical Convergence Rates We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, suc as te grid size or time step, and
More information2 Limits and Derivatives
2 Limits and Derivatives 2.7 Tangent Lines, Velocity, and Derivatives A tangent line to a circle is a line tat intersects te circle at exactly one point. We would like to take tis idea of tangent line
More informationFINITE DIFFERENCE METHODS
FINITE DIFFERENCE METHODS LONG CHEN Te best known metods, finite difference, consists of replacing eac derivative by a difference quotient in te classic formulation. It is simple to code and economic to
More informationCan a Lump-Sum Transfer Make Everyone Enjoy the Gains. from Free Trade?
Can a Lump-Sum Transfer Make Everyone Enjoy te Gains from Free Trade? Yasukazu Icino Department of Economics, Konan University June 30, 2010 Abstract I examine lump-sum transfer rules to redistribute te
More informationTangent Lines and Rates of Change
Tangent Lines and Rates of Cange 9-2-2005 Given a function y = f(x), ow do you find te slope of te tangent line to te grap at te point P(a, f(a))? (I m tinking of te tangent line as a line tat just skims
More informationCHAPTER 7. Di erentiation
CHAPTER 7 Di erentiation 1. Te Derivative at a Point Definition 7.1. Let f be a function defined on a neigborood of x 0. f is di erentiable at x 0, if te following it exists: f 0 fx 0 + ) fx 0 ) x 0 )=.
More informationUnemployment insurance/severance payments and informality in developing countries
Unemployment insurance/severance payments and informality in developing countries David Bardey y and Fernando Jaramillo z First version: September 2011. Tis version: November 2011. Abstract We analyze
More informationAn inquiry into the multiplier process in IS-LM model
An inquiry into te multiplier process in IS-LM model Autor: Li ziran Address: Li ziran, Room 409, Building 38#, Peing University, Beijing 00.87,PRC. Pone: (86) 00-62763074 Internet Address: jefferson@water.pu.edu.cn
More informationPre-trial Settlement with Imperfect Private Monitoring
Pre-trial Settlement wit Imperfect Private Monitoring Mostafa Beskar University of New Hampsire Jee-Hyeong Park y Seoul National University July 2011 Incomplete, Do Not Circulate Abstract We model pretrial
More informationDerivatives Math 120 Calculus I D Joyce, Fall 2013
Derivatives Mat 20 Calculus I D Joyce, Fall 203 Since we ave a good understanding of its, we can develop derivatives very quickly. Recall tat we defined te derivative f x of a function f at x to be te
More informationSAMPLE DESIGN FOR THE TERRORISM RISK INSURANCE PROGRAM SURVEY
ASA Section on Survey Researc Metods SAMPLE DESIG FOR TE TERRORISM RISK ISURACE PROGRAM SURVEY G. ussain Coudry, Westat; Mats yfjäll, Statisticon; and Marianne Winglee, Westat G. ussain Coudry, Westat,
More informationON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE
ON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE Byeong U. Park 1 and Young Kyung Lee 2 Department of Statistics, Seoul National University, Seoul, Korea Tae Yoon Kim 3 and Ceolyong Park
More informationInstantaneous Rate of Change:
Instantaneous Rate of Cange: Last section we discovered tat te average rate of cange in F(x) can also be interpreted as te slope of a scant line. Te average rate of cange involves te cange in F(x) over
More informationComparison between two approaches to overload control in a Real Server: local or hybrid solutions?
Comparison between two approaces to overload control in a Real Server: local or ybrid solutions? S. Montagna and M. Pignolo Researc and Development Italtel S.p.A. Settimo Milanese, ITALY Abstract Tis wor
More informationThe modelling of business rules for dashboard reporting using mutual information
8 t World IMACS / MODSIM Congress, Cairns, Australia 3-7 July 2009 ttp://mssanz.org.au/modsim09 Te modelling of business rules for dasboard reporting using mutual information Gregory Calbert Command, Control,
More informationComputer Science and Engineering, UCSD October 7, 1999 Goldreic-Levin Teorem Autor: Bellare Te Goldreic-Levin Teorem 1 Te problem We æx a an integer n for te lengt of te strings involved. If a is an n-bit
More informationStrategic trading and welfare in a dynamic market. Dimitri Vayanos
LSE Researc Online Article (refereed) Strategic trading and welfare in a dynamic market Dimitri Vayanos LSE as developed LSE Researc Online so tat users may access researc output of te Scool. Copyrigt
More informationStrategic trading in a dynamic noisy market. Dimitri Vayanos
LSE Researc Online Article (refereed) Strategic trading in a dynamic noisy market Dimitri Vayanos LSE as developed LSE Researc Online so tat users may access researc output of te Scool. Copyrigt and Moral
More informationIn other words the graph of the polynomial should pass through the points
Capter 3 Interpolation Interpolation is te problem of fitting a smoot curve troug a given set of points, generally as te grap of a function. It is useful at least in data analysis (interpolation is a form
More informationHow To Ensure That An Eac Edge Program Is Successful
Introduction Te Economic Diversification and Growt Enterprises Act became effective on 1 January 1995. Te creation of tis Act was to encourage new businesses to start or expand in Newfoundland and Labrador.
