Improving Network Security Through Insurance A Tale of Cyber-Insurance Markets



Similar documents
Modeling Internet Security Investments Tackling Topological Information Uncertainty

Will Cyber-Insurance Improve Network Security? A Market Analysis

IMPROVING NETWORK SECURITY THROUGH CYBER-INSURANCE. Ranjan Pal

Aegis A Novel Cyber-Insurance Model

Coordination in Network Security Games

Game Theory: Supermodular Games 1

On the Interaction and Competition among Internet Service Providers

ECON 312: Oligopolisitic Competition 1. Industrial Organization Oligopolistic Competition

Network Security Validation Using Game Theory

Decentralized Utility-based Sensor Network Design

2. Information Economics

Voluntary Participation in Cyber-insurance Markets

Monotone multi-armed bandit allocations

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

Performance of networks containing both MaxNet and SumNet links

Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output.

Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling

Demand and supply of health insurance. Folland et al Chapter 8

Imperfect information Up to now, consider only firms and consumers who are perfectly informed about market conditions: 1. prices, range of products

Sharing Online Advertising Revenue with Consumers

Bargaining Solutions in a Social Network

Buyer Search Costs and Endogenous Product Design

On Compulsory Per-Claim Deductibles in Automobile Insurance

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Equilibrium in Competitive Insurance Markets: An Essay on the Economic of Imperfect Information

Intermediate Microeconomics (22014)

Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures

Choice under Uncertainty

Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction

Simple Channel-Change Games for Spectrum- Agile Wireless Networks

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective

Sharing Online Advertising Revenue with Consumers

Voluntary Participation in Cyber-insurance Markets

Name. Final Exam, Economics 210A, December 2011 Here are some remarks to help you with answering the questions.

Competitive Cyber-Insurance and Internet Security

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

Financial Markets. Itay Goldstein. Wharton School, University of Pennsylvania

A Game Theoretical Framework for Adversarial Learning

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

Oligopoly: Cournot/Bertrand/Stackelberg

Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints

Intelligent Worms: Searching for Preys

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

ECO 317 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 21 Insurance, Portfolio Choice - Questions

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

An On-Line Algorithm for Checkpoint Placement

Individual security and network design

Chapter 21: The Discounted Utility Model

Using Insurance to Increase Internet Security

Do not open this exam until told to do so.

Virtual Enterprise Transactions: A Cost Model

UCLA. Department of Economics Ph. D. Preliminary Exam Micro-Economic Theory

A Review on Zero Day Attack Safety Using Different Scenarios

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Economics 200B Part 1 UCSD Winter 2015 Prof. R. Starr, Mr. John Rehbeck Final Exam 1

Week 7 - Game Theory and Industrial Organisation

Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand

Online Supplementary Material

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Chapter 14 Managing Operational Risks with Bayesian Networks

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

A Study of Software as a Service Business Model

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

ANOTHER PERVERSE EFFECT OF MONOPOLY POWER

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

How To Solve A Minimum Set Covering Problem (Mcp)

Network Security A Decision and Game-Theoretic Approach

Risk Management for IT Security: When Theory Meets Practice

Competition and Fraud in Online Advertising Markets

Computational Game Theory and Clustering

Routing in Line Planning for Public Transport

Walrasian Demand. u(x) where B(p, w) = {x R n + : p x w}.

1. Supply and demand are the most important concepts in economics.

Simulating a File-Sharing P2P Network

Lecture 6: Price discrimination II (Nonlinear Pricing)

Transcription:

Improving Network Security Through Insurance A Tale of Cyber-Insurance Markets Ranjan Pal Department of Computer Science University of Southern California PhD Advisors - Leana Golubchik and Konstantinos Psounis Jointly with Electrical Engineering and Computer Science University of Southern California Collaborator - Pan Hui (Hong Kong University of Science and Technology, T-Labs, Berlin) PhD Defense Talk, USC, 27 th May, 2014 1

Research Focus Cyber-Security Network and Mobile Security Web Security Information Security Security Tools crytography formal logic software and hardware techniques measurements and machine learning game theory and mechanism design economics and social sciences 2

