Contagion! The Spread of Systemic Risk in Financial Networks

Similar documents
Systemic Risk. The idea. The model. The simulations. The results. Conclusions 3 The simulations. Systemic Risk. The idea. The model.

The Bank of Canada s Analytic Framework for Assessing the Vulnerability of the Household Sector

Network Analysis Workshop for Heads of Financial Stability CCBS, Bank of England, London February 22-23, 2016

Hedging Variable Annuity Guarantees

ALIGNE Credit Risk Management

Evaluating Trading Systems By John Ehlers and Ric Way

Banks, Liquidity Management, and Monetary Policy

To discuss this topic fully, let us define some terms used in this and the following sets of supplemental notes.

Pricing complex options using a simple Monte Carlo Simulation

The Heat Equation. Lectures INF2320 p. 1/88

GN47: Stochastic Modelling of Economic Risks in Life Insurance

THE INSURANCE BUSINESS (SOLVENCY) RULES 2015

Céline Gauthier and Moez Souissi, Financial Stability Department

Bilateral Exposures and Systemic Solvency Risk

Collatz Sequence. Fibbonacci Sequence. n is even; Recurrence Relation: a n+1 = a n + a n 1.

The package of measures to avoid artificial volatility and pro-cyclicality

Network Algorithms for Homeland Security

10.2 Series and Convergence

Distributed Caching Algorithms for Content Distribution Networks

Network (Tree) Topology Inference Based on Prüfer Sequence

Recognised Investment Exchanges. Chapter 2. Recognition requirements

Guidance Note: Stress Testing Class 2 Credit Unions. November, Ce document est également disponible en français

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Contents. List of Figures. List of Tables. List of Examples. Preface to Volume IV

Market-Consistent Valuation of the Sponsor Covenant and its use in Risk-Based Capital Assessment. Craig Turnbull FIA

9. Short-Term Liquidity Analysis. Operating Cash Conversion Cycle

With the derivative markets having changed dramatically since the 2008 financial crisis,

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Please see below for the current credit ratings of Santander UK:

Graphs without proper subgraphs of minimum degree 3 and short cycles

Math 55: Discrete Mathematics

The Basics of Interest Theory

Embedded Value Report

IBM Algo Asset Liability Management

Eurodollar Futures, and Forwards

Analysis of a Production/Inventory System with Multiple Retailers

TSM meets the Pro Backer

DATA ANALYSIS II. Matrix Algorithms

THE DYING FIBONACCI TREE. 1. Introduction. Consider a tree with two types of nodes, say A and B, and the following properties:

Measuring evolution of systemic risk across insurance-reinsurance company networks. Abstract

The degree of a polynomial function is equal to the highest exponent found on the independent variables.

Master of Mathematical Finance: Course Descriptions

Decentralized Utility-based Sensor Network Design

Performance of networks containing both MaxNet and SumNet links

INFORMATION SHEET ON FACTORING (PURCHASE and MANAGEMENT OF ENTERPRISE S ACCOUNT RECEIVABLES) (update in force as from )

Analytical Research Series

Probability Generating Functions

REVIEW EXERCISES DAVID J LOWRY

Credibility and Pooling Applications to Group Life and Group Disability Insurance

Solutions for Balance Sheet Management

Tutorial: Structural Models of the Firm

Monte Carlo Simulation

Hydrodynamic Limits of Randomized Load Balancing Networks

Derivatives, Measurement and Hedge Accounting

Ex. 2.1 (Davide Basilio Bartolini)

On an anti-ramsey type result

The Independence Number in Graphs of Maximum Degree Three

Margining Overview for London Stock Exchange Derivatives Market Equities

Facilitating On-Demand Risk and Actuarial Analysis in MATLAB. Timo Salminen, CFA, FRM Model IT

Complex Networks Analysis: Clustering Methods

A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS

(Quasi-)Newton methods

Interest Rate Risk Management for the Banking Book: Macro Hedging

Anti-Gaming in the OnePipe Optimal Liquidity Network

Statistical machine learning, high dimension and big data

Credit Analysis 10-1

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks

Pricing and calibration in local volatility models via fast quantization

Random graphs with a given degree sequence

MATH 425, PRACTICE FINAL EXAM SOLUTIONS.