More informationLecture 10: What is a Function, definition, piecewise defined functions, difference quotient, domain of a function
Lecture 10: Wat is a Function, definition, piecewise defined functions, difference quotient, domain of a function A function arises wen one quantity depends on anoter. Many everyday relationsips between
More informationSchedulability Analysis under Graph Routing in WirelessHART Networks
Scedulability Analysis under Grap Routing in WirelessHART Networks Abusayeed Saifulla, Dolvara Gunatilaka, Paras Tiwari, Mo Sa, Cenyang Lu, Bo Li Cengjie Wu, and Yixin Cen Department of Computer Science,
More informationImproved dynamic programs for some batcing problems involving te maximum lateness criterion A P M Wagelmans Econometric Institute Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam Te Neterlands
More informationSection 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations
Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of
More informationOptimized Data Indexing Algorithms for OLAP Systems
Database Systems Journal vol. I, no. 2/200 7 Optimized Data Indexing Algoritms for OLAP Systems Lucian BORNAZ Faculty of Cybernetics, Statistics and Economic Informatics Academy of Economic Studies, Bucarest
More informationBonferroni-Based Size-Correction for Nonstandard Testing Problems
Bonferroni-Based Size-Correction for Nonstandard Testing Problems Adam McCloskey Brown University October 2011; Tis Version: October 2012 Abstract We develop powerful new size-correction procedures for
More informationf(a + h) f(a) f (a) = lim
Lecture 7 : Derivative AS a Function In te previous section we defined te derivative of a function f at a number a (wen te function f is defined in an open interval containing a) to be f (a) 0 f(a + )
More informationMath 113 HW #5 Solutions
Mat 3 HW #5 Solutions. Exercise.5.6. Suppose f is continuous on [, 5] and te only solutions of te equation f(x) = 6 are x = and x =. If f() = 8, explain wy f(3) > 6. Answer: Suppose we ad tat f(3) 6. Ten
More informationReferendum-led Immigration Policy in the Welfare State
Referendum-led Immigration Policy in te Welfare State YUJI TAMURA Department of Economics, University of Warwick, UK First version: 12 December 2003 Updated: 16 Marc 2004 Abstract Preferences of eterogeneous
More informationOPTIMAL DISCONTINUOUS GALERKIN METHODS FOR THE ACOUSTIC WAVE EQUATION IN HIGHER DIMENSIONS
OPTIMAL DISCONTINUOUS GALERKIN METHODS FOR THE ACOUSTIC WAVE EQUATION IN HIGHER DIMENSIONS ERIC T. CHUNG AND BJÖRN ENGQUIST Abstract. In tis paper, we developed and analyzed a new class of discontinuous
More informationMATHEMATICS FOR ENGINEERING DIFFERENTIATION TUTORIAL 1 - BASIC DIFFERENTIATION
MATHEMATICS FOR ENGINEERING DIFFERENTIATION TUTORIAL 1 - BASIC DIFFERENTIATION Tis tutorial is essential pre-requisite material for anyone stuing mecanical engineering. Tis tutorial uses te principle of
More informationCollege Planning Using Cash Value Life Insurance
College Planning Using Cas Value Life Insurance CAUTION: Te advisor is urged to be extremely cautious of anoter college funding veicle wic provides a guaranteed return of premium immediately if funded
More informationNote nine: Linear programming CSE 101. 1 Linear constraints and objective functions. 1.1 Introductory example. Copyright c Sanjoy Dasgupta 1
Copyrigt c Sanjoy Dasgupta Figure. (a) Te feasible region for a linear program wit two variables (see tet for details). (b) Contour lines of te objective function: for different values of (profit). Te
More informationPretrial Settlement with Imperfect Private Monitoring
Pretrial Settlement wit Imperfect Private Monitoring Mostafa Beskar Indiana University Jee-Hyeong Park y Seoul National University April, 2016 Extremely Preliminary; Please Do Not Circulate. Abstract We
More informationGeometric Stratification of Accounting Data
Stratification of Accounting Data Patricia Gunning * Jane Mary Horgan ** William Yancey *** Abstract: We suggest a new procedure for defining te boundaries of te strata in igly skewed populations, usual
More informationCHAPTER 8: DIFFERENTIAL CALCULUS
CHAPTER 8: DIFFERENTIAL CALCULUS 1. Rules of Differentiation As we ave seen, calculating erivatives from first principles can be laborious an ifficult even for some relatively simple functions. It is clearly