Can We Achieve Robust Security? Robust Internet security is currently not a reality [AM 09] 9% 13% 25% 39% 78% 36% A few primary reasons Anti-virus adoption A major population of network users are naive and are not aware of using existing security tools to their full potential Technical solutions not fool-proof (band-aid effect) Economics and policy related factors Anti-spam adoption Data courtesy: Symantec and Steganos, 2011 3

Enter Insurance In real-world we have insurance schemes to manage risks related to cars, health, etc., Basic Principle Pay premiums/month and get covered when faced with a risk 4

How about Cyber-Insurance? Similar to popular in-practice insurances, we could also have cyber-insurance Use cyber-insurance to (i) mitigate risk (ii) make cyber space more robust [AM 08] 5

The Security Players Government Interests: to ensure a secure cyber-space Cyber-Insurer Interests: to make profits and ensure network robustness The Insured Interests: to remain safe and recover losses Security Product Vendors The Networking Infrastructure Interests: to remain robust Interests: to increase demand of products and make profits 6

A Cyber-Insurance Market An insurance-driven security eco-system involved parties (stakeholders) have useful exchanges of their interests potentially leading to a situation of market being in equilibrium (optimal exchange of interests) 7

Important Economics and Insurance Concepts Equilibrium Existence Market Efficiency Externality Adverse Selection Moral Hazard 8

Challenges in the Network Domain when, where, and why? interdependent and correlated risks non-transparency of loss information Can the insurers and the insured be jointly satisfied? i.e., Is there a market for cyber-insurance? 9

Related Work Question - Do Efficient Cyber-Insurance Markets Exist? Network and Insurance Settings Ideal Insurance Conditions Non-ideal Insurance Conditions Modeled Network (topology and externality) [LB 09] (restricted markets, no efficiency) [PG 10] (restricted markets, efficiency under cooperation) [PGPH 13, PGPH 14] (efficiency achieved) YL 12 (efficiency on good software quality) 10 Did not Model Network [PGP 10] (non-insurable risks, no efficiency) [SSFW 09]-restricted markets, no efficiency), [P 12] (restricted markets, no efficiency)

Talk Outline Existence of cyber-insurance markets Efficiency of cyber-insurance markets Realizing cyber-insurance markets in practice 11

Part 1 On the Existence of Cyber-Insurance Markets 12

Research Contribution Questions we are interested in Does there exist cyber-insurance markets under our proposed model? Are the markets efficient? Can we make all stakeholders happy? 13 Our Contribution We propose, study, and compare the following market scenarios to answer our questions (i) No insurance markets (ii) perfectly competitive markets selling insurance (iii) oligopolistic markets selling insurance (iv) monopoly markets selling insurance [PGPH 14]

Supply-Side Model Risk-averse cyber-insurer/s (single or multiple) could be ISP, security vendor, cloud provider, or any other third party Insurer provides clients (network users) with full coverage, [SV, 07, L 04] User premium - (1 + )E(R), 0 Compulsory insurance - regulator s tool required for the sake of increasing cyber-security [NYT, November, 2012] can be done via bundling of Internet contracts 14

Demand-Side Model (1/2) Network (primarily overlay) of risk-averse users A user i is subject to a risk of size r<w 0 Each user possess a concave utility function U(.) function of final wealth of a user strictly increasing, twice continuously differentiable Each user either invests nothing or an amount xi, self-defense (security) investments - anti-virus, firewalls, etc., Each user does not completely avoid possible loss on self-defense 15

Demand-Side Model (2/2) Users face direct as well as indirect losses direct losses - user i gets attacked by a direct threat and not by a propagated threat p i d(x i )=0 p i d(0) = p d indirect losses - user i gets attacked by a propagated threat originating at some other user probability of being affected by threats p i (X i,x)=p i d(x i )+q(l(x)) p i d(x i )q(l(x)) probability of being affected by indirect threat x - cost of investment to a user indifferent between investing and not investing x = f( x,g, a ) 16

No Insurance Scenario A user takes his decision to invest based on a utility comparison analysis A user invests in self-defense when utility on prevention greater than that without it E[U ndef (x)] = p d U(w 0 r) + (1 p d )Q Expected utility without prevention Expected utility with prevention Utility on facing direct risk only utility on facing indirect risk only Q = q(x)u(w 0 r) + (1 q(x))u(w 0 ) utility on facing indirect risk utility on facing no risk E[U def (x)] = q(x)u(w 0 x r) + (1 q(x))u(w 0 x) At market equilibrium evaluate x, i.e., the equilibrium cost to invest in self-defense 17

