Game-Theoretic Approaches to Critical Infrastructure Protection Workshop on Statistics and Counterterrorism November 20, 2004 Vicki Bier University of.

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.
Risk Models and Controlled Mitigation of IT Security R. Ann Miura-Ko Stanford University February 27, 2009.
Geoffrey Heal Graduate School of Business Columbia University Howard Kunreuther Center for Risk Management.
ABC. Question 1 Human capital is defined as: The knowledge, talent, and skills that people possess. A The common knowledge, talent, and skills that all.
Institutional interactions. Complementarity between pairs of institutions. Labor market institutions never operate in isolation. Their effects on labor.
MANAGERIAL ACCOUNTING
Learning Goals Calculate, interpret and evaluate the payback period.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/9/13 Modeling secrecy and deception in a multiple- period attacker–defender signaling game 1.
Evaluating Economic Performance
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/3/07 Defending simple series and parallel systems with imperfect false targets R. Peng, G. Levitin,
Chapter 6 © 2006 Thomson Learning/South-Western Game Theory.
Network Security An Economics Perspective IS250 Spring 2010 John Chuang.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/10/25 1 Research Direction Introduction.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
1 HIE Project Business Case HIMSS/NACCHO HIE Toolkit for Public Health Business Case Tool [INSERT ORGANIZATION NAME, DATE]
I Model of impact on society II Results, 4 sectors of society III 8 Case studies I Model of impact on society II Results, 4 sectors of society III 8 Case.
Geoffrey Heal Graduate School of Business Columbia University Howard Kunreuther Center for Risk Management.
Strategic Management/ Business Policy
1 What is the Game in Cyber Security? Ravi Sandhu Executive Director and Endowed Professor February 2011
Introduction to Decision Analysis
Defending Complex System Against External Impacts Gregory Levitin (IEC, UESTC)
Extensions to Consumer theory Inter-temporal choice Uncertainty Revealed preferences.
Insights from economic- epidemiology Ramanan Laxminarayan Resources for the Future, Washington DC.
Capturing Innovation: Turning Intellectual Assets into Business Assets Justin Woo IEOR 190G - Patent Engineering Professor Tal Lavian Project #2 – Chapter.
McGraw-Hill© 2000 The McGraw-Hill Companies 1 S M S M McGraw-Hill © 2000 The McGraw-Hill Companies Chapter 17 THE FINANCIAL AND ECONOMIC IMPACT OF SERVICE.
TESTING THE WATERS: USING COLLECTIVE REAL OPTIONS TO MANAGE THE SOCIAL DILEMMA OF STRATEGIC ALLIANCES Presented by Jong-kyung Park MATTHEW W. MCCARTER,
L2: Market Efficiency 1 Efficient Capital Market (L2) Defining efficient capital market Defining the value of information Example Value of information.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
TEST YOUR KNOWLEDGE LESSON 4: BACK TO SCHOOL ABC Lesson 4: Back to School.
ROLE OF THE IT FUNCTION: COSTS, ANALYSIS, DEVELOPMENT Based on materials by David Schuff.
Models for Estimating Risk and Optimizing the Return on Security Investment.
RISK & CAPACITY INVESTMENT INCENTIVES IN ELECTRICITY MARKETS Peter Jackson Department Of Management University Of Canterbury.
ATP NVAC PIWG Report Pandemic Influenza Antiviral Strategies and Priority Groups Andrew T. Pavia M.D. University of Utah.
Risk Analysis vs Security Controls. Security Controls Risk assessment is a flawed safeguard selection method. There is a tendency to confuse security.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Topics → Business strategy must set goals → Partners selection → Criteria for selecting partners → Structure must maximize cooperation → Incentives for.
HSA 171 CAR. 1436/ 7/4  The results of activities of an organization or investment over a given period of time.  Organizational Performance: ◦ A measure.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall Basic Challenges of Organizational Design 4-1.
PrimAmérica CONSULTORES Investment of Pension Funds: Challenges for the Regulation* Augusto Iglesias Palau PrimAmérica Consultores May, 2004 * Presented.
Vertical Scope of the Firm What are the appropriate vertical boundaries of the firm?
1 8 Strategy in the Global Environment. 2 Related Concepts/Theories Theory of comparative advantage – a country is ahead, and all other country’s benefit,
M & E TOOLKIT Jennifer Bogle 11 November 2014 Household Water Treatment and Water Safety Plans International and Regional Landscape.
Risk management and disaster preparedness
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Ch2b: Decisions &Decision Makers Decision Support Systems in the 21 st Century by George M. Marakas.
Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Portfolio Management Unit – IV Risk Management Unit – IV Risk Management.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
© 2005 Kevin J. Laverty Real options and organizational capabilities Kevin Laverty May 2005.
Slide 1/20 Defending Against Strategic Adversaries in Dynamic Pricing Markets for Smart Grids Paul Wood, Saurabh Bagchi Purdue University
Chapter 1 Overview of a Financial Plan. Copyright ©2014 Pearson Education, Inc. All rights reserved.1-2 Chapter Objectives Explain how you benefit from.
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
Chapter 11 Capital Budgeting Techniques: Certainty and Risk Lawrence J. Gitman Jeff Madura Introduction to Finance.
1 On the Choice Between Group-Based and Individual-Based Pensions--The Role of Financial Education Dean M. Maki Vice President and Economist Putnam Investments.
Economic Analysis in the Public Sector Benefit/Cost Analysis.
Chapter 27 Credit Risk.
Strategic Management/ Business Policy
Optimal Deposit Insurance Eduardo Dávila (NYU, Stern)
The Role of Financial Leadership in a Challenging Economic Climate “Financial Management from a Provincial Perspective” Presented by: Bruce L. Bennett.
Power Point Set 9b: Competitive Dynamics: Real Options
Power Point Set 9b: Competitive Dynamics: Real Options
The SWA Collaborative Behaviors
Strategic Management/ Business Policy
Strategic Management/ Business Policy
Advisor: Yeong-Sung Lin Presented by Chi-Hsiang Chan
Power Point Set 9b: Competitive Dynamics: Real Options
Economics and computer security
Strategic Management/ Business Policy
Presentation transcript:

