Network Economics: two examples Marc Lelarge (INRIA-ENS) SIGMETRICS, London June 14, 2012.

Slides:



Advertisements
Similar presentations
The role of compatibility in the diffusion of technologies in social networks Mohammad Mahdian Yahoo! Research Joint work with N. Immorlica, J. Kleinberg,
Advertisements

A Local Mean Field Analysis of Security Investments in Networks Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) NetEcon 2008.
Peer-to-Peer and Social Networks Power law graphs Small world graphs.
Diffusion and Cascading Behavior in Random Networks Marc Lelarge (INRIA-ENS) Columbia University Joint CS/EE Networking Seminar June 2, 2011.
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.
Risk Models and Controlled Mitigation of IT Security R. Ann Miura-Ko Stanford University February 27, 2009.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
Diffusion and Cascading Behavior in Random Networks Marc Lelarge (INRIA-ENS) WIDS MIT, May 31, 2011.
Analysis and Modeling of Social Networks Foudalis Ilias.
Social Networks 101 P ROF. J ASON H ARTLINE AND P ROF. N ICOLE I MMORLICA.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
School of Information University of Michigan Network resilience Lecture 20.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Benjamin Johnson Carnegie Mellon University Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information TRUST.
Efficient Control of Epidemics over Random Networks Marc Lelarge (INRIA-ENS) SIGMETRICS 09.
Daniel ben -AvrahamClarkson University Boston Universtiy Reuven Cohen Tomer Kalisky Alex Rozenfeld Bar-Ilan University Eugene Stanley Lidia Braunstein.
Cooperation in Anonymous Dynamic Social Networks Brendan Lucier University of Toronto Brian Rogers Northwestern University Nicole Immorlica Northwestern.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
Sergey Buldyrev Department of Physics Yeshiva University
Weighted networks: analysis, modeling A. Barrat, LPT, Université Paris-Sud, France M. Barthélemy (CEA, France) R. Pastor-Satorras (Barcelona, Spain) A.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Re-examining the cascade problem: “... most of the time the system is completely stable, even in the face of external shocks. But once in a while, for.
Autonomous Target Assignment: A Game Theoretical Formulation Gurdal Arslan & Jeff Shamma Mechanical and Aerospace Engineering UCLA AFOSR / MURI.
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Game Theory: Whirlwind Review Matrix (normal form) games, mixed strategies, Nash equil. –the basic objects of vanilla game theory –the power of private.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
Conference title 1 A Few Bad Apples Are Enough. An Agent-Based Peer Review Game. Juan Bautista Cabotà, Francisco Grimaldo (U. València) Lorena Cadavid.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
Models of Influence in Online Social Networks
The Erdös-Rényi models
Optimization Based Modeling of Social Network Yong-Yeol Ahn, Hawoong Jeong.
Information Networks Power Laws and Network Models Lecture 3.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
Models and Algorithms for Complex Networks Power laws and generative processes.
Percolation in self-similar networks Dmitri Krioukov CAIDA/UCSD M. Á. Serrano, M. Boguñá UNT, March 2011.
Coordination with Local Information Munther Dahleh Alireza Tahbaz-Salehi, John Tsitsiklis Spyros Zoumpouli.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Networks Igor Segota Statistical physics presentation.
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Tipping Points, Statistics of opinion dynamics Chjan Lim, Mathematical Sciences, RPI Collaboration with B. Szymanski, W Zhang, Y. Treitman, G. Korniss.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Designing Games for Distributed Optimization Na Li and Jason R. Marden IEEE Journal of Selected Topics in Signal Processing, Vol. 7, No. 2, pp ,
Application of statistical physics to random graph models of networks Sameet Sreenivasan Advisor: H. Eugene Stanley.
Percolation in self-similar networks PRL 106:048701, 2011
Hedonic Clustering Games Moran Feldman Joint work with: Seffi Naor and Liane Lewin-Eytan.
Equilibrium statistical mechanics of network structures Physica A 334, 583 (2004); PRE 69, (2004); cond-mat ; cond-mat Thanks to:
Vasilis Syrgkanis Cornell University
Simulating the Social Processes of Science Leiden| 9 April 2014 INGENIO [CSIC-UPV] Ciudad Politécnica de la Innovación | Edif 8E 4º Camino de Vera s/n.
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
Steffen Staab 1WeST Web Science & Technologies University of Koblenz ▪ Landau, Germany Network Theory and Dynamic Systems Cascading.
Community structure in graphs Santo Fortunato. More links “inside” than “outside” Graphs are “sparse” “Communities”
Double Coordination in Small Groups Luigi Mittone, Matteo Ploner, Ivan Soraperra Computable and Experimental Economics Laboratory – University of Trento,
Fractal Networks: Structures, Modeling, and Dynamics 章 忠 志 复旦大学计算机科学技术学院 Homepage:
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Independent Cascade Model and Linear Threshold Model
New models for power law:
Independent Cascade Model and Linear Threshold Model
Department of Computer Science University of York
Peer-to-Peer and Social Networks
Diffusion in Networks Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale 1/17/2019.
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
Une analyse simple d’épidémies sur les graphes aléatoires
Independent Cascade Model and Linear Threshold Model
Presentation transcript:

Network Economics: two examples Marc Lelarge (INRIA-ENS) SIGMETRICS, London June 14, 2012.