Insurance Scenario A user invests only if utility on prevention greater than that without it Full coverage E[U ndef (x)] = p d U(w 0 r + r p(0,x) r)+(1 p d )Q Expected utility without prevention Utility on facing direct risk only Utility on facing indirect risk only coverage not required Q = q(x)u(w 0 r + r p(0,x) r)+(1 q(x))u(w 0 p(0,x) r) utility on facing indirect risk utility on facing no risk At market equilibrium evaluate x E[U def (x)] = p d U(w 0 x q(x) r) Expected utility with prevention 18

Social Welfare Maximization Case of No Insurance and Competitive Insurance SW(x) = Z x 0 E[U def (l(x, y)]f(y)dy + E[U ndef (l(x)]l(x) net utility of investing users net utility of non-investing users Case of Monopoly Insurance SW(x) = Z 1 Z x 0 0 E[U def (l(x, y)]f(y)dyd net utility of investing users + E[U ndef (l(x)]l(x) net utility of non-investing users Social welfare maximization at equilibrium implies market efficiency 19

Competitive Insurance Scenario perfectly competitive insurance drives insurer profits to zero and results in fair premiums too many buyers (insureds) and sellers (insurers) in the market for any seller to charge unfair premiums to clients - will result in it having zero demand a user invests only if utility on prevention greater than that without it Expected utility without prevention Expected utility with prevention Full coverage E[U ndef (x)] = p d U(w 0 r + r p(0,x) r)+(1 p d )Q at equilibrium (Walrasian) evaluate x Utility on facing direct risk only utility on facing indirect risk E[U def (x)] = p d U(w 0 x q(x) r) 20 Utility on facing indirect risk only Q = q(x)u(w 0 r + r p(0,x) r)+(1 q(x))u(w 0 p(0,x) r) utility on facing no risk coverage not required

Oligopolistic Insurance Scenario Consider now that there are enough firms in market for each to be price-setting each seller can control and set the premiums of its customers We have a Bertrand game of premiums between cyber-insurers [MWG] Joseph Bertrand The NE of the game behaves exactly as the competitive equilibrium, i.e., fair premiums are provided to clients; insurers make zero profits [MWG] The well known Bertrand Paradox arises for number of firms equal to two Will cyber-insurers really make zero profits under competition?? No In practice there are some differences between firms w.r.t. factors such as reputation to customers, etc., and that allows some insurers to make positive profits by charging unfair premiums to their clients who go for reputation irrespective of price fairness 21

Monopoly Insurance Scenario monopoly insurance gives pricing power to the insurer under regulation a user invests only if utility on prevention greater than that without it Expected utility without prevention Full coverage E[U ndef (x)] = p d U(w 0 r + r (1 + )p(0,x) r)+(1 p d )Q Utility on facing direct risk only Utility on facing indirect risk only coverage not required Q = q(x)u(w 0 r + r (1 + )p(0,x) r)+(1 q(x))u(w 0 (1 + )p(0,x) r) utility on facing indirect risk utility on facing no risk Expected utility with prevention E[U def (x)] = p d U(w 0 x (1 + )q(x) r) at market equilibrium evaluate x 22

Summary of Results Market Type Equilibrium existence Equilibrium uniqueness Social welfare maximization No Insurance yes yes no Perfectly Competitive yes yes no Oligopolistic Insurance (2 insurers) Oligopolistic Insurance (#insurers > 2) Monopoly Insurance (one insurer) yes yes no yes yes no yes yes no PGPH 14 SSFW 09 23

Practical Implications Market Type Cyber-Insurer/s User Product Vendor Regulatory Agency Network No Insurance NA no somewhat yes no no Competitive Insurance Oligopolistic Insurance (two firms) Oligopolistic Insurance (#firms >2) Monopoly Insurance Are Stakeholder Interests Satisfied? no (zero expected profits) yes (full coverage) no (decrease in sales) no (decreased robustness) no (non-optimal SW) no yes no no no yes only when loading factor is positive yes yes Main Result Traditional cyber-insurance markets do not incentivize users to invest in self-defense and result in market failure (inefficiency) no no no no no no 24