More informationTheoretical calculation of the heat capacity
eoretical calculation of te eat capacity Principle of equipartition of energy Heat capacity of ideal and real gases Heat capacity of solids: Dulong-Petit, Einstein, Debye models Heat capacity of metals
More informationWelfare, financial innovation and self insurance in dynamic incomplete markets models
Welfare, financial innovation and self insurance in dynamic incomplete markets models Paul Willen Department of Economics Princeton University First version: April 998 Tis version: July 999 Abstract We
More informationTRADING AWAY WIDE BRANDS FOR CHEAP BRANDS. Swati Dhingra London School of Economics and CEP. Online Appendix
TRADING AWAY WIDE BRANDS FOR CHEAP BRANDS Swati Dingra London Scool of Economics and CEP Online Appendix APPENDIX A. THEORETICAL & EMPIRICAL RESULTS A.1. CES and Logit Preferences: Invariance of Innovation
More informationSolutions by: KARATUĞ OZAN BiRCAN. PROBLEM 1 (20 points): Let D be a region, i.e., an open connected set in
KOÇ UNIVERSITY, SPRING 2014 MATH 401, MIDTERM-1, MARCH 3 Instructor: BURAK OZBAGCI TIME: 75 Minutes Solutions by: KARATUĞ OZAN BiRCAN PROBLEM 1 (20 points): Let D be a region, i.e., an open connected set
More information2.23 Gambling Rehabilitation Services. Introduction
2.23 Gambling Reabilitation Services Introduction Figure 1 Since 1995 provincial revenues from gambling activities ave increased over 56% from $69.2 million in 1995 to $108 million in 2004. Te majority
More informationMultivariate time series analysis: Some essential notions
Capter 2 Multivariate time series analysis: Some essential notions An overview of a modeling and learning framework for multivariate time series was presented in Capter 1. In tis capter, some notions on
More informationStaffing and routing in a two-tier call centre. Sameer Hasija*, Edieal J. Pinker and Robert A. Shumsky
8 Int. J. Operational Researc, Vol. 1, Nos. 1/, 005 Staffing and routing in a two-tier call centre Sameer Hasija*, Edieal J. Pinker and Robert A. Sumsky Simon Scool, University of Rocester, Rocester 1467,
More informationACT Math Facts & Formulas
Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationals: fractions, tat is, anyting expressable as a ratio of integers Reals: integers plus rationals plus special numbers suc as
More informationEquilibria in sequential bargaining games as solutions to systems of equations
Economics Letters 84 (2004) 407 411 www.elsevier.com/locate/econbase Equilibria in sequential bargaining games as solutions to systems of equations Tasos Kalandrakis* Department of Political Science, Yale
More information- 1 - Handout #22 May 23, 2012 Huffman Encoding and Data Compression. CS106B Spring 2012. Handout by Julie Zelenski with minor edits by Keith Schwarz
CS106B Spring 01 Handout # May 3, 01 Huffman Encoding and Data Compression Handout by Julie Zelenski wit minor edits by Keit Scwarz In te early 1980s, personal computers ad ard disks tat were no larger
More informationWriting Mathematics Papers
Writing Matematics Papers Tis essay is intended to elp your senior conference paper. It is a somewat astily produced amalgam of advice I ave given to students in my PDCs (Mat 4 and Mat 9), so it s not
More informationM(0) = 1 M(1) = 2 M(h) = M(h 1) + M(h 2) + 1 (h > 1)
Insertion and Deletion in VL Trees Submitted in Partial Fulfillment of te Requirements for Dr. Eric Kaltofen s 66621: nalysis of lgoritms by Robert McCloskey December 14, 1984 1 ackground ccording to Knut
More informationTo motivate the notion of a variogram for a covariance stationary process, { Ys ( ): s R}
4. Variograms Te covariogram and its normalized form, te correlogram, are by far te most intuitive metods for summarizing te structure of spatial dependencies in a covariance stationary process. However,
More informationProjective Geometry. Projective Geometry
Euclidean versus Euclidean geometry describes sapes as tey are Properties of objects tat are uncanged by rigid motions» Lengts» Angles» Parallelism Projective geometry describes objects as tey appear Lengts,
More informationResearch on the Anti-perspective Correction Algorithm of QR Barcode
