Improving Network Security Through Insurance A Tale of Cyber-Insurance Markets

Size: px
Start display at page:

Download "Improving Network Security Through Insurance A Tale of Cyber-Insurance Markets"

Transcription

1 Improving Network Security Through Insurance A Tale of Cyber-Insurance Markets Ranjan Pal Department of Computer Science University of Southern California PhD Advisors - Leana Golubchik and Konstantinos Psounis Jointly with Electrical Engineering and Computer Science University of Southern California Collaborator - Pan Hui (Hong Kong University of Science and Technology, T-Labs, Berlin) PhD Defense Talk, USC, 27 th May,

2 Research Focus Cyber-Security Network and Mobile Security Web Security Information Security Security Tools crytography formal logic software and hardware techniques measurements and machine learning game theory and mechanism design economics and social sciences 2

3 Can We Achieve Robust Security? Robust Internet security is currently not a reality [AM 09] 9% 13% 25% 39% 78% 36% A few primary reasons Anti-virus adoption A major population of network users are naive and are not aware of using existing security tools to their full potential Technical solutions not fool-proof (band-aid effect) Economics and policy related factors Anti-spam adoption Data courtesy: Symantec and Steganos,

4 Enter Insurance In real-world we have insurance schemes to manage risks related to cars, health, etc., Basic Principle Pay premiums/month and get covered when faced with a risk 4

5 How about Cyber-Insurance? Similar to popular in-practice insurances, we could also have cyber-insurance Use cyber-insurance to (i) mitigate risk (ii) make cyber space more robust [AM 08] 5

6 The Security Players Government Interests: to ensure a secure cyber-space Cyber-Insurer Interests: to make profits and ensure network robustness The Insured Interests: to remain safe and recover losses Security Product Vendors The Networking Infrastructure Interests: to remain robust Interests: to increase demand of products and make profits 6

7 A Cyber-Insurance Market An insurance-driven security eco-system involved parties (stakeholders) have useful exchanges of their interests potentially leading to a situation of market being in equilibrium (optimal exchange of interests) 7

8 Important Economics and Insurance Concepts Equilibrium Existence Market Efficiency Externality Adverse Selection Moral Hazard 8

9 Challenges in the Network Domain when, where, and why? interdependent and correlated risks non-transparency of loss information Can the insurers and the insured be jointly satisfied? i.e., Is there a market for cyber-insurance? 9

10 Related Work Question - Do Efficient Cyber-Insurance Markets Exist? Network and Insurance Settings Ideal Insurance Conditions Non-ideal Insurance Conditions Modeled Network (topology and externality) [LB 09] (restricted markets, no efficiency) [PG 10] (restricted markets, efficiency under cooperation) [PGPH 13, PGPH 14] (efficiency achieved) YL 12 (efficiency on good software quality) 10 Did not Model Network [PGP 10] (non-insurable risks, no efficiency) [SSFW 09]-restricted markets, no efficiency), [P 12] (restricted markets, no efficiency)

11 Talk Outline Existence of cyber-insurance markets Efficiency of cyber-insurance markets Realizing cyber-insurance markets in practice 11

12 Part 1 On the Existence of Cyber-Insurance Markets 12

13 Research Contribution Questions we are interested in Does there exist cyber-insurance markets under our proposed model? Are the markets efficient? Can we make all stakeholders happy? 13 Our Contribution We propose, study, and compare the following market scenarios to answer our questions (i) No insurance markets (ii) perfectly competitive markets selling insurance (iii) oligopolistic markets selling insurance (iv) monopoly markets selling insurance [PGPH 14]

14 Supply-Side Model Risk-averse cyber-insurer/s (single or multiple) could be ISP, security vendor, cloud provider, or any other third party Insurer provides clients (network users) with full coverage, [SV, 07, L 04] User premium - (1 + )E(R), 0 Compulsory insurance - regulator s tool required for the sake of increasing cyber-security [NYT, November, 2012] can be done via bundling of Internet contracts 14

15 Demand-Side Model (1/2) Network (primarily overlay) of risk-averse users A user i is subject to a risk of size r<w 0 Each user possess a concave utility function U(.) function of final wealth of a user strictly increasing, twice continuously differentiable Each user either invests nothing or an amount xi, self-defense (security) investments - anti-virus, firewalls, etc., Each user does not completely avoid possible loss on self-defense 15

16 Demand-Side Model (2/2) Users face direct as well as indirect losses direct losses - user i gets attacked by a direct threat and not by a propagated threat p i d(x i )=0 p i d(0) = p d indirect losses - user i gets attacked by a propagated threat originating at some other user probability of being affected by threats p i (X i,x)=p i d(x i )+q(l(x)) p i d(x i )q(l(x)) probability of being affected by indirect threat x - cost of investment to a user indifferent between investing and not investing x = f( x,g, a ) 16

17 No Insurance Scenario A user takes his decision to invest based on a utility comparison analysis A user invests in self-defense when utility on prevention greater than that without it E[U ndef (x)] = p d U(w 0 r) + (1 p d )Q Expected utility without prevention Expected utility with prevention Utility on facing direct risk only utility on facing indirect risk only Q = q(x)u(w 0 r) + (1 q(x))u(w 0 ) utility on facing indirect risk utility on facing no risk E[U def (x)] = q(x)u(w 0 x r) + (1 q(x))u(w 0 x) At market equilibrium evaluate x, i.e., the equilibrium cost to invest in self-defense 17

18 Insurance Scenario A user invests only if utility on prevention greater than that without it Full coverage E[U ndef (x)] = p d U(w 0 r + r p(0,x) r)+(1 p d )Q Expected utility without prevention Utility on facing direct risk only Utility on facing indirect risk only coverage not required Q = q(x)u(w 0 r + r p(0,x) r)+(1 q(x))u(w 0 p(0,x) r) utility on facing indirect risk utility on facing no risk At market equilibrium evaluate x E[U def (x)] = p d U(w 0 x q(x) r) Expected utility with prevention 18