Part 2 Making Cyber-Insurance Markets Efficient 25

Research Contribution Question we are interested in How to ensure social welfare maximization by internalizing all network externalities? Our Contribution We propose two techniques to ensure market efficiency based on premium discrimination (i) premium discrimination under regulation (ii) premium discrimination under non-regulation [PGPH 14, A working paper] 26

Ensuring Social Welfare Maximization So is all hope lost for successful (efficient) cyber-insurance markets? NO Users need to internalize network externalities caused by investments of other users Goal: to maximize social welfare in a network at user investment equilibrium Method Basis premium discrimination charge marginally fair premiums E[R] + k fair premium 27

Charging Fines/Rebates Protocol Steps Step 1 insurer advertises contracts with fine/rebate values Step 2 Step 3 users decide whether to invest in self-defense based on their cost of security investment and their signed insurance contracts when a claim if filed by a client, insurer checks each client on his investment amounts and allocates appropriate fines/rebates on his contract 28 Assumption a cyber-insurer can observe or stochastically learn the investment amounts of users. P 12 no observations mechanism design approach no efficiency

Summary of Results (Contract Discrimination Under Monopoly) Scenario Monopoly Insurance (contract discrimination) Equilibrium existence yes Equilibrium uniqueness Intuition Investment externalities are internalized by network users, users take more responsibility in securing their systems yes Social welfare maximization yes Moral hazard problem is resolved Mechanism Cyber-Insurer User Product Vendor Regulatory Agency Network Fines/Rebates not always yes yes yes yes Cooperation [PG, 10] no (always make zero expected profits) Are Stakeholder Interests Satisfied? yes yes yes yes Main Point: Market exists and is efficient but insurer might make zero expected profit 29

Part 3 Realizing Cyber-Insurance Markets in Practice 30

The Importance of Security Vendors Cyber-insurance companies are profit minded might make zero expected profit sufficient for them being de-incentivized in the future to form a security ecosystem Security vendors (e.g., Symantec, Microsoft) form an integral component in ecosystem - why? they are manufacturers of self-defense mechanisms nearly every user adopts some amount of self-defense mechanisms SV pricing roles might prove strategic in successful cyber-insurance market formation 31

The Alliance Diagram Security Maximum Social Welfare Share of Profits ($$) Cyber- Vendor Privileges & User Information 1. product advertising and lock-in 2. logical network centrality information insurer client lock-in increased profits due to lock-in and informed (externality-driven and differentiated) pricing 32 strictly positive expected profits Security vendor may be the cyber-insurer recovering safety capital costs

Research Contribution Questions we are interested in How can SVs price products to make extra profits for the insurance business? How does client network topology play a role in SV pricing? Is the pricing mechanism fair? Our Contribution We propose, study, and compare the following pricing policies adopted by a monopoly SV (i) static heterogenous (differentiated) pricing (ii) static homogenous (uniform pricing) (iii) static binary pricing [PH 12, PH 13, PGPH 13] 33

Pricing Model We consider a single regulated security vendor (SV) acting as the cyber-insurer N customers (users) for the SV connected via a logical (overlay) network social engineering attacks spread through logical networks Each user i has his concave utility function u i (monotonically non-decreasing) u i (x i, x i,p i )= i x i utility of user investments i x 2 i + x i X h ij x j h ij - positive externality effect of user j s per unit investment on user i j utility due to externalities p i x i 2 i > X j negative utility due to cost h ij 34

Pricing Game SV accounts for strategic user behavior - price set via a two stage game Stage 1 - SV sets price based on user optimal behavior in order to optimize profits max p X i p i x i cx i Stage 2 - a user optimizes his utility by investing amount x in self-defense, based on the price set by the SV. Here each user plays a game with other network users SV accounts for Stage 2 in deriving prices in Stage 1 (Stackelberg) 35

