Download presentation

Presentation is loading. Please wait.

Published byMike Gunnison Modified over 3 years ago

1
Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.

2
Threats and Vulnerabilities Attacks are exogenous

3
Contribution (1) Optimal security investment for a single agent -Gordon and Loeb model, 1/e rule -Monotone comparative statics (2) Optimal security investment for an interconnected agent - Network externalities (3) Equilibrium analysis of the security game - Free-rider problem, Critical mass, PoA

4
(1) Single agent Two parameters: – Potential monetary loss: – Probability of security breach without additional security: Agent can invest to reduce the probability of loss to: Optimal investment:

5
(1) Gordon and Loeb Class of security breach probability functions: measure of the productivity of security. Gordon and Loeb (2002)

6
(1) Gordon and Loeb (cont.) vulnerability Optimal investment (size of potential loss fixed)

7
(1) Gordon and Loeb (cont.) Probability of loss for a given investment

8
(1) Gordon and Loeb (cont.) High vulnerability Low vulnerability

9
(1) Conditions for monotone investment If then is non-decreasing Augmenting return of investment with vulnerability: Extension to submodular functions.

10
(1) The 1/e rule If the function is log-convex in x then the optimal security investment is bounded by:,i.e of the expected loss

11
Contribution (1) Optimal security investment for a single agent -Gordon and Loeb model, 1/e rule -Monotone comparative statics (2) Optimal security investment for an interconnected agent - Network externalities (3) Equilibrium analysis of the security game - Free-rider problem, Critical mass, PoA

12
(2) Effect of the network Agent faces an internal risk and an indirect risk. Information available to the agent: in a poset (partially ordered set). Optimal security investment:

13
(2) How to estimate the probability of loss? Epidemic risk model Binary choice for protection Limited information on the network of contagion (physical or not): degree distribution. – Best guess: take a graph uniformly at random. Galeotti et al. (2010)

14
Attacker directly infects an agent N with prob. p. Each neighbor is contaminated with prob. q if in S or if in N. (2) Epidemic Model Attacker N S

15
(2) Monotone comparative statics If the function is strictly decreasing in for any then the optimal investment is non-decreasing. Equivalent to: Network externalities function is decreasing:

16
(2) Strong protection An agent investing in S cannot be harmed by the actions of others:. in previous equation. Decreasing network externalities function.

17
(2) Weak protection If, the network externalities function is:

18
Contribution (1) Optimal security investment for a single agent -Gordon and Loeb model, 1/e rule -Monotone comparative statics (2) Optimal security investment for an interconnected agent - Network externalities (3) Equilibrium analysis of the security game - Free-rider problem, Critical mass, PoA

19
(3) Fulfilled expectations equilibrium Concept introduced by Katz & Shapiro (85) Willingness to pay for the agent of type : multiplicative specification of network externalities, Economides & Himmelberg (95). C.d.f of types: % with Willingness to pay for the ‘last’ agent:

20
(3) Fulfilled expectations equilibrium In equilibrium, expectation are fulfilled: The willingness to pay is: Extension of Interdependent Security 2 players game introduced by Kunreuther & Heal (03).

21
(3) Critical mass Equilibria given by the fixed point equation

22
(3) Critical mass (cont.) Equilibria given by the fixed point equation fraction of population investing in security cost

23
(3) Critical mass (cont.) If only one type: willingness to pay = network externalities function. fraction of population investing in security cost

24
(3) Price of Anarchy The social welfare function: Because of the public and private externalities, agent under-invest in security (in all cases). Public externalities Private externalities

25
Conclusion Simple single agent model: 1/e rule – General conditions for monotone investment Interconnected agents: network externalities function – General conditions to align incentives Equilibrium analysis of the security game – Critical mass, PoA Extensions: In this talk, agent is risk-neutral. What happens if risk-adverse? Insurance?

26
Thank you! Feedbacks are welcome: marc.lelarge@ens.fr

Similar presentations

OK

The Power of the Defender M. Gelastou M. Mavronicolas V. Papadopoulou A. Philippou P. Spirakis § University of Cyprus, Cyprus § University of.

The Power of the Defender M. Gelastou M. Mavronicolas V. Papadopoulou A. Philippou P. Spirakis § University of Cyprus, Cyprus § University of.

© 2018 SlidePlayer.com Inc.

All rights reserved.

To ensure the functioning of the site, we use **cookies**. We share information about your activities on the site with our partners and Google partners: social networks and companies engaged in advertising and web analytics. For more information, see the Privacy Policy and Google Privacy & Terms.
Your consent to our cookies if you continue to use this website.

Ads by Google

Fab ms ppt online Ppt on power grid failure 2013 Ppt on endangered species of birds Ppt on 10 sikh gurus name Ppt on chapter management of natural resources Ppt on credit policy of rbi Ppt on e marketing Ppt on high voltage engineering corporation Ppt on red and yellow soil Ppt on travel and tourism for class 10