Individual security and network design

Similar documents
21. Unverifiable Investment, Hold Up, Options and Ownership

Modeling Internet Security Investments Tackling Topological Information Uncertainty

Computational Game Theory and Clustering

Remedies vs. Extreme Options in Merger Control

Network Security Validation Using Game Theory

A Graph-Theoretic Network Security Game. Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou and Paul G. Spirakis

Hacking-proofness and Stability in a Model of Information Security Networks

A Graph-Theoretic Network Security Game

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation

Cyber Security. Chris Hankin, Imperial College London November 2014

Microeconomic Theory Jamison / Kohlberg / Avery Problem Set 4 Solutions Spring (a) LEFT CENTER RIGHT TOP 8, 5 0, 0 6, 3 BOTTOM 0, 0 7, 6 6, 3

How To Understand Network Security

Why Plaintiffs Attorneys Use Contingent and Defense Attorneys Fixed Fee Contracts

Strengthening International Courts and the Early Settlement of Disputes

Econ 430 Lecture 9: Games on Networks

University of Oslo Department of Economics

5.1 Bipartite Matching

Comparing Decision Support Approaches for Cyber Security Investment

The Max-Distance Network Creation Game on General Host Graphs

System Reliability and Free Riding

Imperfect monitoring in communication networks

ECONOMICS OF DEBT COLLECTION: ENFORCEMENT OF CONSUMER CREDIT CONTRACTS

Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium

Chapter 7. Sealed-bid Auctions

ECON Game Theory Exam 1 - Answer Key. 4) All exams must be turned in by 1:45 pm. No extensions will be granted.

Perfect Bayesian Equilibrium

Peer Pressure. June 28, 2008 Revised: April 18, 2009 Forthcoming in the Journal of the European Economic Association. Abstract

Compact Representations and Approximations for Compuation in Games

Working Paper Does retailer power lead to exclusion?

A Simple Model of Price Dispersion *

RUHR. Commitment Problems and War in International Bargaining ECONOMIC PAPERS #403. Erwin Amann Nadine Leonhardt

Backward Induction and Subgame Perfection

The Stability and Efficiency of Economic and Social Networks

Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency

Institution Formation in Public Goods Games

Bargaining Solutions in a Social Network

On the effect of taxation in the online sports betting market

Screening by the Company You Keep: Joint Liability Lending and the Peer Selection Maitreesh Ghatak presented by Chi Wan

When is Reputation Bad? 1

Social Distance Games

Credible Discovery, Settlement, and Negative Expected Value Suits

Random graphs with a given degree sequence

Secure or Insure? Analyzing Network Security Games with Externalities

NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS

Price competition with homogenous products: The Bertrand duopoly model [Simultaneous move price setting duopoly]

Closing the Price of Anarchy Gap in the Interdependent Security Game

Monitoring and the acceptability of bank money

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games

Existence of pure Nash equilibria (NE): Complexity of computing pure NE: Approximating the social optimum: Empirical results:

Who Should Pay the Sports Agent s Commission? An Economic Analysis of Setting the Legal Rules in the Regulation of Matchmakers

Equilibrium computation: Part 1

Théorie de la décision et théorie des jeux Stefano Moretti

Bounded Budget Betweenness Centrality Game for Strategic Network Formations

Investment in Public Infrastructure and Tax Competition between Contiguous Regions

Towards a compliance audit of SLAs for data replication in Cloud storage

All trees contain a large induced subgraph having all degrees 1 (mod k)

Jack of All Trades or a Master of One? Specialization, Trade and Money 1

CIS 700: algorithms for Big Data

Role of Network Topology in Cybersecurity

Adverse Selection and the Market for Health Insurance in the U.S. James Marton

Network Security A Decision and Game-Theoretic Approach

Competition for Order Flow as a Coordination Game

Intellectual Property Right Protection in the Software Market

Application of Game Theory in Inventory Management

Behavioural Economics: Introduction to Behavioral Game Theory and Game Experiments. University of Oxford, Michaelmas Term 2013.

Lecture 11: Sponsored search

Decentralization and Private Information with Mutual Organizations

Social and Economic Networks: Lecture 1, Networks?