Closed Form Results on Equilibrium Prices Theorem 2. The optimal price vector p charged by the SV is given Theorem 2. The optimal price vector p charged by the SV is given Heterogenous Pricing markup discounted by ing by g e of + c 1 1 0 1 0 T 1 0 1 0 of + c 1 p = +GQ 1 B(G0, Q 1, w0 ) G T Q 1B(G 0, Q 1, w ), 0 ific +GQ B(G, Q, w ) G Q B(G, Q, w ), 2 cour p = 2 (5) 0 urave T (5) 0 G+G c 1 topological where G = and w = T price vector dependent on Bonacich centrality, i.e., user location 0 0 G+G 2 c 1. 2 e G = and w does = not. dix. where 2 2 price discriminate its consumers, In the case when the SV x. In case price when the SVfor does notconsumer) price discriminate its consumers, the the optimal (same every charged per Homogenous Pricing nted the optimal price (same for every consumer) charged per consumer consumer is given by d T 1 is given by + c 1) 11T (Q G) 1 ( p =1 1 (Q. (6) G) ( + c 1 ) T (Q 1 1 1 G) p= 2. (6) (2) T (Q 1 1 2 1 G) 2) pricetheorem independentintuition of Bonacichand centrality Implications: The optimal price vector in Theorem Intuition and Implications: The optimal price vector the no price discrimination case is independent of individual nodein her thecentralities, Unique Nash equilibrium duethe to supermodularity of our pricing games - Topkis (1998) whereas in price case the optimal price no price discrimination casediscrimination is independent of individual node ernot centralities, vector depends on the Bonacich centrality of individual users. price The whereas in the price discrimination case the optimal user ot vector intuition behind is thecentrality fact that of users tend to users. invest The in depends onthe theresult Bonacich individual 36

Model Setting: Social Engineering Attacks social networks (formed by a preferential attachment (PA) mechanism) random trees (formed by a Poisson mechanism) how to measure influence of a node in a network? centrality metric : Bonacich centrality is similar to PageRank 37

Price charged by SV 1.3 1.2 1.1 1 0.9 Results: Different Pricing Scenarios 0.8 0 10 20 30 40 50 Network User # (in increasing order of centrality) ode Plots Result instance for a random PA graph of 100 nodes for (a) Per-Unit SV Prices (left) and (b) Total User Investment when Price Charged by SV 1.5 1.4 1.3 1.2 1.1 1 Heterogenous Pricing Uniform Pricing Binary Pricing Price Type Topology Profit Increase Fairness DP Random Yes Heterogenous Pricing Yes DP Tree Binary Pricing Uniform Pricing Yes Yes BP Random Yes No BP Tree Yes No UP Random Yes No UP Tree Yes No 38 Total User Investment Total User Investment 2 1.8 1.6 1.4 1.2 Heterogenous Pricing Uniform Pricing Binary Pricing 1 0 10 20 30 40 50 Network User # (in increasing order of centrality) 2.6 2.4 2.2 2 1.8 1.6 =3(right) (PA Grap context of network neutrality DP - Differentiated Pricing BP - Binary Pricing UP - Uniform Pricing Heterogenous Pricing Binary Pricing Uniform Pricing