8.1 Min Degree Spanning Tree

Basel Committee on Banking Supervision. Consultative Document. Basel III: The Net Stable Funding Ratio. Issued for comment by 11 April 2014

1 Short Introduction to Time Series

5 Numerical Differentiation

Fast Monte Carlo CVA using Exposure Sampling Method

Margin Calculation Methodology and Derivatives and Repo Valuation Methodology

BASEL III CHALLENGES FOR THE CARDS BUSINESS

LIBOR vs. OIS: The Derivatives Discounting Dilemma

Is the business model of insurance companies jeopardized?

Load Balancing and Switch Scheduling

Part 2: Community Detection

Contents. List of Figures. List of Tables. Acknowledgments PART I INTRODUCTION 1

How To Calculate Financial Leverage Ratio

Net Stable Funding Ratio

Replicating Life Insurance Liabilities

Chapter 9 Experience rating

Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression

Valuation of Network Effects in Software Markets

CITY UNIVERSITY LONDON. BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION

Business Loan. This document sets out your loan s terms and conditions. Contents of these terms and conditions. Terms and Conditions

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the school year.

Financial Risk Management

Investment in insurance-linked securities. Valuation and modeling approaches for European insurers under Solvency II

Transcription:

Contagion! The Spread of Systemic Risk in Financial Networks Tom Hurd Tom Hurd (McMaster University) Contagion! 1 / 34

1 Systemic Risk Basics 2 Static Cascade Models 3 Random Graph Models 4 Percolation and Cascades 5 Zero Recovery Default Cascades 6 Future Directions for Cascade Models om Hurd (McMaster University) Contagion! 2 / 34

Systemic Risk Basics Quotation (Dickens, David Copperfield) Annual income twenty pounds, annual expenditure nineteen nineteen six, result happiness. Annual income twenty pounds, annual expenditure twenty pounds ought and six, result mis- ery. The blossom is blighted, the leaf is withered, the god of day goes down upon the dreary scene, and and, in short, you are for ever floored. om Hurd (McMaster University) Contagion! 3 / 34

Systemic Risk Basics The Goal of the Book Main Aim To crystallize a stream of systemic risk research that focuses on the basic modelling structure that ensures some kind of mathematical tractability, while allowing a great deal of both reality and complexity in the actual finance network specification. om Hurd (McMaster University) Contagion! 4 / 34

Systemic Risk Basics Basic Modelling Strategy 1 Propose a definition of Random Financial Network of N banks, that gives a minimal description of the system at any time. 2 Propose a Cascade Mechanism. 3 Hit the system with a random shock at time 0 and determine the evolution of the resultant cascade. 4 Compare to exact N analytics that arise by extending the logic of percolation theory. Tom Hurd (McMaster University) Contagion! 5 / 34

Static Cascade Models Eisenberg-Noe 2001 Model: Balance Sheets Assets Liabilities External Assets Ȳ External Deposits D Unsecured Interbank Assets Z Unsecured Interbank Liabilities X Equity Ē Tom Hurd (McMaster University) Contagion! 6 / 34

Static Cascade Models EN2001 Assumptions 1 External debt D is senior to interbank debt X; 2 All interbank debt is of equal seniority; 3 There are no losses due to bankruptcy charges. Also: 1 Exposure Ω vw : what v owes w. 2 Equity and Default buffers: E v = max(0, v ). 3 Limited Liability: A bank is defaulted at cascade step n if and only if (n) v 0. Tom Hurd (McMaster University) Contagion! 7 / 34

Static Cascade Models EN2001 Default Buffer Mapping 1 If (n) w denotes the default buffer after n cascade steps, then (n) w = (0) w v Ω vw (1 h( (n 1) v / X v )) 2 Threshold function h(x) = max(x + 1, 0) max(x, 0) determines fractional recovered value of defaulted interbank assets. 3 As n, buffers (n) w converge to unique fixed point + = { + v } of solvency cascade mapping. Tom Hurd (McMaster University) Contagion! 8 / 34