Game-Theoretic Approaches to Critical Infrastructure Protection Workshop on Statistics and Counterterrorism November 20, 2004 Vicki Bier University of Wisconsin-Madison

Research Objectives Objective: – –Study optimal allocation of resources for protection of systems against intentional attacks Related to risk analysis: – –With close tie to economics – –(Game theory is a branch of economics) Potentially applicable in many areas

Background Because attackers can modify their strategies in response to our defensive investment: – –Defense will generally be more costly when the adversary can observe the system defenses “Investment in defensive measures, unlike investment in safety measures, saves a lower number of lives…than the apparent direct contribution of those measures” – –Ravid (2002) Security improvements may be less cost-effective than they would initially appear

Game Theory Determine the optimal defense against an optimal attack Game theory is a useful model for security and critical infrastructure protection: – –Appropriate when protecting against intelligent and adaptable adversaries – –Recognizes that defensive strategies must account for attacker behavior

Game between Attackers and Defenders Need to make assumptions about: – –Attacker goals and constraints – –Defender goals and constraints – –System design features Protective investment assumed to reduce success probability of attacks

Game between Attackers and Defenders Consider security of a simple series system: – –Defending series systems against informed and determined attackers is a difficult challenge If the attacker knows about the system’s defenses, the defender’s options are limited: – –The defender is largely deprived of the ability to allocate defensive investments by their cost-effectiveness – –Instead, defensive investments must equalize the “attractiveness” of all defended components

Importance of Redundancy Parallel systems: – –Any component can perform the function – –Attacker must disable all to succeed Series systems: – –Attacker has a wide choice of targets – –Defender must protect all components!   Physically in series (pipelines, electric lines)  Multiple failure modes (e.g., multiple points of entry)