by a SV from its cyber-insurance business for pricing scenarios 1 Profit Ratio 0.65 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.65 Influence Values 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Influence Values e and 3. The proof of the theorem is in the Appendix. s Theorem Fig. 2: 500 3. The Node profits, Profit Results: PRatio 0 and Plots P Profit 1, made for (a) by Ratios an= SV3(left), from its (b) cyberinsurance business when the latter does not (does) account for user = 2.5 (middle), and e e investment externalities respectively are given 1 1 1 1 by e 8 0.95 0.95 e 0.95 < 0.95 T 0.9 0.9 c 1 9 = 0.9 n P 0.9 0 = (Q G) 1 c 1 0.9 0 If : 2 0.85 0.852 ; (7) 0.85 0.85 0.8 e 0.8 0.8 d and0.8 0.8 0.75 Ratio Lower 0.75 Ratio Bound Lower Bound Ratio Lower Bound 0 8 Ratio Lower Bound Ratio Obtained Ratio Obtained h Ratio Obtained Ratio Obtained < 0.75 0.7 T Ratio Upper Bound Ratio Upper Bound 0.75 0.7 Ratio Upper Bound Ratio Upper Bound 0.7 a c 1 9 = P0.65 1 = (Q G 0 ) 1 c 1 0.65 0.7 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.7 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 e 0 0.1 0.2: 0.3 0.4 0.52 0.6 0.7 0.8 0.9 1 0 0.1 2 0.2 0.3 0.4;, (8) 0.5 0.6 Influence Values Influence 0.7 Values 0.8 0.9 1 Influence Values Influence Values st Averaged result for 50 random PA graphs of 100 nodes Averaged result for 50 random trees of 100 nodes ots e for. Assuming Fig. (a) 3: 100 = Q3(left), G to Node Profit (b) be positive profit Ratio = increase 2.5 definite, Plots (middle), the bounds for ~25% (a) and (model =1(left), (c) of the based) = (b) 2(right) ratio of =3(middle), [PA Graphs] and (c) profits in these two cases is given by t b. 0 apple 1 1 1 we generate 50 PA graphs 2 + min(k) apple P 0 apple 1 for each different P h 1 value 2 + max(k) apple 1,, K = f(g) (9) of µ ranging from special case of tree topolog 0 to 1 in 0.95 steps of 0.1. Each point in a sub-plot in Figure 0.95 y where 1 is of size 100 and 500 nodes P0 - profit R = when Q average of the 50 P 0 network G andexternalities min( ), max( ) are not accounted denote thefor minimum 0.9 P 1 obtained per value of µ (the 0.9 x-axis). k and maximum same manner as we genera Each sub-plot is eigenvalues the average of 50 of their arguments respectively, and graphs for a particular value of, i.e., based on influence va e P1 0.85 0.85 the scale-free Kequals - profit when RR T network +R T R 1 externalities exponent parameter for. are accounted for 4 PA graphs, (in many papers average of 50 instances for 0.8 0.8 also s denoted as ) is known to generally lie between [2, 3], and for to lie in the set {1, 3, 5}. F 39 0.75 0.75 our l plots Before we choose we explain three values the theorem of Ratio : Lower 2, 2.5, intuitions Boundand 3. For and the its purposes implications, we for all i that Ratio Lower Bound i = G an Profit Ratio Profit Ratio P Profit Ratio Profit Ratio Profit Ratio Profit Ratio 0.6

Binary Pricing Heterogenous pricing may not be practical to implement in a large network Given exogenous prices, what subset of clients get the discounted price that maximizes insurer profits? NP-Hard problem (we reduce it from weighted MAX-CUT problem) two node classes (denoting two price classes) nodes - network users edges - f(g) We design a 0.878 approximation algorithm to find optimal price set that generates maximum profits for the cyber-insurer. model a relaxed version of the problem as a semi-definite programming problem used a randomized approach used by Goemans and Williamson [1995] to bound OPT ratio 40

Dissertation Contributions Summary In a non-insurance setting, network security is sub-optimal Cyber-insurance markets are efficient under monopoly with contract discrimination, with insurer making zero profits in expectation Cyber-insurance markets are efficient under monopoly and competition under user cooperation, with insurer making zero profits in expectation Designed heterogenous, homogenous, and binary pricing mechanisms to allow a SV cyber-insurer to make additional profits for its cyber-insurance business The binary pricing problem to be NP-Hard and we designed a 0.878 randomized approximation algorithm to maximize SV profits Valdiated our proposed pricing mechanisms via extensive simulations on practical networking topologies pricing is fair for a differentiated scheme unto 25% improvements in profits possible if externalities accounted for 41

Important Open Questions Ensuring efficient markets in non-monopolistic environments under noncompulsory insurance Optimal pricing/incentive mechanisms in non-monopolistic environments Modeling strategic attackers - resorting to dynamic game models Insurers might need insurance as well - how will a regulator manage risk for the insurer? - adapt models from re-insurance, exploit derivatives, etc. Quantifying success of markets when explicitly accounting for noisy information regarding market stakeholders 42