Static Cascade Models Gai-Kapadia 2010 Default Model 1 GK assumes zero recovery at default and is formally identical to EN2001, but with threshold function h replaced by h(x) = 1 x>0. 2 Partial recovery at default can be modelled by h R (x) = Rh(x/R) + (1 R) h(x). h h R 1 1-1 x R x Tom Hurd (McMaster University) Contagion! 9 / 34

Static Cascade Models Illiquidity Cascades: Balance Sheets Assets Liabilities Fixed Assets Ȳ F External Deposits D Ω w1 v Ω w2 v Unsecured Interbank Assets Z Unsecured Interbank Liabilities X Ω vw 1 Ω w3 v Liquid Assets Ȳ L = Σ Default Buffer Ω vw 2 Tom Hurd (McMaster University) Contagion! 10 / 34

Static Cascade Models Illiquidity Cascade: Gai-Kapadia 2010b 1 At time 0, some banks experience deposit withdrawals that deplete their liquidity buffer Σ v := Yv L (allowing it to go negative). 2 Bank v with Σ v 0 reacts by hoarding liquidity; its debtor banks w N v + each receive a liquidity shock. 3 Under 100% hoarding, cascade mapping at step n is Σ (n) v = Σ (0) v w N + v Ω vw (1 h(σ (n 1) w / Z w )) 4 Formally identical to GK 2010 Default Cascade under interchange of assets and liabilities. Tom Hurd (McMaster University) Contagion! 11 / 34

Static Cascade Models Illiquidity Cascade 2: Seung Hwan Lee 2013 Model 1 At time 0, banks experience deposit withdrawals d v 0. 2 These are paid immediately first by liquid assets Z + ȲL, then fixed assets ȲF. 3 Debtor banks receive liquidity shocks; 4 Each bank v has initial liquidity buffer Σ (0) v = d v 0 5 After n 1 cascade steps, then Σ (n) w = Σ (0) w v Ω wv (1 h(σ (n 1) v / Z v )) 6 Mathematically identical to a restricted version of EN 2001! Tom Hurd (McMaster University) Contagion! 12 / 34

Static Cascade Models Asset Fire Sale Cascades (c.f. Cifuentes et al 2005 and Caccioli et al 2012) A 1 A 2 A 3 A 4 B 1 B 2 B 3 B 4 B 5 Figure: A bipartite graph with 5 banks (blue nodes) co-owning 4 assets (red nodes). Tom Hurd (McMaster University) Contagion! 13 / 34

Static Cascade Models Asset Fire Sales Banks v N = {1, 2,..., N}, Assets a M = {1, 2,..., M}. Let s av be amount of asset a held by bank v. On the nth cascade step: 1 When default buffer (n) v hits a threshold, v begins to liquidate assets. 2 Amount s (n) av of asset a held by bank v after n cascade steps is determined by (n) v. 3 The new mark-to-market price is determined by the total amount sold through an inverse demand function p (n+1) a = d 1 a ( v ( s av s (n) av )) 4 Banks mark-to-market to compute their new buffers (n+1) v. Tom Hurd (McMaster University) Contagion! 14 / 34

Static Cascade Models Asset Fire Sale Cascades 1 Complex cascades result even with no interbank sector Ω = 0. 2 Each blue node v is governed by a buffer variable (n) v 3 Each red node a is governed its price p (n) a, which can be considered as a buffer variable. 4 One buffer per node! 5 Global cascades can start either in banks or in assets: once it starts it doesn t matter much where it started. Tom Hurd (McMaster University) Contagion! 15 / 34

Static Cascade Models Single Buffer Models 1 In all these models, each node s behaviour, and hence the cascade itself, is determined by a single buffer v, Σ v or p a. 2 Single buffer models can easily account for multiple thresholds of behaviour. Tom Hurd (McMaster University) Contagion! 16 / 34

Static Cascade Models A Double Buffer Model 1 In more complex models, banks behaviour is determined by two or more buffers. 2 HCCMS 2013 introduces a double cascade model of illiquidity and insolvency, intertwining two buffers v, Σ v, that combines the essence of both [GK, 2010a] default cascade and [GK, 2010b] liquidity cascade. Question What effect does a bank s behavioural response to liquidity stress have on the probable level of eventual defaults in entire system? om Hurd (McMaster University) Contagion! 17 / 34