Time Inconsistency and Free-Riding in a Monetary Union

Decentralised bilateral trading, competition for bargaining partners and the law of one price

Brake's Theory of Bining in the Stock Market

Liability Insurance as Protection Against Legal Error. Vickie Bajtelsmit Colorado State University. and

Voluntary Participation in Cyber-insurance Markets

A Game Theoretical Framework for Adversarial Learning

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective

Participating insurance contracts and the Rothschild-Stiglitz equilibrium puzzle

Advanced Game Theory

Buying and Selling Traffic: The Internet as an Advertising Medium

Value Co-Creation in IT Outsourcing and Software Development*

Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures

1 Nonzero sum games and Nash equilibria

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2

Renegotiation-Blocking Through Financial Claims

Social Media Mining. Graph Essentials

Competition, Speculative Risks, and IT Security Outsourcing

Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output.

Game Theory: Supermodular Games 1

Industry profit in an oligopoly (sum of all firms profits) < monopoly profit.

Knowledge Transfer and Partial Equity Ownership

Oligopoly and Strategic Pricing

Cybersecurity Games and Investments: A Decision Support Approach

Equilibrium strategic overbuying

On the Existence of Nash Equilibrium in General Imperfectly Competitive Insurance Markets with Asymmetric Information

Conference Paper Learning faster or more precisely? Strategic experimentation in networks

Switching Cost, Competition, and Pricing in the Property/Casualty Insurance Market for Large Commercial Accounts

Alok Gupta. Dmitry Zhdanov

Lottery versus all-pay auction models of lobbying

Mitigating Hold-up Through Complementarities and Refunds

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Transcription:

Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015

Motivation Networks often face external threats in form of strategic or random attacks The attacks can be prevented by protecting selected nodes of he network Decentralizing protection decisions leads to inefficiencies Can these inefficiencies be minimized by properly choosing the network topology?

Networks G = (V, E ): undirected graph over V, V set of nodes, V = n, E set of edges over V, E {ij : i, j V } Given U V, E [U] = {ij E : i, j U}, G [U] = (U, E [U]): subgraph induced by U G(U): set of all graphs over U Given X N, G X = G [V \ X ] Component in G is a maximal set of nodes C V s.t. for all i, j C, i and j are connected C(G ): the set of all components in G

Network value function (Network) value function Φ : U V G(U) R assigns numeric value Φ(G ) to network G U V G(U) We consider value functions of the form Φ(G ) = f ( C ), C C(G ) where f is strictly increasing, strictly convex and f (0) = 0 Example 1: f (x) = x 2 (Metcalfe s law) Example 2: f (x) = 2 x 1 ( Reed s law)

Defence and attack Defence is perfect: defended nodes cannot be removed Using defence has cost c > 0 Given network G and set of defended nodes V, G is called attack network Attack targets a single node x V This removes set of nodes { if x E x (G ) = C x (G ) otherwise

Defence and attack x g

Defence and attack x g

Defence and attack x g, E x (g Δ)

Defence and attack x g Δ

Defence and attack g E x (g Δ)

Exogenous network It is known that when the network is fixed, decentralization of defence decisions leads to inefficiencies Both underprotection and overprotection are possible in equilibrium of network defence game What happens when the designer can choose the network prior to network defence game?

The game There are n + 2 players: the designer (D), the nodes (V ) and the adversary (A) The game has three stages: 1. D chooses network G G(V ) 2. Nodes choose simultaneously whether to protect or not, this determines the set of defended nodes 3. A chooses a node x V to attack The attack spreads which leads to residual network G E x (G )

Preferences and payoffs: Designer Given network G G(V ), the set of defended nodes V and attack x V, payoff to D is Π D (G,, x) = Φ(G E x (G )) c

Preferences and payoffs: Nodes Given network G G(V ), the set of defended nodes V and attack x V, payoff to node i V is { f ( Ci Π i (G E x (G )) ) (G,, x) = C i (G E x [x ] c, if i = x (G )) 0, otherwise

Preferences and payoffs: Adversary Given network G G(V ), the set of defended nodes V and attack x V, payoff to A is Π A (G,, x) = Φ(G E x (G ))