19 Social Welfare Maximization Case of No Insurance and Competitive Insurance SW(x) = Z x 0 E[U def (l(x, y)]f(y)dy + E[U ndef (l(x)]l(x) net utility of investing users net utility of non-investing users Case of Monopoly Insurance SW(x) = Z 1 Z x 0 0 E[U def (l(x, y)]f(y)dyd net utility of investing users + E[U ndef (l(x)]l(x) net utility of non-investing users Social welfare maximization at equilibrium implies market efficiency 19

20 Competitive Insurance Scenario perfectly competitive insurance drives insurer profits to zero and results in fair premiums too many buyers (insureds) and sellers (insurers) in the market for any seller to charge unfair premiums to clients - will result in it having zero demand a user invests only if utility on prevention greater than that without it Expected utility without prevention Expected utility with prevention Full coverage E[U ndef (x)] = p d U(w 0 r + r p(0,x) r)+(1 p d )Q at equilibrium (Walrasian) evaluate x Utility on facing direct risk only utility on facing indirect risk E[U def (x)] = p d U(w 0 x q(x) r) 20 Utility on facing indirect risk only Q = q(x)u(w 0 r + r p(0,x) r)+(1 q(x))u(w 0 p(0,x) r) utility on facing no risk coverage not required

21 Oligopolistic Insurance Scenario Consider now that there are enough firms in market for each to be price-setting each seller can control and set the premiums of its customers We have a Bertrand game of premiums between cyber-insurers [MWG] Joseph Bertrand The NE of the game behaves exactly as the competitive equilibrium, i.e., fair premiums are provided to clients; insurers make zero profits [MWG] The well known Bertrand Paradox arises for number of firms equal to two Will cyber-insurers really make zero profits under competition?? No In practice there are some differences between firms w.r.t. factors such as reputation to customers, etc., and that allows some insurers to make positive profits by charging unfair premiums to their clients who go for reputation irrespective of price fairness 21

22 Monopoly Insurance Scenario monopoly insurance gives pricing power to the insurer under regulation a user invests only if utility on prevention greater than that without it Expected utility without prevention Full coverage E[U ndef (x)] = p d U(w 0 r + r (1 + )p(0,x) r)+(1 p d )Q Utility on facing direct risk only Utility on facing indirect risk only coverage not required Q = q(x)u(w 0 r + r (1 + )p(0,x) r)+(1 q(x))u(w 0 (1 + )p(0,x) r) utility on facing indirect risk utility on facing no risk Expected utility with prevention E[U def (x)] = p d U(w 0 x (1 + )q(x) r) at market equilibrium evaluate x 22

23 Summary of Results Market Type Equilibrium existence Equilibrium uniqueness Social welfare maximization No Insurance yes yes no Perfectly Competitive yes yes no Oligopolistic Insurance (2 insurers) Oligopolistic Insurance (#insurers > 2) Monopoly Insurance (one insurer) yes yes no yes yes no yes yes no PGPH 14 SSFW 09 23

24 Practical Implications Market Type Cyber-Insurer/s User Product Vendor Regulatory Agency Network No Insurance NA no somewhat yes no no Competitive Insurance Oligopolistic Insurance (two firms) Oligopolistic Insurance (#firms >2) Monopoly Insurance Are Stakeholder Interests Satisfied? no (zero expected profits) yes (full coverage) no (decrease in sales) no (decreased robustness) no (non-optimal SW) no yes no no no yes only when loading factor is positive yes yes Main Result Traditional cyber-insurance markets do not incentivize users to invest in self-defense and result in market failure (inefficiency) no no no no no no 24

25 Part 2 Making Cyber-Insurance Markets Efficient 25

26 Research Contribution Question we are interested in How to ensure social welfare maximization by internalizing all network externalities? Our Contribution We propose two techniques to ensure market efficiency based on premium discrimination (i) premium discrimination under regulation (ii) premium discrimination under non-regulation [PGPH 14, A working paper] 26

27 Ensuring Social Welfare Maximization So is all hope lost for successful (efficient) cyber-insurance markets? NO Users need to internalize network externalities caused by investments of other users Goal: to maximize social welfare in a network at user investment equilibrium Method Basis premium discrimination charge marginally fair premiums E[R] + k fair premium 27

28 Charging Fines/Rebates Protocol Steps Step 1 insurer advertises contracts with fine/rebate values Step 2 Step 3 users decide whether to invest in self-defense based on their cost of security investment and their signed insurance contracts when a claim if filed by a client, insurer checks each client on his investment amounts and allocates appropriate fines/rebates on his contract 28 Assumption a cyber-insurer can observe or stochastically learn the investment amounts of users. P 12 no observations mechanism design approach no efficiency

29 Summary of Results (Contract Discrimination Under Monopoly) Scenario Monopoly Insurance (contract discrimination) Equilibrium existence yes Equilibrium uniqueness Intuition Investment externalities are internalized by network users, users take more responsibility in securing their systems yes Social welfare maximization yes Moral hazard problem is resolved Mechanism Cyber-Insurer User Product Vendor Regulatory Agency Network Fines/Rebates not always yes yes yes yes Cooperation [PG, 10] no (always make zero expected profits) Are Stakeholder Interests Satisfied? yes yes yes yes Main Point: Market exists and is efficient but insurer might make zero expected profit 29

30 Part 3 Realizing Cyber-Insurance Markets in Practice 30

31 The Importance of Security Vendors Cyber-insurance companies are profit minded might make zero expected profit sufficient for them being de-incentivized in the future to form a security ecosystem Security vendors (e.g., Symantec, Microsoft) form an integral component in ecosystem - why? they are manufacturers of self-defense mechanisms nearly every user adopts some amount of self-defense mechanisms SV pricing roles might prove strategic in successful cyber-insurance market formation 31

