Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.

Slides:



Advertisements
Similar presentations
Coordination Mechanisms for Unrelated Machine Scheduling Yossi Azar joint work with Kamal Jain Vahab Mirrokni.
Advertisements

Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman TexPoint fonts used in EMF. Read the TexPoint manual.
1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Price Of Anarchy: Routing
Mixed Strategies CMPT 882 Computational Game Theory Simon Fraser University Spring 2010 Instructor: Oliver Schulte.
Effort Games and the Price of Myopia Michael Zuckerman Joint work with Yoram Bachrach and Jeff Rosenschein.
Algorithmic Game Theory and Scheduling Eric Angel, Evripidis Bampis, Fanny Pascual IBISC, University of Evry, France GOTha, 12/05/06, LIP 6.
MIT and James Orlin © Game Theory 2-person 0-sum (or constant sum) game theory 2-person game theory (e.g., prisoner’s dilemma)
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
Combinatorial Algorithms
Mechanism Design without Money Lecture 4 1. Price of Anarchy simplest example G is given Route 1 unit from A to B, through AB,AXB OPT– route ½ on AB and.
Strategic Network Formation and Group Formation Elliot Anshelevich Rensselaer Polytechnic Institute (RPI)
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
Distributed Computing Group On the Impact of Malicious Players in Distributed Systems Stefan Schmid DYNAMO’07: 1st Workshop on Dynamic Networks (Salerno,
Balanced Graph Partitioning Konstantin Andreev Harald Räcke.
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
Worst-case Equilibria Elias Koutsoupias and Christos Papadimitriou Presenter: Yishay Mansour Tight Bounds for Worst-case Equilibria Artur Czumaj and Berthold.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
How Bad is Selfish Routing? Tim Roughgarden & Eva Tardos Presented by Wonhong Nam
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
A Scalable Network Resource Allocation Mechanism With Bounded Efficiency Loss IEEE Journal on Selected Areas in Communications, 2006 Johari, R., Tsitsiklis,
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Potential games, Congestion games Computational game theory Spring 2010 Adapting slides by Michal Feldman TexPoint fonts used in EMF. Read the TexPoint.
1 Worst-Case Equilibria Elias Koutsoupias and Christos Papadimitriou Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Second case study: Network Creation Games (a.k.a. Local Connection Games)
Algorithms and Economics of Networks: Coordination Mechanisms Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Near-Optimal Network Design With Selfish Agents Elliot Anshelevich, Anirban Dasgupta, Éva Tardos, Tom Wexler STOC’03, June 9–11, 2003, San Diego, California,
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Packing Element-Disjoint Steiner Trees Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint with Joseph Cheriyan Department.
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman.
Constant Price of Anarchy in Network Creation Games via Public Service Advertising Presented by Sepehr Assadi Based on a paper by Erik D. Demaine and Morteza.
1 Network Creation Game A. Fabrikant, A. Luthra, E. Maneva, C. H. Papadimitriou, and S. Shenker, PODC 2003 (Part of the Slides are taken from Alex Fabrikant’s.
On a Network Creation Game Joint work with Ankur Luthra, Elitza Maneva, Christos H. Papadimitriou, and Scott Shenker.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
1 Efficiency and Nash Equilibria in a Scrip System for P2P Networks Eric J. Friedman Joseph Y. Halpern Ian Kash.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.
1 COMMUNICATION NETWORKS AND COMPLEXITY COOPERATION AND ANTAGONISM IN SELFISH NETWORKS (ALGORITHMIC ISSUES) Paul G. Spirakis RACTI (Greece) August 2006.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy.
On a Network Creation Game PoA Seminar Presenting: Oren Gilon Based on an article by Fabrikant et al 1.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Online Social Networks and Media
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Hedonic Clustering Games Moran Feldman Joint work with: Seffi Naor and Liane Lewin-Eytan.
Vasilis Syrgkanis Cornell University
1 Bottleneck Routing Games on Grids Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University.
1 Quality of Routing Congestion Games in Wireless Sensor Networks Costas Busch Louisiana State University Rajgopal Kannan Louisiana State University Athanasios.
1 Distributed Vertex Coloring. 2 Vertex Coloring: each vertex is assigned a color.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Local Connection Game. Introduction Introduced in [FLMPS,PODC’03] A LCG is a game that models the creation of networks two competing issues: players want.
Second case study: Network Creation Games (a.k.a. Local Connection Games)
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Non-additive Security Games
On a Network Creation Game
Network Formation Games
Network Formation Games
Presentation transcript:

Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy (Yale University)

Outline  Motivation Our Model Nash Strategies Optimum Strategies Sum-of-Squares Partition Problem Conclusion

Question: Will you install anti-virus software? Norton AntiVirus 2005 = $49.95 Value of your data = $ Infection probability = 1/10 Expected loss = $35.00

Answer: Probably not. Norton AntiVirus 2005 = $49.95 Value of your data = $ Infection probability = 1/10 Expected loss = $35.00

This selfish behavior… … fails to achieve the social optimum.

What if instead… … a benevolent dictator decided which computers install an anti-virus? Center node must install an anti-virus or else!

Outline Motivation  Our Model Nash Strategies Optimum Strategies Sum-of-Squares Partition Problem Conclusion

Our Model The network is an undirected graph G = (V,E). Installing anti-virus software is a single round non-cooperative game. The players are the network nodes: V = {0,1,…,n-1}.

Our Model : Strategies Each node has two actions: do nothing or inoculate itself. a i = probability that node i installs anti- virus software. Write the strategies of all n players as vector

Our Model : Attack Model After the nodes choose their strategies, the adversary picks a starting point for infection uniformly at random Node i gets infected if it has no anti-virus software installed and if any of its neighbors become infected.