First best Proposition (1) Let (G, ) be optimal defended network chosen by the designer and let If 0 < c < c 1 (n), then g is connected and = V If c 1 (n) < c < c 2 (n), then g is a star and = {i}, where i is the centre of g If c 2 (n) < c, then g has q 1 components of size and one of size n mod (q 1), = n q 1

Optimal network with decentralized defence Let Γ(G ) denote the nodes-adversary subgame ensuing after network G is chosen Lemma (1) For any G and c, Γ(G ) has an equilibrium in pure strategies Let E(G, c) denote the set of all equilibria of Γ(G )

Optimal network with decentralized defence Definition Given G G(n), equilibrium (, x) E(G, c) is welfare maximising iff Π D (G,, x) = max (,x ) E(G,c) ΠD (G,, x ) and (, x) E(G, c) is welfare minimising iff Π D (G,, x) = min (,x ) E(G,c) ΠD (G,, x )

Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization

Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization 1. Underprotection, due to positive externalities (e.g. f (x) = x 2, n < c < (n 1) 2 and centre of a star network)

Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization 1. Underprotection, due to positive externalities (e.g. f (x) = x 2, n < c < (n 1) 2 and centre of a star network) 2. Overprotection, due to negative externalities (e.g. f (x) = x 2, 2n 1 n 1 < c < n 1 and all nodes of star network)

Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization 1. Underprotection, due to positive externalities (e.g. f (x) = x 2, n < c < (n 1) 2 and centre of a star network) 2. Overprotection, due to negative externalities (e.g. f (x) = x 2, 2n 1 n 1 < c < n 1 and all nodes of star network) 3. Coordination on wrong equilibria (e.g. connected network and all- or no-nodes protect)

Optimal network with decentralized defence There are three main reasons to inefficiencies due to decentralization 1. Underprotection (e.g. f (x) = x 2, n < c < (n 1) 2 and centre of a star network) 2. Overprotection, due to negative externalities (e.g. f (x) = x 2, 2n 1 n 1 < c < n 1 and all nodes of star network) 3. Coordination on wrong equilibria (e.g. connected network and all- or no-nodes protect) Can the designer mitigate these problems by carefully choosing the network topology? How well can s/he do?

Optimal networks under welfare maximising equilibria What networks should be chosen assuming that the nodes and A choose a welfare maximising equilibrium in their subgame? The only problem is the range of costs (c 1 (n), c 2 (n)) with centrally protected star being first best We need to avoid overprotection reduce incentives to protect

Optimal networks under welfare maximising equilibria Example: f (x) = x 2, n = 96, c = 30 13 nodes 83 nodes

Optimal networks under welfare minimising equilibria What networks should be chosen assuming that the nodes and A choose a welfare minimising equilibrium in their subgame? There is no problem for high costs Splitting the network still works for intermediate costs (the equilibrium outcome is unique on the split network) When costs of protection are low we need to avoid the coordination problem Equilibrium uniqueness can be obtained by properly choosing network topology

Optimal networks under welfare minimising equilibria Definition (k-critical node) Given a connected network G G(V ) node i V is k-critical iff max C C(G {i}) C = k k-critical node, if it protects, can secure at least n k nodes from being removed

Optimal networks under welfare minimising equilibria f (x) = x 2, n = 19, 9 < c < 10 i

Optimal networks under welfare minimising equilibria Lemma (7) Let G G(V ) be a connected network. If all nodes protect in every equilibrium of Γ(G ), then G has a k-critical node where k > c satisfies f (n k) n k Existence of k-critical node with f (n k) n k > c is a necessary but not sufficient condition for full protection in every equilibrium of Γ(G )

Optimal networks under welfare minimising equilibria f (x) = x 2, n = 19, 9 < c < 10 j i

Optimal networks under welfare minimising equilibria Lemma (8) Let G G(V ) be a connected network and k satisfy f (n k) n k > c. If for all i V, either i is k-critical or i has link to a k-critical node, then all nodes protect in every equilibrium of Γ(g)

Optimal networks under welfare minimising equilibria f (x) = x 2, n = 19, 9 < c < 10 i

Optimal networks under welfare minimising equilibria f (x) = x 2, n = 19, 9 < c < 10 i

Interaction design The presented problem is an example of a more general idea Given a type of local interactions (game) can we enforce desired outcomes by properly choosing connections between nodes?