32 The Alliance Diagram Security Maximum Social Welfare Share of Profits ($$) Cyber- Vendor Privileges & User Information 1. product advertising and lock-in 2. logical network centrality information insurer client lock-in increased profits due to lock-in and informed (externality-driven and differentiated) pricing 32 strictly positive expected profits Security vendor may be the cyber-insurer recovering safety capital costs

33 Research Contribution Questions we are interested in How can SVs price products to make extra profits for the insurance business? How does client network topology play a role in SV pricing? Is the pricing mechanism fair? Our Contribution We propose, study, and compare the following pricing policies adopted by a monopoly SV (i) static heterogenous (differentiated) pricing (ii) static homogenous (uniform pricing) (iii) static binary pricing [PH 12, PH 13, PGPH 13] 33

34 Pricing Model We consider a single regulated security vendor (SV) acting as the cyber-insurer N customers (users) for the SV connected via a logical (overlay) network social engineering attacks spread through logical networks Each user i has his concave utility function u i (monotonically non-decreasing) u i (x i, x i,p i )= i x i utility of user investments i x 2 i + x i X h ij x j h ij - positive externality effect of user j s per unit investment on user i j utility due to externalities p i x i 2 i > X j negative utility due to cost h ij 34

35 Pricing Game SV accounts for strategic user behavior - price set via a two stage game Stage 1 - SV sets price based on user optimal behavior in order to optimize profits max p X i p i x i cx i Stage 2 - a user optimizes his utility by investing amount x in self-defense, based on the price set by the SV. Here each user plays a game with other network users SV accounts for Stage 2 in deriving prices in Stage 1 (Stackelberg) 35

36 Closed Form Results on Equilibrium Prices Theorem 2. The optimal price vector p charged by the SV is given Theorem 2. The optimal price vector p charged by the SV is given Heterogenous Pricing markup discounted by ing by g e of + c T of + c 1 p = +GQ 1 B(G0, Q 1, w0 ) G T Q 1B(G 0, Q 1, w ), 0 ific +GQ B(G, Q, w ) G Q B(G, Q, w ), 2 cour p = 2 (5) 0 urave T (5) 0 G+G c 1 topological where G = and w = T price vector dependent on Bonacich centrality, i.e., user location 0 0 G+G 2 c 1. 2 e G = and w does = not. dix. where 2 2 price discriminate its consumers, In the case when the SV x. In case price when the SVfor does notconsumer) price discriminate its consumers, the the optimal (same every charged per Homogenous Pricing nted the optimal price (same for every consumer) charged per consumer consumer is given by d T 1 is given by + c 1) 11T (Q G) 1 ( p =1 1 (Q. (6) G) ( + c 1 ) T (Q G) p= 2. (6) (2) T (Q G) 2) pricetheorem independentintuition of Bonacichand centrality Implications: The optimal price vector in Theorem Intuition and Implications: The optimal price vector the no price discrimination case is independent of individual nodein her thecentralities, Unique Nash equilibrium duethe to supermodularity of our pricing games - Topkis (1998) whereas in price case the optimal price no price discrimination casediscrimination is independent of individual node ernot centralities, vector depends on the Bonacich centrality of individual users. price The whereas in the price discrimination case the optimal user ot vector intuition behind is thecentrality fact that of users tend to users. invest The in depends onthe theresult Bonacich individual 36

37 Model Setting: Social Engineering Attacks social networks (formed by a preferential attachment (PA) mechanism) random trees (formed by a Poisson mechanism) how to measure influence of a node in a network? centrality metric : Bonacich centrality is similar to PageRank 37

38 Price charged by SV Results: Different Pricing Scenarios Network User # (in increasing order of centrality) ode Plots Result instance for a random PA graph of 100 nodes for (a) Per-Unit SV Prices (left) and (b) Total User Investment when Price Charged by SV Heterogenous Pricing Uniform Pricing Binary Pricing Price Type Topology Profit Increase Fairness DP Random Yes Heterogenous Pricing Yes DP Tree Binary Pricing Uniform Pricing Yes Yes BP Random Yes No BP Tree Yes No UP Random Yes No UP Tree Yes No 38 Total User Investment Total User Investment Heterogenous Pricing Uniform Pricing Binary Pricing Network User # (in increasing order of centrality) =3(right) (PA Grap context of network neutrality DP - Differentiated Pricing BP - Binary Pricing UP - Uniform Pricing Heterogenous Pricing Binary Pricing Uniform Pricing