Static Cascade Models Essential Modelling Assumptions To have analytical results, not just Monte Carlo simulation experiments, should assume locally tree-like independence properties (LTI): 1 Network of bank counterparties is large, sparse and not too heterogeneous. 2 Interbank exposures and bank characteristics are families of random variables with hierarchical dependence. 3 Cascade mechanisms that model bank behaviour are compatible with network structure. Tom Hurd (McMaster University) Contagion! 18 / 34

Static Cascade Models Definition: Random Financial Networks Three layers of mathematical structure: 1 Skeleton: random (directed) graph (N, E) with banks v N and edges or links l = (vw) E represent a non-negligible counterparty relation (or directed interbank exposure). 2 Conditioned on skeleton (N, E): Random buffers v for each bank. 3 Finally, conditioned on skeleton and balance sheets: Random exposures Ω l for each link l = (w, v) E. Tom Hurd (McMaster University) Contagion! 19 / 34

Random Graph Models Directed Graphs: 2 Nodes and 1 Edge Tom Hurd (McMaster University) Contagion! 20 / 34

Random Graph Models Directed Configuration Model 1 Skeleton (N, E) is a directed configuration (LT) random graph with specified node and edge degree distribution matrices {P jk, Q kj }. 2 P jk = P[v N jk ] where N jk is the set of nodes with deg (v) = j, deg + (v) = k. 3 Q kj = P[l E kj ]. 4 Marginals: P + k = j P jk, P j = k P jk and Q + k = j Q kj, Q j = k Q kj. 5 P and Q must be consistent: z := jk jp jk = jk kp jk Q + k = kp + k /z, Q j = jp j /z. Note: when bivariate distribution Q Q + Q the network is called assortative. Tom Hurd (McMaster University) Contagion! 21 / 34

Random Graph Models Assortative Configuration Construction Theorem In the assortative configuration graph construction with probabilities P, Q, the following convergence properties hold as N. 1 The fraction of type (k, j) edges in the matching sequence (k l, j l ) l [L] concentrates with high probability around the nominal edge distribution Q kj. 2 For any fixed finite number S, the first S edges l, l [S] have degree sequence (k l, j l ) l [S] that converge in distribution to (ˆk l, ĵ l ) l [S], an independent sequence of identical Q distributed random variables. om Hurd (McMaster University) Contagion! 22 / 34

Random Graph Models Other Potential Random Graph Constructions 1 Preferential attachment models; 2 Preferential attachment and detachment models; 3 Inhomogeneous Random Graphs: each bank v N = {1,..., N} is independently assigned a random type t v F with values in type space T ; Conditioned on {t v }, edges (w, v) E are drawn independently with probability K(u(t v ), u(t w )) N 1 + K(u(t v ), u(t w )) where K : R + R + R + is symmetric and u : T R +. Tom Hurd (McMaster University) Contagion! 23 / 34

Percolation and Cascades Percolation Logic 1 A large sparse random graph typically has few short closed cycles: call it locally tree-like. 2 Implies all sums over counterparties are almost (conditionally) independent: local tree-like independence (LTI). 3 Vulnerable edge: a directed edge (w, v) E such that Ω wv v. 4 Percolation Logic: large scale cascades starting from a single seed default are only possible if the directed subgraph E V of vulnerable edges has a large strongly connected component Giant-SCC. 5 Because of the LTI property, size GSCC can be analyzed exactly in the limit N. Tom Hurd (McMaster University) Contagion! 24 / 34

Percolation and Cascades Zoology of Components of Directed Graphs Figure: The connected components of the World Wide Web in 1999. (Source: Broder et al 2000.) Tom Hurd (McMaster University) Contagion! 25 / 34

Percolation and Cascades Percolation Theory on Random Graphs G Question What is the size of the largest connected cluster C in G = (N, E)? Theorem (Molloy-Reed 2000) Let G (N), N := N be a well-behaved random graph sequence with the locally tree-like (LT) property. Then E[ C ] N = N(1 g(ξ ))[1 + o(1)] Here ξ = g (ξ ) and g(x) := g (1) k P[k v = k]x k is the generating function of the asymptotic degree distribution. Configuration Graphs and Inhomogeneous Random Graphs have the LT property. om Hurd (McMaster University) Contagion! 26 / 34

