Presentation is loading. Please wait.

Presentation is loading. Please wait.

Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.

Similar presentations


Presentation on theme: "Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy."— Presentation transcript:

1 Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy (Yale University)

2 Outline  Motivation Our Model Nash Strategies Optimum Strategies Sum-of-Squares Partition Problem Conclusion

3 Question: Will you install anti-virus software? Norton AntiVirus 2005 = $49.95 Value of your data = $350.00 Infection probability = 1/10 Expected loss = $35.00

4 Answer: Probably not. Norton AntiVirus 2005 = $49.95 Value of your data = $350.00 Infection probability = 1/10 Expected loss = $35.00

5 This selfish behavior… … fails to achieve the social optimum.

6 What if instead… … a benevolent dictator decided which computers install an anti-virus? Center node must install an anti-virus or else!

7 Outline Motivation  Our Model Nash Strategies Optimum Strategies Sum-of-Squares Partition Problem Conclusion

8 Our Model The network is an undirected graph G = (V,E). Installing anti-virus software is a single round non-cooperative game. The players are the network nodes: V = {0,1,…,n-1}.

9 Our Model : Strategies Each node has two actions: do nothing or inoculate itself. a i = probability that node i installs anti- virus software. Write the strategies of all n players as vector

10 Our Model : Attack Model After the nodes choose their strategies, the adversary picks a starting point for infection uniformly at random Node i gets infected if it has no anti-virus software installed and if any of its neighbors become infected.

11 0 2 1 Our Model : Attack Model (cont.) 3 54 Example: Only node 3 installs anti-virus software. Adversary chooses to infect node 2.

12 Our Model : Attack Graph 01 23 54 0 23 54 network graph Gattack graph G a = G - I a 1 Attack Graph: subgraph of G induced by removing nodes that install antivirus

13 Our Model : Individual Costs Anti-virus software costs C. Loss from infection is L. Cost of strategy to node i: Here, p i ( ) = Pr[i is infected | i does not install an anti-virus]

14 Our Model : Social Cost Social cost of is simply a sum of individual costs:

15 Outline Motivation Our Model  Nash Strategies Optimum Strategies Sum-of-Squares Partition Problem Conclusion

16 Nash Strategies: Quick definition Def: Strategy profile is in Nash equilibrium if no node can improve its payoff by switching to a different strategy.

17 Nash Strategies: Some intuition Some Intuition: Suppose a i =0, but node i expects that it will lie in component of size greater than t=Cn/L in attack graph. Prob[i infected] = t/n. Then its expected loss from infection is >L·(Cn/L)/n = C and it will switch to a i = 1.

18 Nash Strategies: Characterization Thm: There is a threshold t=Cn/L such that each node in a Nash equilibrium  will install an anti-virus if it would otherwise end up in a component of expected size > t in the attack graph.  will not install an anti-virus if it would end up in a component of expected size < t in the attack graph.  is indifferent between installing and not installing when the expected size = t in the attack graph.

19 Nash Strategies (cont.) Example: Let C=0.5,L=1 so that t=Cn/L=2.5. Then is not a Nash equilibrium. 01 23 54 0 23 54 network graph G attack graph G a = G - I a 1

20 Nash Strategies (cont.) Thm: It is NP-hard to compute a pure Nash equilibrium with lowest (resp., highest) cost. Thm: There exists a pure Nash equilibrium, which can be achieved by a distributed, iterative process in 2n steps.

21 Price of Anarchy Price of anarchy measures how far away a Nash equilibrium can be from the social optimum Formally, it is the worst-case ratio between cost of Nash equilibrium and cost of social optimum For network G and costs C, L, we denote it:

22 A lower bound Consider a star graph K 1,n. Let C=L(n-1)/n so that t=n-1. G = K 1,n 0 n-1 1 2 3n-2 …

23 Price of Anarchy (cont.) Then, is an optimum strategy with cost C+L(n-1)/n. G = K 1,n 0 n-1 1 2 3n-2 … G a* 0 n-1 1 2 3n-2 …

24 Price of Anarchy (cont.) And is worst-cost Nash with cost C+L(n-1) 2 /n. G = K 1,n 0 n-1 1 2 3n-2 … G a* 0 n-1 1 2 3n-2 …

25 Price of Anarchy (cont.) Lower Bound: For a star graph K 1,n,  (G, C, L) = n/2. Upper Bound: For any graph G and any C, L,  (G, C, L)≤ n. Thm: Price of anarchy in our game is  (G, C, L) =  (n).

26 Outline Motivation Our Model Nash Strategies  Optimum Strategies Sum-of-Squares Partition Problem Conclusion

27 Optimum Strategies So, allowing users to selfishly choose whether or not to install anti-virus software may be very inefficient Instead, let’s have a benevolent dictator compute and impose a solution maximizing overall welfare

28 Optimum Strategies (cont.) Unfortunately, Thm: It is NP-hard to compute an optimum strategy. Fortunately, Thm: a strategy with cost at most O(log 2 n) OPT can be computed in polytime.

29 Outline Motivation Our Model Nash Strategies Optimum Strategies  Sum-of-Squares Partition Problem Conclusion

30 Sum-of-Squares Partition We can reduce the network security problem to the following. Problem: By removing a set of at most m nodes, partition the graph into mutually disconnected components {H i }, such that  i |H i | 2 is minimum.

31 Sum-of-Squares Partition (cont.) Thm: We can find a set of O(log 2 n)m nodes whose removal partitions the graph into components {H i } such that  i |H i | 2 = O(1)OPT. Proof sketch: The approach is similar to greedy log n approximation algorithm for set cover. We recursively partition the graph by repeatedly removing the node cut that gives the best “per-node benefit.”

32 Sum-of-squares partition (cont.) Suppose we remove node set R to cut a graph H into components H i and H j. cost effectiveness of cut R is: (|H| 2 -|H i | 2 - |H j | 2 )/|R| Lemma: Leighton-Rao algorithm for node cuts will find a cut with cost effectiveness within O(log n) of best cost effectiveness. O(log 0.5 n) algorithms do not extend to directed cuts, and thus cannot be used for node cuts.

33 Rough Outline of Algorithm In first iteration, partition the graph G into H 1,H 2 by removing a sparse node cut. G

34 Rough Outline of Algorithm In first iteration, partition the graph G into H 1,H 2 by removing a sparse node cut. H1H1 H2H2

35 Rough Outline of Algorithm In subsequent iterations, cut the H i for which we find the cut with the best cost effectiveness. H1H1 H2H2

36 Rough Outline of Algorithm Complete details can be found in full version: http://www.cs.yale.edu/~aspnes/inoculation-abstract.html http://www.cs.yale.edu/~aspnes/inoculation-abstract.html H1H1 H2H2 H3H3

37 Outline Motivation Our Model Nash Strategies Optimum Strategies Sum-of-Squares Partition Problem  Conclusion

38 Conclusion We proposed a simple game for modeling containment of viruses in a network. Nash equilibria of our game have a simple characterization. We showed that, in the worst case, they can be far off from the optimum solution. However, a near-optimum deployment of anti- virus software can be computed by reduction to the sum-of-squares partition problem.

39 Open Problems Introduce a discount (or taxation) mechanism into the system. Consider a “smart” adversary who targets the biggest component in the attack graph. Is there an approximation algorithm for the sum-of-squares partition problem that removes fewer nodes or has a better approximation ratio?

40 Questions?


Download ppt "Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy."

Similar presentations


Ads by Google