39 by a SV from its cyber-insurance business for pricing scenarios 1 Profit Ratio Influence Values Influence Values e and 3. The proof of the theorem is in the Appendix. s Theorem Fig. 2: The Node profits, Profit Results: PRatio 0 and Plots P Profit 1, made for (a) by Ratios an= SV3(left), from its (b) cyberinsurance business when the latter does not (does) account for user = 2.5 (middle), and e e investment externalities respectively are given by e e 0.95 < 0.95 T c 1 9 = 0.9 n P = (Q G) 1 c If : ; (7) e d and Ratio Lower 0.75 Ratio Bound Lower Bound Ratio Lower Bound 0 8 Ratio Lower Bound Ratio Obtained Ratio Obtained h Ratio Obtained Ratio Obtained < T Ratio Upper Bound Ratio Upper Bound Ratio Upper Bound Ratio Upper Bound 0.7 a c 1 9 = P = (Q G 0 ) 1 c e : ;, (8) Influence Values Influence 0.7 Values Influence Values Influence Values st Averaged result for 50 random PA graphs of 100 nodes Averaged result for 50 random trees of 100 nodes ots e for. Assuming Fig. (a) 3: 100 = Q3(left), G to Node Profit (b) be positive profit Ratio = increase 2.5 definite, Plots (middle), the bounds for ~25% (a) and (model =1(left), (c) of the based) = (b) 2(right) ratio of =3(middle), [PA Graphs] and (c) profits in these two cases is given by t b. 0 apple we generate 50 PA graphs 2 + min(k) apple P 0 apple 1 for each different P h 1 value 2 + max(k) apple 1,, K = f(g) (9) of µ ranging from special case of tree topolog 0 to 1 in 0.95 steps of 0.1. Each point in a sub-plot in Figure 0.95 y where 1 is of size 100 and 500 nodes P0 - profit R = when Q average of the 50 P 0 network G andexternalities min( ), max( ) are not accounted denote thefor minimum 0.9 P 1 obtained per value of µ (the 0.9 x-axis). k and maximum same manner as we genera Each sub-plot is eigenvalues the average of 50 of their arguments respectively, and graphs for a particular value of, i.e., based on influence va e P the scale-free Kequals - profit when RR T network +R T R 1 externalities exponent parameter for. are accounted for 4 PA graphs, (in many papers average of 50 instances for also s denoted as ) is known to generally lie between [2, 3], and for to lie in the set {1, 3, 5}. F our l plots Before we choose we explain three values the theorem of Ratio : Lower 2, 2.5, intuitions Boundand 3. For and the its purposes implications, we for all i that Ratio Lower Bound i = G an Profit Ratio Profit Ratio P Profit Ratio Profit Ratio Profit Ratio Profit Ratio 0.6

40 Binary Pricing Heterogenous pricing may not be practical to implement in a large network Given exogenous prices, what subset of clients get the discounted price that maximizes insurer profits? NP-Hard problem (we reduce it from weighted MAX-CUT problem) two node classes (denoting two price classes) nodes - network users edges - f(g) We design a approximation algorithm to find optimal price set that generates maximum profits for the cyber-insurer. model a relaxed version of the problem as a semi-definite programming problem used a randomized approach used by Goemans and Williamson [1995] to bound OPT ratio 40

41 Dissertation Contributions Summary In a non-insurance setting, network security is sub-optimal Cyber-insurance markets are efficient under monopoly with contract discrimination, with insurer making zero profits in expectation Cyber-insurance markets are efficient under monopoly and competition under user cooperation, with insurer making zero profits in expectation Designed heterogenous, homogenous, and binary pricing mechanisms to allow a SV cyber-insurer to make additional profits for its cyber-insurance business The binary pricing problem to be NP-Hard and we designed a randomized approximation algorithm to maximize SV profits Valdiated our proposed pricing mechanisms via extensive simulations on practical networking topologies pricing is fair for a differentiated scheme unto 25% improvements in profits possible if externalities accounted for 41

42 Important Open Questions Ensuring efficient markets in non-monopolistic environments under noncompulsory insurance Optimal pricing/incentive mechanisms in non-monopolistic environments Modeling strategic attackers - resorting to dynamic game models Insurers might need insurance as well - how will a regulator manage risk for the insurer? - adapt models from re-insurance, exploit derivatives, etc. Quantifying success of markets when explicitly accounting for noisy information regarding market stakeholders 42

43 Publications on My Thesis Work 1. R. Pal, L. Golubchik, K. Psounis, and P. Hui - Will Cyber-Insurance Improve Network Security - A Market Analysis, In proceedings of IEEE INFOCOM 2014, Toronto, Canada (Disseration) 2. R. Pal, L. Golubchik, K. Psounis, and P. Hui - On A Way to Improve Cyber-Insurer Profits: When a Security Vendor Becomes the Cyber-Insurer, In proceedings of IFIP Networking, 2013, New York City, USA (Dissertation) 3. R. Pal and P. Hui - On Differentiating Cyber-Insurance Contracts: A Topological Perspective, In proceedings of IEEE/IFIP Internet Management Conference, Ghent, Belgium, 2013 (Dissertation) 4. R. Pal and P. Hui - Cyber-Insurance for Cyber-Security: A Topological Take on Modulating Insurance Premiums, In proceedings of ACM SIGMETRICS MAMA 2012, London, UK. Also to appear in SIGMETRICS Performance Evaluation Review, 2012 (Dissertation) 5. R. Pal - Cyber-Insurance for Cyber-Security: A Solution to the Information Asymmetry Problem, Appeared in SIAM Annual Meeting, 2012, Minnesota, USA 6. R. Pal, L. Golubchik, and K. Psounis - Aegis: A Novel Cyber-Insurance Model, In proceedings of GameSec, 2011, Maryland, USA 7. R. Pal and P. Hui - Modeling Investments in Internet Security: Tackling Topological Information Uncertainty, In proceedings of GameSec, 2011, Maryland, USA 8. R. Pal and L. Golubchik - On Economic Perspectives of Internet Security: The Problem of Designing Optimal Cyber-Insurance Contracts, In proceedings of ACM SIGMETRICS MAMA 2010, London, UK. Also appeared in SIGMETRICS Performance Evaluation Review, R. Pal and L. Golubchik - Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage, In proceedings of IEEE ICDCS, 2010, Genoa, Italy

44 Acknowledgements Professor Leana Golubchik, USC Professor Konstantinos Psounis, USC My PhD qualifying committee at USC Prof. Pan Hui, HKUST, and T-Labs, Berlin, Germany Professor Ross Anderson, Cambridge University Dr. Tyler Moore, Harvard University Princeton EDGE Laboratory, Princeton University, ( Headed by Professor Mung Chiang) Professor Golubchik s research group at USC Professor Jean-Yves LeBoudec, EPFL, Lausanne Audiences at GameSec, SIGMETRICS MAMA, ICDCS, SIAM Annual Meeting, IEEE/IFIP IM, IFIP Networking, IEEE INFOCOM, TU Lisbon, Nokia-Siemens Networks, Lisbon Provost Fellowship programme at USC 44

