Network games, information spread and endogenous security

作者: B. de Witte

DOI:

关键词: Order (exchange)Pre-play attackPresumptionAttack modelComputer securityIncentiveAdversaryEngineeringDigital securityExternality

摘要: A digital security breach where confidential information is being obtained often does not only influence the agent whose system infiltrated, also other agents socially or digitally connected to damaged can be affected. This leads externalities in which actual of an depend on his own investments security, it depends by agents. As no would invest protect others, misaligned incentives may appear this setting. It has been argued that these provoke under-investments, turn make network prone fail. Recently presumption challenged however introduction intelligent adversary who chooses optimal trade-off between expected damage and precision attack. In research we build impact adversary combing strategic attack model with a new for spread. We show tend compete under as increase cause someone else. When dependencies among are low, because network very dense probability shared small, even more than they social optimum. When dependencies over-investments prevail due second order force originating from adversary. situation precise as the gain compensates increased costs Nevertheless, when dependencies continue consequently becomes meaningless discourage attack, at some point pass under-investments. reached earlier network. However, consists several components strategically decide component attacked, always higher in a

参考文章(26)
Zichao Yang, John C. S. Lui, Security adoption in heterogeneous networks: the influence of cyber-insurance market IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part II. pp. 172- 183 ,(2012) , 10.1007/978-3-642-30054-7_14
Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang, Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 444- 458 ,(2012) , 10.1007/978-3-642-30373-9_31
Lauren Ancel Meyers, Nedialko B. Dimitrov, Mathematical Approaches to Infectious Disease Prediction and Control ,(2010)
Matthew O. Jackson, Social and Economic Networks ,(2010)
Julian Jang-Jaccard, Surya Nepal, None, A survey of emerging threats in cybersecurity Journal of Computer and System Sciences. ,vol. 80, pp. 973- 993 ,(2014) , 10.1016/J.JCSS.2014.02.005
Cristopher Moore, M. E. J. Newman, Epidemics and percolation in small-world networks. Physical Review E. ,vol. 61, pp. 5678- 5682 ,(2000) , 10.1103/PHYSREVE.61.5678
Vicki M. Bier, Choosing what to protect. Risk Analysis. ,vol. 27, pp. 607- 620 ,(2007) , 10.1111/J.1539-6924.2007.00906.X
Mark Fey, Symmetric games with only asymmetric equilibria Games and Economic Behavior. ,vol. 75, pp. 424- 427 ,(2012) , 10.1016/J.GEB.2011.09.008
Saurabh Amin, Galina A. Schwartz, S. Shankar Sastry, Security of interdependent and identical networked control systems Automatica. ,vol. 49, pp. 186- 192 ,(2013) , 10.1016/J.AUTOMATICA.2012.09.007