Individual security and network design

Diego A. Cerdeiro, M. Dziubiński, S. Goyal
{"title":"Individual security and network design","authors":"Diego A. Cerdeiro, M. Dziubiński, S. Goyal","doi":"10.1145/2600057.2602894","DOIUrl":null,"url":null,"abstract":"Individuals derive benefits from being connected to others: computer users benefit from sharing content, criminals benefit from cooperating. Connections, however, may transmit external threats. A virus may spread through a computer network. An investigation may dismantle entire criminal organization. Given agents’ individual incentives to protect, which network(s) should be chosen to maximize agents’ welfare? We consider the tension between the value of being connected and the exposure to contagion when a protection technology is available. There are (n + 2) ‘players’. The designer first chooses the network over the n nodes. Given this network, the nodes (simultaneously) choose whether to protect or not; protection is costly. Finally, the adversary chooses a node to attack. If the attacked node is not protected, then this node and all nodes with a path to the attacked node through unprotected nodes are eliminated. Nodes derive benefits from their connectivity: a surviving node gets, as a gross payoff, an equal share of the value of its surviving component. Component value is a convex and increasing function of its size. Node’s net payoffs are equal to its connectivity payoffs less the cost of protection. The designer seeks to maximize the sum of nodes’ payoffs. The adversary aims to minimize connectivity-related payoffs. The first best design and defence profile that a central planner would choose is as follows. For low costs, all nodes is protected and the network is connected. For intermediate costs, a centrally protected star is chosen. The adversary eliminates a spoke. If costs are high, protection is dropped and network is split into several components. The adversary removes a largest one. A number of problems arise for the designer when he cannot control defence decisions. First, a node does not internalize the benefits accruing to others from its own protection. Thus, it is possible that the center-","PeriodicalId":203155,"journal":{"name":"Proceedings of the fifteenth ACM conference on Economics and computation","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the fifteenth ACM conference on Economics and computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2600057.2602894","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Individuals derive benefits from being connected to others: computer users benefit from sharing content, criminals benefit from cooperating. Connections, however, may transmit external threats. A virus may spread through a computer network. An investigation may dismantle entire criminal organization. Given agents’ individual incentives to protect, which network(s) should be chosen to maximize agents’ welfare? We consider the tension between the value of being connected and the exposure to contagion when a protection technology is available. There are (n + 2) ‘players’. The designer first chooses the network over the n nodes. Given this network, the nodes (simultaneously) choose whether to protect or not; protection is costly. Finally, the adversary chooses a node to attack. If the attacked node is not protected, then this node and all nodes with a path to the attacked node through unprotected nodes are eliminated. Nodes derive benefits from their connectivity: a surviving node gets, as a gross payoff, an equal share of the value of its surviving component. Component value is a convex and increasing function of its size. Node’s net payoffs are equal to its connectivity payoffs less the cost of protection. The designer seeks to maximize the sum of nodes’ payoffs. The adversary aims to minimize connectivity-related payoffs. The first best design and defence profile that a central planner would choose is as follows. For low costs, all nodes is protected and the network is connected. For intermediate costs, a centrally protected star is chosen. The adversary eliminates a spoke. If costs are high, protection is dropped and network is split into several components. The adversary removes a largest one. A number of problems arise for the designer when he cannot control defence decisions. First, a node does not internalize the benefits accruing to others from its own protection. Thus, it is possible that the center-
个人安全和网络设计
个人从与他人的联系中获益:计算机用户从分享内容中获益,罪犯从合作中获益。然而,连接可能会传递外部威胁。病毒可以通过计算机网络传播。一项调查可能会摧毁整个犯罪组织。给定代理人的个人保护动机,应该选择哪些网络来最大化代理人的福利?我们考虑了当一种保护技术可用时,被连接的价值和暴露于传染之间的张力。这里有(n + 2)个“玩家”。设计者首先在n个节点中选择网络。给定这个网络,节点(同时)选择是否保护;保护是昂贵的。最后,攻击者选择一个节点进行攻击。如果被攻击的节点没有被保护,那么该节点以及所有通过未受保护的节点到达被攻击节点的节点都将被清除。节点从它们的连接性中获益:作为总回报,存活的节点获得其存活组件价值的同等份额。组件值是其大小的凸递增函数。Node的净收益等于其连接收益减去保护成本。设计师寻求最大化节点收益的总和。对手的目标是最小化与连接相关的回报。中央计划者会选择的第一个最佳设计和防御轮廓如下。为节省成本,可以保护所有节点,实现网络连接。对于中间成本,选择集中保护的星型。对手消灭了一条辐条。如果成本很高,保护就会被取消,网络就会被分成几个部分。对手取出一个最大的。当设计师无法控制防御决策时,就会出现许多问题。首先,节点没有内部化其自身保护给他人带来的好处。因此,有可能中心-
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信