Weakest Link Models Defender must equalize the attractiveness of all defended components This is generally consistent with the Brookings Institution recommendation to defend only the most valuable assets However, terrorists also consider the probability of success in choice of targets: – –So models should take the success probabilities of attacks against various targets into account

Attacker Knowledge The assumption that attackers know our defenses may not be unrealistic: – –Due to the openness of our society Public demands knowledge of our defense: – –Even when this weakens its effectiveness! This increases difficulty of defense: – –E.g., anthrax protection Defensive measures may not be effective if they can be easily observed

System Design Features Redundancy reduces attacker flexibility: – –And increases defender flexibility Traditional reliability design considerations: – –Spatial separation – –Functional diversity are also important to defensive strategy Examples: – –Defenses that do not require electricity – –Use of both land lines and satellite communications Secrecy and deception can also be valuable

Extensions with Hedging Real-world decision makers will want to hedge: – –In case they guess wrong about which targets are most attractive to attackers Recent work assumes that attackers target the most attractive component: – –But defenders are uncertain about their attractiveness Attackers will in general have different values for targets than defenders: – –For example, Al-Qaeda prefers targets that are “recognizable in the Middle East” (Woo)

Defending one target can deflect attacks to targets that are: – –Less attractive to attackers (a priori) – –But more damaging to defenders! Optimal defense frequently still involves allocating zero resources to targets with a non-zero probability of successful attack, especially if: – –Targets value widely in their values – –Defender is highly resource-constrained Extensions with Hedging

Sample Application Our results shed light on appropriate allocation of resources among targets: Our results shed light on appropriate allocation of resources among targets: –Focus on the most attractive (and most vulnerable) targets –Spend less money on targets that are unlikely to be attacked Some states may have relatively few targets worth much investment Some states may have relatively few targets worth much investment

Security versus Safety In safety applications: In safety applications: –Natural hazards –Accident prevention the 80/20 rule works well: –Address the top 80% of the risks, at 20% of the cost By contrast, in security applications: By contrast, in security applications: –It may not be worthwhile spending anything at all –Unless you address all serious vulnerabilities Example: Example: –Don’t bother searching purses and backpacks –If you don’t also search baby carriages!

Extensions in Progress More complicated system structures: – –E.g., adapting past work on least-cost diagnosis to identify “least-cost” attack strategies – –As a building block for optimal (or near-optimal) defenses Non-convex functions for attack success probability as a function of investment: – –If minimal levels of investment are required – –If investment beyond a threshold deters attackers Secrecy and deception: – –When are these useful? – –How can we quantify their benefits?

Game between Defenders Consider effects of defensive actions on the risks faced by other defenders: – –And therefore the strategies they adopt Some defenses (e.g., car alarms) increase risk to other defenders: – –Payoff of investing to any one individual is greater than the net payoff to society – –Typically leads to overinvestment in security Other defenses (e.g., vaccination) decrease risk to other defenders: – –“Free riders” – –Typically lead to underinvestment in security

Extended an earlier “static” model by Kunreuther and Heal to account for attacks over time: – –Example--computerized supply chain partners Differences in discount rates can lead some agents not to invest in security when it is otherwise in their interests: – –If other agents choose not to invest Differences in discount rates can arise due to: – –Industries with different rates of return – –Risk of impending bankruptcy – –Myopia This game can have multiple equilibrium solutions: – –Creating a need for coordinating mechanisms Game between Defenders

Sample Application Computer security in electronic supply chains: – –Companies may be vulnerable to weaknesses in computer security on the part of their partners – –This can reduce their incentives to invest in their own computer security Coordinating mechanisms can help to address this problem: – –Contract terms – –Government regulation – –Development of international standards – –Loans to enable partners who are not as financially stable to improve their computer security

Conclusions Protecting against intentional attacks must account for attacker responses: – –Most applications of risk analysis fail to take this into account – –Most applications of game theory to security deal with individual components in isolation Combining these approaches makes it possible to invest more cost-effectively: – –Avoids wasting resources on defenses that can easily be disabled or circumvented by attackers