45 Other Publications in PhD 1. R.Pal et.al. A Real-Time Pricing Model for Electricity Consumption, accepted in SIAM Conference on Financial Mathematics and Engineering, 2012, Minnesota, USA 2. R.Pal et.al. On Social Community Networks: The Cost Sharing Problem, accepted in ACM SIMPLEX 2012 Workshop, in conjunction with WWW conference, Lyon, France 3. R.Pal et.al. Economic Models for Cloud Service Markets: Pricing and Capacity Planning, published in Elsevier Theoretical Computer Science, 2013, Vol R.Pal et.al. Economic Models for Cloud Service Markets accepted in ICDCN 2012, Hong Kong. (Also invited by INFORMS Annual Meeting 2011, Charlotte, North Carolina, USA). 5. R.Pal et.al. Settling For Less : A QoS Compromise Mechanism for Mobile Opportunistic Networks accepted in ACM SIGMETRICS Workshop (MAMA 2011), San Jose, USA. A slightly modified version of this paper appeared in ACM SIGMETRICS Performance Evaluation Review, 2011, Vol. 39(3) 6. R.Pal et.al. Sharing-Mart: Online Auctions for Digital Content Trading and Content Incentivization, accepted in GameNets, 2011, Shanghai, China. (A flagship conference on game theory applications in communication networks) 7. R.Pal et.al. On Wireless Social Community Network Routers: The Design and Cost Sharing Problem for Better Deployment, accepted in IEEE GLOBECOM 2010, Florida, USA. 8. R.Pal et.al. Sharing Costs in Social Community Networks, accepted in IEEE ICNC Workshop on Computing Networking and Communications, 2012, Maui, Hawaii, USA. 9. R.Pal et.al. Playing Games with Human Health: A Game-Theoretic Approach to Optimizing Reliability in Wireless Health Networks, accepted in IEEE ISABEL 2010, Rome, Italy.

46 Thank You Questions? rpal@usc.edu 46

Modeling Internet Security Investments Tackling Topological Information Uncertainty

Modeling Internet Security Investments Tackling Topological Information Uncertainty Modeling Internet Security Investments Tackling Topological Information Uncertainty Ranjan Pal Department of Computer Science University of Southern California, USA Joint Work with Pan Hui Deutsch Telekom

More information

Aegis A Novel Cyber-Insurance Model

Aegis A Novel Cyber-Insurance Model Aegis A Novel Cyber-Insurance Model Ranjan Pal Department of Computer Science University of Southern California Joint Work with Leana Golubchik and Kostas Psounis University of Southern California Presentation

More information

Will Cyber-Insurance Improve Network Security? A Market Analysis

Will Cyber-Insurance Improve Network Security? A Market Analysis Will Cyber- Improve Network Security? A Market Analysis Ranjan Pal University of Southern California Email: rpal@usc.edu Leana Golubchik and Konstantis Psounis University of Southern California Email:

More information

IMPROVING NETWORK SECURITY THROUGH CYBER-INSURANCE. Ranjan Pal

IMPROVING NETWORK SECURITY THROUGH CYBER-INSURANCE. Ranjan Pal IMPROVING NETWORK SECURITY THROUGH CYBER-INSURANCE by Ranjan Pal A Dissertation Presented to the FACULTY OF THE USC GRADUATE SCHOOL UNIVERSITY OF SOUTHERN CALIFORNIA In Partial Fulfillment of the Requirements

More information

Henry Salvatori Building Voice: +1 (213) 268-1203 (office)

Henry Salvatori Building Voice: +1 (213) 268-1203 (office) Ranjan Pal Contact Information Research Interests Research Tools Employment Education Henry Salvatori Building Voice: +1 (213) 268-1203 (office) Room No. 200 E-mail: rpal@usc.edu 941, Bloom Walk Webpage:

More information

Modeling Internet Security Investments

Modeling Internet Security Investments Modeling Internet Security Investments 1 The Case of Dealing with Information Uncertainty Ranjan Pal and Pan Hui University of Southern California, Deutsch Telekom Laboratories arxiv:1104.0594v1 [cs.cr]

More information

A Game-Theoretic Analysis to Resolve the Tussle in Cloud Storage Services

A Game-Theoretic Analysis to Resolve the Tussle in Cloud Storage Services Appl. Math. Inf. Sci. 8, No. 3, 1361-1367 (214) 1361 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/1.12785/amis/8353 A Game-Theoretic Analysis to Resolve the Tussle

More information

Aegis A Novel Cyber-Insurance Model

Aegis A Novel Cyber-Insurance Model Aegis A Novel Cyber-Insurance Model Ranjan Pal, eana Golubchik, Konstantinos Psounis University of Southern California, USA {rpal, leana, kpsounis}@usc.edu Abstract. Recent works on Internet risk management

More information

Coordination in Network Security Games

Coordination in Network Security Games Coordination in Network Security Games Marc Lelarge INRIA - ENS Paris, France Email: marc.lelarge@ens.fr Abstract Malicious softwares or malwares for short have become a major security threat. While originating

More information

Game Theory: Supermodular Games 1

Game Theory: Supermodular Games 1 Game Theory: Supermodular Games 1 Christoph Schottmüller 1 License: CC Attribution ShareAlike 4.0 1 / 22 Outline 1 Introduction 2 Model 3 Revision questions and exercises 2 / 22 Motivation I several solution

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

ECON 312: Oligopolisitic Competition 1. Industrial Organization Oligopolistic Competition

ECON 312: Oligopolisitic Competition 1. Industrial Organization Oligopolistic Competition ECON 312: Oligopolisitic Competition 1 Industrial Organization Oligopolistic Competition Both the monopoly and the perfectly competitive market structure has in common is that neither has to concern itself

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

2. Information Economics

2. Information Economics 2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many

More information

Voluntary Participation in Cyber-insurance Markets

Voluntary Participation in Cyber-insurance Markets Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh and Mingyan Liu Abstract The study of cyber-insurance, both as a method for transferring residual cyber-security risks, and as an incentive

More information

Monotone multi-armed bandit allocations

Monotone multi-armed bandit allocations JMLR: Workshop and Conference Proceedings 19 (2011) 829 833 24th Annual Conference on Learning Theory Monotone multi-armed bandit allocations Aleksandrs Slivkins Microsoft Research Silicon Valley, Mountain

More information

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically

More information

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong Abstract.

