Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,

Slides:



Advertisements
Similar presentations
A Local Mean Field Analysis of Security Investments in Networks Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) NetEcon 2008.
Advertisements

Chapter 17: Making Complex Decisions April 1, 2004.
Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.
Ultimatum Game Two players bargain (anonymously) to divide a fixed amount between them. P1 (proposer) offers a division of the “pie” P2 (responder) decides.
Price Of Anarchy: Routing
Game Theory Assignment For all of these games, P1 chooses between the columns, and P2 chooses between the rows.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Fast Convergence of Selfish Re-Routing Eyal Even-Dar, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
An Introduction to... Evolutionary Game Theory
EC3224 Autumn Lecture #04 Mixed-Strategy Equilibrium
Social Networks 101 P ROF. J ASON H ARTLINE AND P ROF. N ICOLE I MMORLICA.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Game Theory Eduardo Costa. Contents What is game theory? Representation of games Types of games Applications of game theory Interesting Examples.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Bundling Equilibrium in Combinatorial Auctions Written by: Presented by: Ron Holzman Rica Gonen Noa Kfir-Dahav Dov Monderer Moshe Tennenholtz.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
P.V. VISWANATH FOR A FIRST COURSE IN INVESTMENTS.
1 Computing Nash Equilibrium Presenter: Yishay Mansour.
Maximum Likelihood We have studied the OLS estimator. It only applies under certain assumptions In particular,  ~ N(0, 2 ) But what if the sampling distribution.
Convergence Time to Nash Equilibria in Load Balancing Eyal Even-Dar, Tel-Aviv University Alex Kesselman, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
Outline  In-Class Experiment on Centipede Game  Test of Iterative Dominance Principle I: McKelvey and Palfrey (1992)  Test of Iterative Dominance Principle.
Modelling the control of epidemics by behavioural changes in response to awareness of disease Savi Maharaj (joint work with Adam Kleczkowski) University.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Game Theory.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
MAKING COMPLEX DEClSlONS
Chapter 12 & Module E Decision Theory & Game Theory.
NOBEL WP Szept Stockholm Game Theory in Inter-domain Routing LÓJA Krisztina - SZIGETI János - CINKLER Tibor BME TMIT Budapest,
Network Economics: two examples Marc Lelarge (INRIA-ENS) SIGMETRICS, London June 14, 2012.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy.
A Queueing Model for Yield Management of Computing Centers Parijat Dube IBM Research, NY, USA Yezekael Hayel IRISA, Rennes, France INFORMS Annual Meeting,
Experiments on Risk Taking and Evaluation Periods Misread as Evidence of Myopic Loss Aversion Ganna Pogrebna June 30, 2007 Experiments on Risk Taking and.
Games. Adversaries Consider the process of reasoning when an adversary is trying to defeat our efforts In game playing situations one searches down the.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
BLAST: Basic Local Alignment Search Tool Altschul et al. J. Mol Bio CS 466 Saurabh Sinha.
Computer Vision Lecture 6. Probabilistic Methods in Segmentation.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
1 What is Game Theory About? r Analysis of situations where conflict of interests is present r Goal is to prescribe how conflicts can be resolved 2 2 r.
On Selfish Routing In Internet-like Environments Lili Qiu (Microsoft Research) Yang Richard Yang (Yale University) Yin Zhang (AT&T Labs – Research) Scott.
Institute of Physics Wroclaw University of Technology 28/09/2005 How can statistical mechanics contribute to social sciences? Piotr Magnuszewski, Andrzej.
1. 2 Some details on the Simplex Method approach 2x2 games 2xn and mx2 games Recall: First try pure strategies. If there are no saddle points use mixed.
Asymptotic behaviour of blinking (stochastically switched) dynamical systems Vladimir Belykh Mathematics Department Volga State Academy Nizhny Novgorod.
Steffen Staab 1WeST Web Science & Technologies University of Koblenz ▪ Landau, Germany Network Theory and Dynamic Systems Cascading.
On Investor Behavior Objective Define and discuss the concept of rational behavior.
By: Donté Howell Game Theory in Sports. What is Game Theory? It is a tool used to analyze strategic behavior and trying to maximize his/her payoff of.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
2.5 The Fundamental Theorem of Game Theory For any 2-person zero-sum game there exists a pair (x*,y*) in S  T such that min {x*V. j : j=1,...,n} =
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Evolution of Cooperation in Mobile Ad Hoc Networks Jeff Hudack (working with some Italian guy)
Behavioral Finance Preferences Part I Feb 16 Behavioral Finance Economics 437.
OVERCOMING COORDINATION FAILURE THROUGH NEIGHBORHOOD CHOICE ~AN EXPERIMENTAL STUDY~ Maastricht University Arno Riedl Ingrid M.T. Rohde Martin Strobel.
A useful reduction (SAT -> game)
Q 2.1 Nash Equilibrium Ben
Brian Thompson1,2, James Morris-King1,2, and Hasan Cam1
Game Theory and Cooperation
A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
The Matching Hypothesis
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Rational Decisions and
CASE − Cognitive Agents for Social Environments
Saurabh Bagchi ECE & CS, Purdue University Joint work with:
Diffusion in Networks Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale 1/17/2019.
EASTERN MEDITERRANEAN UNIVERSITY DEPARTMENT OF INDUSTRIAL ENGINEERING IENG314 OPERATIONS RESEARCH II SAMIR SAMEER ABUYOUSSEF
Presentation transcript:

Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24, Allerton Conference 1

Security Products: Deploy or Not ? Network users decide to start and continue to use security products based on economic considerations Costs are rather perceived vs real Costs depend on information available to users at each decision time Costs depend on decisions of other users – a user’s likelihood to get infected depends on the security level employed by other users 2

Approach: Overview Combine malware spreading dynamics with a game theoretic approach (deploy security or not) Users can change decisions dynamically to maximize their perceived utility Results in an Evolutionary Game with Learning Find and characterize equilibrium points – dependence on speed of learning ‘network state’ Evolutionary Equilibria (EE) 3

Scenario Network with N users Total contact rate  N,  >0, ind. of N A pair makes (2  / (N-1)) contacts per unit time A user can be in one of 3 states: Susceptible (S ) Infected (I ) Protected (P ) S, I, P, percentages -- S + I + P =1 4

Scenario … Worm propagates in the network and infects susceptible users Infection lasts a random time -- exp. with parameter  An infected user infects other susceptible users he contacts After infection is over user becomes protected 5

Scenario … Non-infected users ( S or P ) can decide to stay in their current state or switch to the other state Decide whether and for how long to install protection Decision depends on Cost of protection c P > 0 Risk of getting infected; function of infection cost c I > c P > 0, and of percentage of infected users I (t ) Need to learn ( ‘estimate’ ) I (t ) I (t ) changes 6

Game Formulation Two types of players: Type 1 and Type 2 Type 1 is non-infected Type 2 is infected Players matched at random Probability { Type 1 player will meet a Type 2 player} = I 7

Game Formulation … Type 1 player vs Type 1 player game S P S (0, 0) (0, -c P ) P (-c P, 0)(-c P, -c P ) 8

Game Formulation … Type 1 player vs Type 2 player game (omit payoffs of Type 2 players) I S (-c I, --) P (-c P, --) 9

Game Theoretic Behavior User ‘pays’ c P when installing protection c I when getting infected ( 0 < c P < c I ) Threshold I*= (c P /c I ) When I (t ) (fraction of Infected) exceeds I* then: Best Response  S becomes P Otherwise: Best Response  P becomes S So: Learning the value of I (t ) is crucial 10

Learning How do S and P users learn the value of I (t ) ? Central monitor (e.g., base station) knows instantly I (t ) Each user contacts the monitor at rate  and learns I (t ) Users do not know the exact value of I (t ) at all times Field observations: users chose randomly between two alternatives – choice becomes more deterministic when utility differences larger 11

Smoothed Best Response Psychology research: When choosing between two similar alternatives, users randomize If the expected costs of infection and protection are close enough (I (t ) close to the threshold I*), users randomize p SP (I ): probability of S  P switch, when learning that I (t ) =I p PS (I ): similarly for P  S switch 12

Smoothed Best Response p SP (I ): piecewise linear sigmoid For  0 becomes pure best response 13

Epidemic Worm Propagation SIP model (similar to the classical SIR) Parameters S, I, P : fraction of Susceptible, Infected, Protected  : rate of contacts per node (classical: per pair)  : rate of disinfection (equivalently, the duration of the infection is ~ Exp(  )) 14

Complete Model Users can switch between S and P, and also learn I at rate   An evolutionary game on the simplex in  3  A switching dynamical system on the simplex in  3  Strong connections to ‘replicator dynamics’ Lie-algebraic conditions for equilibria, stability, periodic solutions 15

Results Equilibrium points and stability Point Exists always Stable when The condition means that,, so exponentially in  Nothing to worry about in this case: Some users go from S to I to P, then I goes to zero, and all the P switch to S (zero cost!) 16

Results … Point Exists when and Stable whenever it exists S = is independent of For, I increases, and P decreases If users learn fast that I (t ) < I*, they switch from P to S, and then get infected User selfishness increases total network cost ( ) 17

Results … Point Exists when and Stable whenever it exists : smaller solution of Always: So, is a tight upper bound for I 18

Conclusions Socially optimal strategy: “All users become P at the first sign of infection, and then switch to S when the infected have all become disinfected.” But not individually rational! Protection costs, and users prefer to risk a large loss (infection) rather than accept a small certain loss (protection). 19

Telling users the true state of the network increases the total network cost. We can show: Optimal for the operator: Conclusion