Researc on te Anti-perspective Correction Algoritm of QR Barcode Jianua Li, Yi-Wen Wang, YiJun Wang,Yi Cen, Guoceng Wang Key Laboratory of Electronic Tin Films and Integrated Devices University of Electronic
More informationArea-Specific Recreation Use Estimation Using the National Visitor Use Monitoring Program Data
United States Department of Agriculture Forest Service Pacific Nortwest Researc Station Researc Note PNW-RN-557 July 2007 Area-Specific Recreation Use Estimation Using te National Visitor Use Monitoring
More informationSAT Math Must-Know Facts & Formulas
SAT Mat Must-Know Facts & Formuas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationas: fractions, tat is, anyting expressabe as a ratio of integers Reas: integers pus rationas
More informationFor Sale By Owner Program. We can help with our for sale by owner kit that includes:
Dawn Coen Broker/Owner For Sale By Owner Program If you want to sell your ome By Owner wy not:: For Sale Dawn Coen Broker/Owner YOUR NAME YOUR PHONE # Look as professional as possible Be totally prepared
More informationMultigrid computational methods are
M ULTIGRID C OMPUTING Wy Multigrid Metods Are So Efficient Originally introduced as a way to numerically solve elliptic boundary-value problems, multigrid metods, and teir various multiscale descendants,
More informationFree Shipping and Repeat Buying on the Internet: Theory and Evidence
Free Sipping and Repeat Buying on te Internet: eory and Evidence Yingui Yang, Skander Essegaier and David R. Bell 1 June 13, 2005 1 Graduate Scool of Management, University of California at Davis (yiyang@ucdavis.edu)
More informationf(x) f(a) x a Our intuition tells us that the slope of the tangent line to the curve at the point P is m P Q =
Lecture 6 : Derivatives and Rates of Cange In tis section we return to te problem of finding te equation of a tangent line to a curve, y f(x) If P (a, f(a)) is a point on te curve y f(x) and Q(x, f(x))
More informationTraining Robust Support Vector Regression via D. C. Program
Journal of Information & Computational Science 7: 12 (2010) 2385 2394 Available at ttp://www.joics.com Training Robust Support Vector Regression via D. C. Program Kuaini Wang, Ping Zong, Yaoong Zao College
More informationTHE IMPACT OF INTERLINKED INDEX INSURANCE AND CREDIT CONTRACTS ON FINANCIAL MARKET DEEPENING AND SMALL FARM PRODUCTIVITY
THE IMPACT OF INTERLINKED INDEX INSURANCE AND CREDIT CONTRACTS ON FINANCIAL MARKET DEEPENING AND SMALL FARM PRODUCTIVITY Micael R. Carter Lan Ceng Alexander Sarris University of California, Davis University
More informationSAT Subject Math Level 1 Facts & Formulas
Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reals: integers plus fractions, decimals, and irrationals ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences: PEMDAS (Parenteses
More informationA system to monitor the quality of automated coding of textual answers to open questions
Researc in Official Statistics Number 2/2001 A system to monitor te quality of automated coding of textual answers to open questions Stefania Maccia * and Marcello D Orazio ** Italian National Statistical
More informationGlobal Sourcing of Complex Production Processes
Global Sourcing of Complex Production Processes December 2013 Cristian Scwarz Jens Suedekum Abstract We develop a teory of a firm in an incomplete contracts environment wic decides on te complexity, te
More informationFINANCIAL SECTOR INEFFICIENCIES AND THE DEBT LAFFER CURVE
INTERNATIONAL JOURNAL OF FINANCE AND ECONOMICS Int. J. Fin. Econ. 10: 1 13 (2005) Publised online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/ijfe.251 FINANCIAL SECTOR INEFFICIENCIES
More informationOn a Satellite Coverage
I. INTRODUCTION On a Satellite Coverage Problem DANNY T. CHI Kodak Berkeley Researc Yu T. su National Ciao Tbng University Te eart coverage area for a satellite in an Eart syncronous orbit wit a nonzero
More informationOn Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Saring Scemes Based on General Access Structure (Corrected Version) Ventzislav Nikov 1, Svetla Nikova 2, Bart
More informationMathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
More informationf(x + h) f(x) h as representing the slope of a secant line. As h goes to 0, the slope of the secant line approaches the slope of the tangent line.