Percolation and Cascades Percolation Condition 1 f(ξ) 0.5 0 0 0.5 1 ξ Figure: Supercritical case is found for the green curve, which has a non-trivial fixed point ξ < 1. The blue curve has only the trivial fixed point at ξ = 1, and corresponds to a sub-critical random graph. Tom Hurd (McMaster University) Contagion! 27 / 34

Percolation and Cascades Cascade Dynamics = Bootstrap Percolation? 1 Bootstrap Percolation is a dynamic version of percolation introduced in 1979 by Chalupa, Leath and Reich for magnetic systems on regular lattices. 2 It follows the growth of connected clusters of nodes v N that become activated when the number of its active neighbours exceeds a threshold. 3 Exact analytic asymptotics are sometimes possible on LTI networks. 4 Watts 2002 Information Cascade Model is a basic example of Bootstrap Percolation. Tom Hurd (McMaster University) Contagion! 28 / 34

Zero Recovery Default Cascades Extended Gai-Kapadia RFN 1 Skeleton graph is a directed configuration random graph with {P jk, Q kj }. 2 Conditionally on the skeleton, buffers v are a collection of independent non-negative random variables with P[ v x v N jk ] = D jk (x), x 0. (1) 3 Conditionally on the skeleton, exposures Ω l form a collection of independent positive random variables, independent as well from the default buffers v with W kj (x) = P[ Ω l x l E kj ], w kj (x) = W kj(x), (2) Tom Hurd (McMaster University) Contagion! 29 / 34

Zero Recovery Default Cascades Extended Gai-Kapadia Model 1 GK 2010 zero recovery default mechanism. 2 Let D n N be the set of defaulted banks after n cascade steps. 3 Initial default probabilities p (0) jk = P[v D0 v N jk ] = D jk (0). 4 After n cascade steps: p (n) jk = P[v Dn v N jk ]. 5 {v D n } = { v w N v Ω wv 1(w D n 1 )} Tom Hurd (McMaster University) Contagion! 30 / 34

Zero Recovery Default Cascades Zero Recovery Cascade Mapping Theorem Theorem Consider the LTI sequence of GK financial networks (N, P, Q,, Ω). Then the following formulas hold with high probability as N : 1 The quantities p (n) jk, π(n) k satisfy the recursive formulas p (n) jk = D jk, ( w (n 1) j ) j, π (n) k = j p (n) j k P j k, w (n 1) j (x) = ( Q k j k (1 π (n 1) k ) )δ 0 (x) + π (n 1) k w k j(x). 2 π (n) are a vector valued function G( π (n 1) ), explicit in terms of RFN specification (N, P, Q,, Ω). om Hurd (McMaster University) Contagion! 31 / 34

Zero Recovery Default Cascades Mean Cascade Size and Cascade Frequency 1 1 Mean Cascade Size 0.8 0.6 0.4 0.2 Ext Vunerable Cluster 0.8 0.6 0.4 0.2 0 0 5 10 Mean Connectivity 0 0 5 10 Mean Connectivity (a) (b) Tom Hurd (McMaster University) Contagion! 32 / 34

Future Directions for Cascade Models Future Directions 1 Develop LTI algorithms for a variety of full and partial recovery cascade mechanisms, such as EN 2001, liquidity hoarding, fire sale models and their extensions. 2 Investigate limits of the LTI approximation. 3 Explore RFN cascade models with IRG skeletons with community and multiplex structure. 4 Calibrate joint distributions of balance sheets and exposures from systemic risk databases. 5 Justify bank crisis behaviour assumptions using the theory of global games (see Morris and Shin). Tom Hurd (McMaster University) Contagion! 33 / 34

Future Directions for Cascade Models Thanks... to many friends, colleagues and collaborators for sharing ideas and insight into an exciting field. Enjoy the conference! om Hurd (McMaster University) Contagion! 34 / 34