0 2 1 Our Model : Attack Model (cont.) 3 54 Example: Only node 3 installs anti-virus software. Adversary chooses to infect node 2.

Our Model : Attack Graph network graph Gattack graph G a = G - I a 1 Attack Graph: subgraph of G induced by removing nodes that install antivirus

Our Model : Individual Costs Anti-virus software costs C. Loss from infection is L. Cost of strategy to node i: Here, p i ( ) = Pr[i is infected | i does not install an anti-virus]

Our Model : Social Cost Social cost of is simply a sum of individual costs:

Outline Motivation Our Model  Nash Strategies Optimum Strategies Sum-of-Squares Partition Problem Conclusion

Nash Strategies: Quick definition Def: Strategy profile is in Nash equilibrium if no node can improve its payoff by switching to a different strategy.

Nash Strategies: Some intuition Some Intuition: Suppose a i =0, but node i expects that it will lie in component of size greater than t=Cn/L in attack graph. Prob[i infected] = t/n. Then its expected loss from infection is >L·(Cn/L)/n = C and it will switch to a i = 1.

Nash Strategies: Characterization Thm: There is a threshold t=Cn/L such that each node in a Nash equilibrium  will install an anti-virus if it would otherwise end up in a component of expected size > t in the attack graph.  will not install an anti-virus if it would end up in a component of expected size < t in the attack graph.  is indifferent between installing and not installing when the expected size = t in the attack graph.

Nash Strategies (cont.) Example: Let C=0.5,L=1 so that t=Cn/L=2.5. Then is not a Nash equilibrium network graph G attack graph G a = G - I a 1

Nash Strategies (cont.) Thm: It is NP-hard to compute a pure Nash equilibrium with lowest (resp., highest) cost. Thm: There exists a pure Nash equilibrium, which can be achieved by a distributed, iterative process in 2n steps.

Price of Anarchy Price of anarchy measures how far away a Nash equilibrium can be from the social optimum Formally, it is the worst-case ratio between cost of Nash equilibrium and cost of social optimum For network G and costs C, L, we denote it:

A lower bound Consider a star graph K 1,n. Let C=L(n-1)/n so that t=n-1. G = K 1,n 0 n n-2 …

Price of Anarchy (cont.) Then, is an optimum strategy with cost C+L(n-1)/n. G = K 1,n 0 n n-2 … G a* 0 n n-2 …

Price of Anarchy (cont.) And is worst-cost Nash with cost C+L(n-1) 2 /n. G = K 1,n 0 n n-2 … G a* 0 n n-2 …

Price of Anarchy (cont.) Lower Bound: For a star graph K 1,n,  (G, C, L) = n/2. Upper Bound: For any graph G and any C, L,  (G, C, L)≤ n. Thm: Price of anarchy in our game is  (G, C, L) =  (n).

Outline Motivation Our Model Nash Strategies  Optimum Strategies Sum-of-Squares Partition Problem Conclusion

Optimum Strategies So, allowing users to selfishly choose whether or not to install anti-virus software may be very inefficient Instead, let’s have a benevolent dictator compute and impose a solution maximizing overall welfare

Optimum Strategies (cont.) Unfortunately, Thm: It is NP-hard to compute an optimum strategy. Fortunately, Thm: a strategy with cost at most O(log 2 n) OPT can be computed in polytime.

Outline Motivation Our Model Nash Strategies Optimum Strategies  Sum-of-Squares Partition Problem Conclusion

Sum-of-Squares Partition We can reduce the network security problem to the following. Problem: By removing a set of at most m nodes, partition the graph into mutually disconnected components {H i }, such that  i |H i | 2 is minimum.

Sum-of-Squares Partition (cont.) Thm: We can find a set of O(log 2 n)m nodes whose removal partitions the graph into components {H i } such that  i |H i | 2 = O(1)OPT. Proof sketch: The approach is similar to greedy log n approximation algorithm for set cover. We recursively partition the graph by repeatedly removing the node cut that gives the best “per-node benefit.”

Sum-of-squares partition (cont.) Suppose we remove node set R to cut a graph H into components H i and H j. cost effectiveness of cut R is: (|H| 2 -|H i | 2 - |H j | 2 )/|R| Lemma: Leighton-Rao algorithm for node cuts will find a cut with cost effectiveness within O(log n) of best cost effectiveness. O(log 0.5 n) algorithms do not extend to directed cuts, and thus cannot be used for node cuts.

Rough Outline of Algorithm In first iteration, partition the graph G into H 1,H 2 by removing a sparse node cut. G

Rough Outline of Algorithm In first iteration, partition the graph G into H 1,H 2 by removing a sparse node cut. H1H1 H2H2

Rough Outline of Algorithm In subsequent iterations, cut the H i for which we find the cut with the best cost effectiveness. H1H1 H2H2

Rough Outline of Algorithm Complete details can be found in full version: H1H1 H2H2 H3H3

Outline Motivation Our Model Nash Strategies Optimum Strategies Sum-of-Squares Partition Problem  Conclusion

Conclusion We proposed a simple game for modeling containment of viruses in a network. Nash equilibria of our game have a simple characterization. We showed that, in the worst case, they can be far off from the optimum solution. However, a near-optimum deployment of anti- virus software can be computed by reduction to the sum-of-squares partition problem.

Open Problems Introduce a discount (or taxation) mechanism into the system. Consider a “smart” adversary who targets the biggest component in the attack graph. Is there an approximation algorithm for the sum-of-squares partition problem that removes fewer nodes or has a better approximation ratio?

Questions?