Derivative of f(z) Dr. E. Jacobs Te erivative of a function is efine as a limit: f (x) 0 f(x + ) f(x) We can visualize te expression f(x+) f(x) as representing te slope of a secant line. As goes to 0,
More information2.1: The Derivative and the Tangent Line Problem
.1.1.1: Te Derivative and te Tangent Line Problem Wat is te deinition o a tangent line to a curve? To answer te diiculty in writing a clear deinition o a tangent line, we can deine it as te iting position
More information1.6. Analyse Optimum Volume and Surface Area. Maximum Volume for a Given Surface Area. Example 1. Solution
1.6 Analyse Optimum Volume and Surface Area Estimation and oter informal metods of optimizing measures suc as surface area and volume often lead to reasonable solutions suc as te design of te tent in tis
More informationCompute the derivative by definition: The four step procedure
Compute te derivative by definition: Te four step procedure Given a function f(x), te definition of f (x), te derivative of f(x), is lim 0 f(x + ) f(x), provided te limit exists Te derivative function
More informationTis Problem and Retail Inventory Management
Optimizing Inventory Replenisment of Retail Fasion Products Marsall Fiser Kumar Rajaram Anant Raman Te Warton Scool, University of Pennsylvania, 3620 Locust Walk, 3207 SH-DH, Piladelpia, Pennsylvania 19104-6366
More informationThe Dynamics of Movie Purchase and Rental Decisions: Customer Relationship Implications to Movie Studios
Te Dynamics of Movie Purcase and Rental Decisions: Customer Relationsip Implications to Movie Studios Eddie Ree Associate Professor Business Administration Stoneill College 320 Wasington St Easton, MA
More informationChannel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks
Cannel Allocation in Non-Cooperative Multi-Radio Multi-Cannel Wireless Networks Dejun Yang, Xi Fang, Guoliang Xue Arizona State University Abstract Wile tremendous efforts ave been made on cannel allocation
More informationGovernment Debt and Optimal Monetary and Fiscal Policy
Government Debt and Optimal Monetary and Fiscal Policy Klaus Adam Manneim University and CEPR - preliminary version - June 7, 21 Abstract How do di erent levels of government debt a ect te optimal conduct
More informationSimultaneous Location of Trauma Centers and Helicopters for Emergency Medical Service Planning
Simultaneous Location of Trauma Centers and Helicopters for Emergency Medical Service Planning Soo-Haeng Co Hoon Jang Taesik Lee Jon Turner Tepper Scool of Business, Carnegie Mellon University, Pittsburg,
More informationChapter 7 Numerical Differentiation and Integration
45 We ave a abit in writing articles publised in scientiþc journals to make te work as Þnised as possible, to cover up all te tracks, to not worry about te blind alleys or describe ow you ad te wrong idea
More informationA strong credit score can help you score a lower rate on a mortgage
NET GAIN Scoring points for your financial future AS SEEN IN USA TODAY S MONEY SECTION, JULY 3, 2007 A strong credit score can elp you score a lower rate on a mortgage By Sandra Block Sales of existing
More informationA Multigrid Tutorial part two
A Multigrid Tutorial part two William L. Briggs Department of Matematics University of Colorado at Denver Van Emden Henson Center for Applied Scientific Computing Lawrence Livermore National Laboratory
More informationWorking Capital 2013 UK plc s unproductive 69 billion
2013 Executive summary 2. Te level of excess working capital increased 3. UK sectors acieve a mixed performance 4. Size matters in te supply cain 6. Not all companies are overflowing wit cas 8. Excess
More informationWhat is Advanced Corporate Finance? What is finance? What is Corporate Finance? Deciding how to optimally manage a firm s assets and liabilities.