Publications on My Thesis Work 1. R. Pal, L. Golubchik, K. Psounis, and P. Hui - Will Cyber-Insurance Improve Network Security - A Market Analysis, In proceedings of IEEE INFOCOM 2014, Toronto, Canada (Disseration) 2. R. Pal, L. Golubchik, K. Psounis, and P. Hui - On A Way to Improve Cyber-Insurer Profits: When a Security Vendor Becomes the Cyber-Insurer, In proceedings of IFIP Networking, 2013, New York City, USA (Dissertation) 3. R. Pal and P. Hui - On Differentiating Cyber-Insurance Contracts: A Topological Perspective, In proceedings of IEEE/IFIP Internet Management Conference, Ghent, Belgium, 2013 (Dissertation) 4. R. Pal and P. Hui - Cyber-Insurance for Cyber-Security: A Topological Take on Modulating Insurance Premiums, In proceedings of ACM SIGMETRICS MAMA 2012, London, UK. Also to appear in SIGMETRICS Performance Evaluation Review, 2012 (Dissertation) 5. R. Pal - Cyber-Insurance for Cyber-Security: A Solution to the Information Asymmetry Problem, Appeared in SIAM Annual Meeting, 2012, Minnesota, USA 6. R. Pal, L. Golubchik, and K. Psounis - Aegis: A Novel Cyber-Insurance Model, In proceedings of GameSec, 2011, Maryland, USA 7. R. Pal and P. Hui - Modeling Investments in Internet Security: Tackling Topological Information Uncertainty, In proceedings of GameSec, 2011, Maryland, USA 8. R. Pal and L. Golubchik - On Economic Perspectives of Internet Security: The Problem of Designing Optimal Cyber-Insurance Contracts, In proceedings of ACM SIGMETRICS MAMA 2010, London, UK. Also appeared in SIGMETRICS Performance Evaluation Review, 2010 9. R. Pal and L. Golubchik - Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage, In proceedings of IEEE ICDCS, 2010, Genoa, Italy

Acknowledgements Professor Leana Golubchik, USC Professor Konstantinos Psounis, USC My PhD qualifying committee at USC Prof. Pan Hui, HKUST, and T-Labs, Berlin, Germany Professor Ross Anderson, Cambridge University Dr. Tyler Moore, Harvard University Princeton EDGE Laboratory, Princeton University, ( Headed by Professor Mung Chiang) Professor Golubchik s research group at USC Professor Jean-Yves LeBoudec, EPFL, Lausanne Audiences at GameSec, SIGMETRICS MAMA, ICDCS, SIAM Annual Meeting, IEEE/IFIP IM, IFIP Networking, IEEE INFOCOM, TU Lisbon, Nokia-Siemens Networks, Lisbon Provost Fellowship programme at USC 44

Other Publications in PhD 1. R.Pal et.al. A Real-Time Pricing Model for Electricity Consumption, accepted in SIAM Conference on Financial Mathematics and Engineering, 2012, Minnesota, USA 2. R.Pal et.al. On Social Community Networks: The Cost Sharing Problem, accepted in ACM SIMPLEX 2012 Workshop, in conjunction with WWW conference, Lyon, France 3. R.Pal et.al. Economic Models for Cloud Service Markets: Pricing and Capacity Planning, published in Elsevier Theoretical Computer Science, 2013, Vol. 496. 4. R.Pal et.al. Economic Models for Cloud Service Markets accepted in ICDCN 2012, Hong Kong. (Also invited by INFORMS Annual Meeting 2011, Charlotte, North Carolina, USA). 5. R.Pal et.al. Settling For Less : A QoS Compromise Mechanism for Mobile Opportunistic Networks accepted in ACM SIGMETRICS Workshop (MAMA 2011), San Jose, USA. A slightly modified version of this paper appeared in ACM SIGMETRICS Performance Evaluation Review, 2011, Vol. 39(3) 6. R.Pal et.al. Sharing-Mart: Online Auctions for Digital Content Trading and Content Incentivization, accepted in GameNets, 2011, Shanghai, China. (A flagship conference on game theory applications in communication networks) 7. R.Pal et.al. On Wireless Social Community Network Routers: The Design and Cost Sharing Problem for Better Deployment, accepted in IEEE GLOBECOM 2010, Florida, USA. 8. R.Pal et.al. Sharing Costs in Social Community Networks, accepted in IEEE ICNC Workshop on Computing Networking and Communications, 2012, Maui, Hawaii, USA. 9. R.Pal et.al. Playing Games with Human Health: A Game-Theoretic Approach to Optimizing Reliability in Wireless Health Networks, accepted in IEEE ISABEL 2010, Rome, Italy.

Thank You Questions? Email : rpal@usc.edu 46