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output.

Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output. Topic 8 Chapter 13 Oligopoly and Monopolistic Competition Econ 203 Topic 8 page 1 Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry

More information

Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling

Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling Praveen K. Muthusamy, Koushik Kar, Sambit Sahu, Prashant Pradhan and Saswati Sarkar Rensselaer Polytechnic Institute

More information

Demand and supply of health insurance. Folland et al Chapter 8

Demand and supply of health insurance. Folland et al Chapter 8 Demand and supply of health Folland et al Chapter 8 Chris Auld Economics 317 February 9, 2011 What is insurance? From an individual s perspective, insurance transfers wealth from good states of the world

More information

Adverse Selection and the Market for Health Insurance in the U.S. James Marton

Adverse Selection and the Market for Health Insurance in the U.S. James Marton Preliminary and Incomplete Please do not Quote Adverse Selection and the Market for Health Insurance in the U.S. James Marton Washington University, Department of Economics Date: 4/24/01 Abstract Several

More information

Imperfect information Up to now, consider only firms and consumers who are perfectly informed about market conditions: 1. prices, range of products

Imperfect information Up to now, consider only firms and consumers who are perfectly informed about market conditions: 1. prices, range of products Imperfect information Up to now, consider only firms and consumers who are perfectly informed about market conditions: 1. prices, range of products available 2. characteristics or relative qualities of

More information

Sharing Online Advertising Revenue with Consumers

Sharing Online Advertising Revenue with Consumers Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, pennockd@yahoo-inc.com 2 Harvard University.

More information

Bargaining Solutions in a Social Network

Bargaining Solutions in a Social Network Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,

More information

Buyer Search Costs and Endogenous Product Design

Buyer Search Costs and Endogenous Product Design Buyer Search Costs and Endogenous Product Design Dmitri Kuksov kuksov@haas.berkeley.edu University of California, Berkeley August, 2002 Abstract In many cases, buyers must incur search costs to find the

More information

On Compulsory Per-Claim Deductibles in Automobile Insurance

On Compulsory Per-Claim Deductibles in Automobile Insurance The Geneva Papers on Risk and Insurance Theory, 28: 25 32, 2003 c 2003 The Geneva Association On Compulsory Per-Claim Deductibles in Automobile Insurance CHU-SHIU LI Department of Economics, Feng Chia

More information

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

Differenciated Bandwidth Allocation in P2P Layered Streaming

Differenciated Bandwidth Allocation in P2P Layered Streaming Differenciated Bandwidth Allocation in P2P Layered Streaming Abbas Bradai, Toufik Ahmed CNRS-LaBRI University of Bordeaux- 5, Cours de la libération. Talence, 45 {bradai, tad} @labri.fr Abstract There

More information

Equilibrium in Competitive Insurance Markets: An Essay on the Economic of Imperfect Information

Equilibrium in Competitive Insurance Markets: An Essay on the Economic of Imperfect Information Equilibrium in Competitive Insurance Markets: An Essay on the Economic of Imperfect Information By: Michael Rothschild and Joseph Stiglitz Presented by Benjamin S. Barber IV, Xiaoshu Bei, Zhi Chen, Shaiobi

More information

Intermediate Microeconomics (22014)

Intermediate Microeconomics (22014) Intermediate Microeconomics (22014) I. Consumer Instructor: Marc Teignier-Baqué First Semester, 2011 Outline Part I. Consumer 1. umer 1.1 Budget Constraints 1.2 Preferences 1.3 Utility Function 1.4 1.5

More information

Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures

Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures Proceedings of the Industrial and Systems Engineering Research Conference G. Lim and J.W. Herrmann, eds. Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures Fei He,

More information

Security Games in Online Advertising: Can Ads Help Secure the Web?

Security Games in Online Advertising: Can Ads Help Secure the Web? Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya School of Computer and Communication Sciences EPFL, Switzerland firstname.lastname@epfl.ch

More information

Choice under Uncertainty

Choice under Uncertainty Choice under Uncertainty Part 1: Expected Utility Function, Attitudes towards Risk, Demand for Insurance Slide 1 Choice under Uncertainty We ll analyze the underlying assumptions of expected utility theory

More information

How To Analyze Security In A Network Of People

How To Analyze Security In A Network Of People Modeling Internet Security Investments Tackling Topological Information Uncertainty Ranjan Pal 1 and Pan Hui 2 1 University of Southern California, USA, rpal@usc.edu 2 Deutsch Telekom Laboratories, Berlin,

More information

Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole

Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole Luís M. B. Cabral New York University and CEPR November 2005 1 Introduction Beginning with their seminal 2002 paper,

More information

Hacking-proofness and Stability in a Model of Information Security Networks

Hacking-proofness and Stability in a Model of Information Security Networks Hacking-proofness and Stability in a Model of Information Security Networks Sunghoon Hong Preliminary draft, not for citation. March 1, 2008 Abstract We introduce a model of information security networks.

More information

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction 6.254 : Game Theory with Engineering Applications Lecture 1: Introduction Asu Ozdaglar MIT February 2, 2010 1 Introduction Optimization Theory: Optimize a single objective over a decision variable x R

More information

Cloud Computing Infrastructure Robustness: A Game Theory Approach

Cloud Computing Infrastructure Robustness: A Game Theory Approach Cloud Computing Infrastructure Robustness: A Game Theory Approach Nageswara S. V. Rao, Stephen W. Poole Oak Ridge National Laboratory Fei He, Jun Zhuang State University of New York at Buffalo Chris Y.