Wat is? Spring 2008 Note: Slides are on te web Wat is finance? Deciding ow to optimally manage a firm s assets and liabilities. Managing te costs and benefits associated wit te timing of cas in- and outflows
More informationDetermine the perimeter of a triangle using algebra Find the area of a triangle using the formula
Student Name: Date: Contact Person Name: Pone Number: Lesson 0 Perimeter, Area, and Similarity of Triangles Objectives Determine te perimeter of a triangle using algebra Find te area of a triangle using
More informationDesign and Analysis of a Fault-Tolerant Mechanism for a Server-Less Video-On-Demand System
Design and Analysis of a Fault-olerant Mecanism for a Server-Less Video-On-Demand System Jack Y. B. Lee Department of Information Engineering e Cinese University of Hong Kong Satin, N.., Hong Kong Email:
More information2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
More informationAnalyzing the Effects of Insuring Health Risks:
Analyzing te Effects of Insuring Healt Risks: On te Trade-off between Sort Run Insurance Benefits vs. Long Run Incentive Costs Harold L. Cole University of Pennsylvania and NBER Soojin Kim University of
More informationHeterogeneous firms and trade costs: a reading of French access to European agrofood
Heterogeneous firms and trade costs: a reading of Frenc access to European agrofood markets Cevassus-Lozza E., Latouce K. INRA, UR 34, F-44000 Nantes, France Abstract Tis article offers a new reading of
More informationAverage and Instantaneous Rates of Change: The Derivative
9.3 verage and Instantaneous Rates of Cange: Te Derivative 609 OBJECTIVES 9.3 To define and find average rates of cange To define te derivative as a rate of cange To use te definition of derivative to
More informationCatalogue no. 12-001-XIE. Survey Methodology. December 2004
Catalogue no. 1-001-XIE Survey Metodology December 004 How to obtain more information Specific inquiries about tis product and related statistics or services sould be directed to: Business Survey Metods
More informationDynamic Competitive Insurance
Dynamic Competitive Insurance Vitor Farina Luz June 26, 205 Abstract I analyze long-term contracting in insurance markets wit asymmetric information and a finite or infinite orizon. Risk neutral firms
More informationAsymmetric Trade Liberalizations and Current Account Dynamics
Asymmetric Trade Liberalizations and Current Account Dynamics Alessandro Barattieri January 15, 2015 Abstract Te current account deficits of Spain, Portugal and Greece are te result of large deficits in
More information100 Austrian Journal of Statistics, Vol. 32 (2003), No. 1&2, 99-129
AUSTRIAN JOURNAL OF STATISTICS Volume 3 003, Number 1&, 99 19 Adaptive Regression on te Real Line in Classes of Smoot Functions L.M. Artiles and B.Y. Levit Eurandom, Eindoven, te Neterlands Queen s University,
More informationGuide to Cover Letters & Thank You Letters
Guide to Cover Letters & Tank You Letters 206 Strebel Student Center (315) 792-3087 Fax (315) 792-3370 TIPS FOR WRITING A PERFECT COVER LETTER Te resume never travels alone. Eac time you submit your resume
More informationHuman Capital, Asset Allocation, and Life Insurance
Human Capital, Asset Allocation, and Life Insurance By: P. Cen, R. Ibbotson, M. Milevsky and K. Zu Version: February 25, 2005 Note: A Revised version of tis paper is fortcoming in te Financial Analysts
More informationYale ICF Working Paper No. 05-11 May 2005
Yale ICF Working Paper No. 05-11 May 2005 HUMAN CAPITAL, AET ALLOCATION, AND LIFE INURANCE Roger G. Ibbotson, Yale cool of Management, Yale University Peng Cen, Ibbotson Associates Mose Milevsky, culic
More informationDEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES
DEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES Sara Brown, University of Leicester, UK Karl Taylor, University of Leicester, UK
More informationLecture 13 Linear quadratic Lyapunov theory
EE363 Winter 28-9 Lecture 13 Linear quadratic Lyapunov theory the Lyapunov equation Lyapunov stability conditions the Lyapunov operator and integral evaluating quadratic integrals analysis of ARE discrete-time
More informationChapter 11. Limits and an Introduction to Calculus. Selected Applications
Capter Limits and an Introduction to Calculus. Introduction to Limits. Tecniques for Evaluating Limits. Te Tangent Line Problem. Limits at Infinit and Limits of Sequences.5 Te Area Problem Selected Applications
More informationJournal of Development Economics
Journal of Development Economics 99 (2012) 92 104 Contents lists available at SciVerse ScienceDirect Journal of Development Economics journal omepage: www.elsevier.com/locate/devec Investor protection
More information3. Reaction Diffusion Equations Consider the following ODE model for population growth
3. Reaction Diffusion Equations Consider the following ODE model for population growth u t a u t u t, u 0 u 0 where u t denotes the population size at time t, and a u plays the role of the population dependent
More information