(A) Diffusion in Social Networks (B) Economics of Information Security

(1) Diffusion Model (2) Results from a mathematical analysis. inspired from game theory and statistical physics. (3) Adding Clustering joint work with Emilie Coupechoux

(0) Context Crossing the Chasm (Moore 1991)

(1) Diffusion Model (2) Results (3) Adding Clustering

(1) Coordination game… Both receive payoff q. Both receive payoff 1-q>q. Both receive nothing.

(1)…on a network. Everybody start with ICQ. Total payoff = sum of the payoffs with each neighbor. A seed of nodes switches to (Blume 95, Morris 00)

(1) Threshold Model State of agent i is represented by Switch from to if:

(1) Model for the network? Statistical physics: bootstrap percolation.

(1) Model for the network?

(1) Random Graphs Random graphs with given degree sequence introduced by (Molloy and Reed, 95). Examples: – Erdös-Réyni graphs, G(n,λ/n). – Graphs with power law degree distribution. We are interested in large population asymptotics. Average degree is λ. No clustering: C=0.

(1) Diffusion Model (2) Results q = relative threshold λ = average degree (3) Adding Clustering

(1) Diffusion Model (2) Results q = relative threshold λ = average degree (3) Adding Clustering

(2) Contagion (Morris 00) Does there exist a finite groupe of players such that their action under best response dynamics spreads contagiously everywhere? Contagion threshold: = largest q for which contagious dynamics are possible. Example: interaction on the line

(2)Another example: d-regular trees

(2) Some experiments Seed = one node, λ=3 and q=0.24 (source: the Technoverse blog)

(2) Some experiments Seed = one node, λ=3 and 1/q>4 (source: the Technoverse blog)

(2) Some experiments Seed = one node, λ=3 and q=0.24 (or 1/q>4) (source: the Technoverse blog)

(2) Contagion threshold No cascade Global cascades In accordance with (Watts 02) Mean degree Contagion threshold

(2) A new Phase Transition

(2) Pivotal players Giant component of players requiring only one neighbor to switch: deg <1/q. Tipping point: Diffusion like standard epidemic Chasm : Pivotal players = Early adopters Mean degree

(2) q above contagion threshold New parameter: size of the seed as a fraction of the total population 0 < α < 1. Monotone dynamic → only one final state.

(2)Minimal size of the seed, q>1/4 Chasm : Connectivity hurts Tipping point: Connectivity helps Mean degree

(2) q>1/4, low connectivity Connectivity helps the diffusion. Size of the seed Size of the contagion

(2) q>1/4, high connectivity Connectivity inhibits the global cascade, but once it occurs, it facilitates its diffusion. Size of the contagion Size of the seed

(2) Equilibria for q<q c Trivial equilibria: all 0 / all 1 Initial seed applies best-response, hence can switches back. If the dynamic converges, it is an equilibrium. Robustness of all 0 equilibrium? Initial seed = 2 pivotal neighbors – > pivotal equilibrium

(2) Strength of Equilibria for q<q c Mean number of trials to switch from all 0 to pivotal equilibrium In Contrast with (Montanari, Saberi 10) Their results for q≈1/2 Mean degree

(2) Coexistence for q<q c Connected Players 0 Players 1 Coexistence Size giant component

(1) Diffusion Model (2) Results (3) Adding Clustering joint work with Emilie Coupechoux

(3) Simple model with tunable clustering Clustering coefficient: Adding cliques:

(3) Contagion threshold with clustering No cascade Global cascades Clustering helps contagion Clustering inhibits contagion

(3) Side effect of clustering! Fraction of pivotal players and size of the cascade

Conclusion for (A) Simple tractable model: – Threshold rule – Random network : heterogeneity of population – Tunable degree/clustering 1 notion: Pivotal Players and 2 regimes: – Low connectivity: tipping point / clustering hurts – High connectivity: chasm / clustering helps activation Open problems: – Size of optimal seed? Dynamics of the diffusion? More than 2 states?

(A) Diffusion in Social Networks (B) Economics of Information Security

(1) Network Security Games (2) Complete Information (3) Incomplete Information

(1) Network Security as a Public Good System security often depends on the effort of many individuals, making security a public good. Hirshleifer (83), Varian (02). Weakest link: security depends on the minimum effort. Best shot: security depends on the maximum effort.

(1) Local Best Response Weakest link: Best shot:

(1) Network Security Games (2) Complete Information (3) Incomplete Information

(2) Complete Information Weakest link Only trivial equilibria: all 0/ all 1. Best shot

(2) Slight extensions WL Weakest link: Weakest link with parameter K: Change of variables: Bootstrap percolation! Richer structure of equilibria.

(2) Slight extensions BS Best shot: Best shot with parameter K: Equilibria: Maximal Independent Set of order K+1. Bramoullé Kranton (07)

(2) Best Shot with parameter K=1

(1) Network Security Games (2) Complete Information (3) Incomplete Information

Bayesian game. Galeotti et al. (10) Type = degree d Neighbors’ actions are i.i.d. Bern(γ) Network externality function: corresponds to the price, an agent with degree d is ready to invest in security.

(3) Weakest link Network externality function: This function being increasing, incentives are aligned in the population. This gives a Coordination problem for the game. Lelarge (12)

(3) Best shot Network externality function: This function being decreasing, incentives are not aligned in the population. This gives a Free rider problem for the game. Lelarge (12)

Conclusion (B) Information structure of the game is crucial: network externality function when incomplete information. Technology is not enough! There is a need to design economic incentives to ensure the deployment of security technologies. Open problems: – Dynamics? mean field games? more quantitative results? Local and global interactions?

Thank you!