More information

Simple Channel-Change Games for Spectrum- Agile Wireless Networks

Simple Channel-Change Games for Spectrum- Agile Wireless Networks Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Seidenberg School of Computer Science and Information Systems Pace University White Plains, New York, USA

More information

Cloud Computing. Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources

Cloud Computing. Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources Peter Key, Cloud Computing Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources How much is a task or resource worth Can we use to price

More information

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Yang Song, Starsky H.Y. Wong, and Kang-Won Lee Wireless Networking Research Group IBM T. J. Watson Research Center

More information

Sharing Online Advertising Revenue with Consumers

Sharing Online Advertising Revenue with Consumers Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, pennockd@yahoo-inc.com 2 Harvard University.

More information

Voluntary Participation in Cyber-insurance Markets

Voluntary Participation in Cyber-insurance Markets 1 Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh, Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, Michigan, 4819-1 Email:

More information

Name. Final Exam, Economics 210A, December 2011 Here are some remarks to help you with answering the questions.

Name. Final Exam, Economics 210A, December 2011 Here are some remarks to help you with answering the questions. Name Final Exam, Economics 210A, December 2011 Here are some remarks to help you with answering the questions. Question 1. A firm has a production function F (x 1, x 2 ) = ( x 1 + x 2 ) 2. It is a price

More information

Competitive Cyber-Insurance and Internet Security

Competitive Cyber-Insurance and Internet Security Competitive Cyber-Insurance and Internet Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand {nikhils@eecs, schwartz@eecs, mark@icsi, wlr@eecs}.berkeley.edu Abstract This paper investigates

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Financial Markets. Itay Goldstein. Wharton School, University of Pennsylvania

Financial Markets. Itay Goldstein. Wharton School, University of Pennsylvania Financial Markets Itay Goldstein Wharton School, University of Pennsylvania 1 Trading and Price Formation This line of the literature analyzes the formation of prices in financial markets in a setting

More information

A Game Theoretical Framework for Adversarial Learning

A Game Theoretical Framework for Adversarial Learning A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,

More information

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

More information

Oligopoly: Cournot/Bertrand/Stackelberg

Oligopoly: Cournot/Bertrand/Stackelberg Outline Alternative Market Models Wirtschaftswissenschaften Humboldt Universität zu Berlin March 5, 2006 Outline 1 Introduction Introduction Alternative Market Models 2 Game, Reaction Functions, Solution

More information

Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints

Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints Olivier Beaumont,, Paul Renaud-Goud Inria & University of Bordeaux Bordeaux, France 9th Scheduling for Large Scale Systems

More information

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce

More information

ECO 317 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 21 Insurance, Portfolio Choice - Questions

ECO 317 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 21 Insurance, Portfolio Choice - Questions ECO 37 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 2 Insurance, Portfolio Choice - Questions Important Note: To get the best value out of this precept, come with your calculator or

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

Security Games in Online Advertising: Can Ads Help Secure the Web?

Security Games in Online Advertising: Can Ads Help Secure the Web? Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya School of Computer and Communication Sciences EPFL, Switzerland firstname.lastname@epfl.ch

More information

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J. A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of

More information

An On-Line Algorithm for Checkpoint Placement

An On-Line Algorithm for Checkpoint Placement An On-Line Algorithm for Checkpoint Placement Avi Ziv IBM Israel, Science and Technology Center MATAM - Advanced Technology Center Haifa 3905, Israel avi@haifa.vnat.ibm.com Jehoshua Bruck California Institute

More information

Individual security and network design

Individual security and network design Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015 Motivation Networks often face external threats in form of strategic or random attacks The attacks can be

More information

INEFFICIENT TRADE PATTERNS: EXCESSIVE TRADE, CROSS-HAULING AND DUMPING

INEFFICIENT TRADE PATTERNS: EXCESSIVE TRADE, CROSS-HAULING AND DUMPING INEFFICIENT TRADE PATTERNS: EXCESSIVE TRADE, CROSS-HAULING AND DUMPING Benjamin Eden 1 Vanderbilt University and The University of Haifa February 2005 Mailing address: Economics, VU station B #351819 2301

More information

Closing the Price of Anarchy Gap in the Interdependent Security Game

Closing the Price of Anarchy Gap in the Interdependent Security Game Closing the Price of Anarchy Gap in the Interdependent Security Game Parinaz aghizadeh and Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, Michigan,

More information

Chapter 21: The Discounted Utility Model

Chapter 21: The Discounted Utility Model Chapter 21: The Discounted Utility Model 21.1: Introduction This is an important chapter in that it introduces, and explores the implications of, an empirically relevant utility function representing intertemporal

More information

Using Insurance to Increase Internet Security

Using Insurance to Increase Internet Security Using Insurance to Increase Internet Security Svetlana Radosavac, James Kempf and Ulaş C. Kozat DoCoMo Communications Laboratories US, Inc. Palo lto, C 94304 {sradosavac,kempf,kozat}@docomolabs-usa.com

More information

Analysis of an Artificial Hormone System (Extended abstract)

Analysis of an Artificial Hormone System (Extended abstract) c 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for creating

More information

Do not open this exam until told to do so.

Do not open this exam until told to do so. Do not open this exam until told to do so. Department of Economics College of Social and Applied Human Sciences K. Annen, Winter 004 Final (Version ): Intermediate Microeconomics (ECON30) Solutions Final

More information

Virtual Enterprise Transactions: A Cost Model

Virtual Enterprise Transactions: A Cost Model Virtual Enterprise Transactions: A Cost Model A. D Atri 1 and A. Motro 2 Abstract A transaction is a bilateral exchange between two parties in which goods are delivered in return for payment. In virtual

More information

Competitive Cyber-Insurance and Internet Security

Competitive Cyber-Insurance and Internet Security Competitive Cyber-Insurance and Internet Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand {nikhils@eecs, schwartz@eecs, mark@icsi, wlr@eecs}.berkeley.edu Abstract This paper investigates

More information

UCLA. Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory

UCLA. Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory UCLA Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory (SPRING 2011) Instructions: You have 4 hours for the exam Answer any 5 out of the 6 questions. All questions are weighted equally.

More information

A Review on Zero Day Attack Safety Using Different Scenarios

A Review on Zero Day Attack Safety Using Different Scenarios Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Economics 200B Part 1 UCSD Winter 2015 Prof. R. Starr, Mr. John Rehbeck Final Exam 1

Economics 200B Part 1 UCSD Winter 2015 Prof. R. Starr, Mr. John Rehbeck Final Exam 1 Economics 200B Part 1 UCSD Winter 2015 Prof. R. Starr, Mr. John Rehbeck Final Exam 1 Your Name: SUGGESTED ANSWERS Please answer all questions. Each of the six questions marked with a big number counts

More information

Week 7 - Game Theory and Industrial Organisation

Week 7 - Game Theory and Industrial Organisation Week 7 - Game Theory and Industrial Organisation The Cournot and Bertrand models are the two basic templates for models of oligopoly; industry structures with a small number of firms. There are a number

More information

Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand

Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand Notes V General Equilibrium: Positive Theory In this lecture we go on considering a general equilibrium model of a private ownership economy. In contrast to the Notes IV, we focus on positive issues such

More information

Online Supplementary Material

Online Supplementary Material Online Supplementary Material The Supplementary Material includes 1. An alternative investment goal for fiscal capacity. 2. The relaxation of the monopoly assumption in favor of an oligopoly market. 3.

More information

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic

More information

Chapter 14 Managing Operational Risks with Bayesian Networks

Chapter 14 Managing Operational Risks with Bayesian Networks Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Cyber Insurance as an Incentive for Internet Security

Cyber Insurance as an Incentive for Internet Security Cyber Insurance as an Incentive for Internet Security Jean Bolot Sprint, California, USA bolot@sprint.com Marc Lelarge INRIA-ENS, Paris, France marc.lelarge@ens.fr Abstract Managing security risks in the

More information

A Study of Software as a Service Business Model

A Study of Software as a Service Business Model A Study of Software as a Service Business Model Dan Ma School of Information Systems Singapore Management University Abraham Seidmann W. E. Simon Graduate School of Business Administration University of

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

ANOTHER PERVERSE EFFECT OF MONOPOLY POWER

ANOTHER PERVERSE EFFECT OF MONOPOLY POWER ANOTHER PERVERSE EFFECT OF MONOPOLY POWER Jean J. Gabszewicz and Xavier Y. Wauthy November 2000 Abstract We show that the simple fact that a monopolist sells a good in units which are indivisible may well

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

How To Solve A Minimum Set Covering Problem (Mcp)

How To Solve A Minimum Set Covering Problem (Mcp) Measuring Rationality with the Minimum Cost of Revealed Preference Violations Mark Dean and Daniel Martin Online Appendices - Not for Publication 1 1 Algorithm for Solving the MASP In this online appendix

More information

Network Security A Decision and Game-Theoretic Approach

Network Security A Decision and Game-Theoretic Approach Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA

More information

Risk Management for IT Security: When Theory Meets Practice

Risk Management for IT Security: When Theory Meets Practice Risk Management for IT Security: When Theory Meets Practice Anil Kumar Chorppath Technical University of Munich Munich, Germany Email: anil.chorppath@tum.de Tansu Alpcan The University of Melbourne Melbourne,

More information

Competition and Fraud in Online Advertising Markets

Competition and Fraud in Online Advertising Markets Competition and Fraud in Online Advertising Markets Bob Mungamuru 1 and Stephen Weis 2 1 Stanford University, Stanford, CA, USA 94305 2 Google Inc., Mountain View, CA, USA 94043 Abstract. An economic model

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Computational Game Theory and Clustering

Computational Game Theory and Clustering Computational Game Theory and Clustering Martin Hoefer mhoefer@mpi-inf.mpg.de 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion Computational

More information

Routing in Line Planning for Public Transport

Routing in Line Planning for Public Transport Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARC E. PFETSCH RALF BORNDÖRFER Routing in Line Planning for Public Transport Supported by the DFG Research

More information

Walrasian Demand. u(x) where B(p, w) = {x R n + : p x w}.

Walrasian Demand. u(x) where B(p, w) = {x R n + : p x w}. Walrasian Demand Econ 2100 Fall 2015 Lecture 5, September 16 Outline 1 Walrasian Demand 2 Properties of Walrasian Demand 3 An Optimization Recipe 4 First and Second Order Conditions Definition Walrasian

More information

1. Supply and demand are the most important concepts in economics.

1. Supply and demand are the most important concepts in economics. Page 1 1. Supply and demand are the most important concepts in economics. 2. Markets and Competition a. Market is a group of buyers and sellers of a particular good or service. P. 66. b. These individuals

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

Load Balancing Between Heterogenous Computing Clusters

Load Balancing Between Heterogenous Computing Clusters Load Balancing Between Heterogenous Computing Clusters Siu-Cheung Chau Dept. of Physics and Computing, Wilfrid Laurier University, Waterloo, Ontario, Canada, N2L 3C5 e-mail: schau@wlu.ca Ada Wai-Chee Fu

More information

Lecture 6: Price discrimination II (Nonlinear Pricing)

Lecture 6: Price discrimination II (Nonlinear Pricing) Lecture 6: Price discrimination II (Nonlinear Pricing) EC 105. Industrial Organization. Fall 2011 Matt Shum HSS, California Institute of Technology November 14, 2012 EC 105. Industrial Organization. Fall

More information