Skip to main content
Top
Published in: Dynamic Games and Applications 4/2019

19-09-2018

An Efficient Dynamic Allocation Mechanism for Security in Networks of Interdependent Strategic Agents

Authors: Farzaneh Farhadi, Hamidreza Tavafoghi, Demosthenis Teneketzis, S. Jamaloddin Golestani

Published in: Dynamic Games and Applications | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Motivated by security issues in networks, we study the problem of incentive mechanism design for dynamic resource allocation in a multi-agent networked system. Each strategic agent has a private security state which can be safe or unsafe and is only known to him. At every time, each agent faces security threats from outside as well as from his unsafe neighbors. Therefore, the agents’ states are correlated and have interdependent stochastic dynamics. Agents have interdependent valuations, as each agent’s instantaneous utility depends on his own security state as well as his neighbors’ security states. There is a network manager that can allocate a security resource to one agent at each time so as to protect the network against attacks and maximize the overall social welfare. We propose a dynamic incentive mechanism that implements the efficient allocation and is ex-ante (in expectation) individually rational and budget balanced. We present a reputation-based payment that mitigates any risk that the agents or the network manager may face to get a negative utility or to run a budget deficit, respectively, for some realizations of the network stochastic evolution. Therefore, our results provide a dynamic incentive mechanism that implements efficient allocations in networked systems with strategic agents that have correlated types and interdependent valuations, and is approximate ex-post individually rational and budget balanced.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
We note that in implementation theory approach, the assumptions on information structure of the problem are different from a Bayesian framework we follow in this work. Therefore, the impossibility result [9, 35] in static settings we discuss before does not hold.
 
2
For simplicity, we assumed that the probability \(d_i\) does not depend on the system’s state; our results hold when \(d_i\) is state-dependent.
 
3
Notice that from the technical point of view, the weights in this weighted average do not need to be necessarily the same as \(l_{ji}\). We can define the security index of agent i’s neighborhood based on any arbitrary set of weights and all the results continue to hold. However, the dependencies \(l_{ji}\)s are the most natural choice according to the model.
 
4
In Sect. 7, we show that the sufficient condition of Theorem 2 is not always satisfied, that is there exist some network instances where the optimal policy chooses a safe agent to apply the security measure.
 
Literature
1.
4.
go back to reference Börgers T, Krahmer D, Strausz R (2015) An introduction to the theory of mechanism design. Oxford University Press, OxfordCrossRef Börgers T, Krahmer D, Strausz R (2015) An introduction to the theory of mechanism design. Oxford University Press, OxfordCrossRef
5.
go back to reference Brauer F, van den Driessche P, Wu J (2008) Mathematical epidemiology. Springer, Berlin, GermanyCrossRef Brauer F, van den Driessche P, Wu J (2008) Mathematical epidemiology. Springer, Berlin, GermanyCrossRef
6.
go back to reference Chen L, Leneutre J (2009) A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans Inf Forensics Secur 4(2):165–178CrossRef Chen L, Leneutre J (2009) A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans Inf Forensics Secur 4(2):165–178CrossRef
7.
go back to reference Clarke E (1971) Multipart pricing of public goods. Public Choice 2:19–33 Clarke E (1971) Multipart pricing of public goods. Public Choice 2:19–33
8.
go back to reference Cremer J, McLean RP (1988) Full extraction of the surplus in bayesian and dominant strategy auctions. Econometrica 56:1247MathSciNetCrossRef Cremer J, McLean RP (1988) Full extraction of the surplus in bayesian and dominant strategy auctions. Econometrica 56:1247MathSciNetCrossRef
9.
go back to reference d’Aspremont C, Gérard-Varet LA (1979) Incentives and incomplete information. J Public Econ 11(1):25–45CrossRef d’Aspremont C, Gérard-Varet LA (1979) Incentives and incomplete information. J Public Econ 11(1):25–45CrossRef
11.
go back to reference Drakopoulos K, Ozdaglar A, Tsitsiklis JN (2014) An efficient curing policy for epidemics on graphs. IEEE Trans Netw Sci Eng 1(2):67–75MathSciNetCrossRef Drakopoulos K, Ozdaglar A, Tsitsiklis JN (2014) An efficient curing policy for epidemics on graphs. IEEE Trans Netw Sci Eng 1(2):67–75MathSciNetCrossRef
13.
go back to reference Farhadi F, Tavafoghi H, Teneketzis D, Golestani J (2017) A dynamic incentive mechanism for security in networks of interdependent agents. In: GameNets 2017 proceedings game theory for networks: 7th international EAI conference. Springer International Publishing, Berlin, pp 86–96MATH Farhadi F, Tavafoghi H, Teneketzis D, Golestani J (2017) A dynamic incentive mechanism for security in networks of interdependent agents. In: GameNets 2017 proceedings game theory for networks: 7th international EAI conference. Springer International Publishing, Berlin, pp 86–96MATH
15.
go back to reference Friedman JW (1971) A non-cooperative equilibrium for supergames. The Rev Econ Stud 38(1):1–12CrossRef Friedman JW (1971) A non-cooperative equilibrium for supergames. The Rev Econ Stud 38(1):1–12CrossRef
16.
go back to reference Ganesh A, Massoulie L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: Proceedings IEEE 24th annual joint conference of the IEEE computer and communications societies, vol 2 Ganesh A, Massoulie L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: Proceedings IEEE 24th annual joint conference of the IEEE computer and communications societies, vol 2
17.
go back to reference Grossklags J, Christin N, Chuang J (2008) Secure or insure?: A game-theoretic analysis of information security games. In: Proceedings of the 17th international conference on World Wide Web, WWW ’08. ACM, pp. 209–218 Grossklags J, Christin N, Chuang J (2008) Secure or insure?: A game-theoretic analysis of information security games. In: Proceedings of the 17th international conference on World Wide Web, WWW ’08. ACM, pp. 209–218
18.
go back to reference Jackson M, Zenou Y (2015) Games on networks. In: Petyon Young H, Zamir S (eds) Handbook of game theory with economic applications, vol 4, chap. 3. Elsevier, Amsterdam Jackson M, Zenou Y (2015) Games on networks. In: Petyon Young H, Zamir S (eds) Handbook of game theory with economic applications, vol 4, chap. 3. Elsevier, Amsterdam
19.
go back to reference Jiang L, Anantharam V, Walrand J (2011) How bad are selfish investments in network security? IEEE/ACM Trans Netw 19(2):549CrossRef Jiang L, Anantharam V, Walrand J (2011) How bad are selfish investments in network security? IEEE/ACM Trans Netw 19(2):549CrossRef
20.
go back to reference Kakhbod A, Teneketzis D (2012) An efficient game form for unicast service provisioning. IEEE Trans Autom Control 57(2):392MathSciNetCrossRef Kakhbod A, Teneketzis D (2012) An efficient game form for unicast service provisioning. IEEE Trans Autom Control 57(2):392MathSciNetCrossRef
22.
go back to reference Katz ML, Shapiro C (1986) Technology adoption in the presence of network externalities. J Polit Econ 94(4):822–841CrossRef Katz ML, Shapiro C (1986) Technology adoption in the presence of network externalities. J Polit Econ 94(4):822–841CrossRef
23.
go back to reference Khalili MM, Naghizadeh P, Liu M (2017) Designing cyber insurance policies in the presence of security interdependence. In: The 12th workshop on the economics of networks, systems and computation (NetEcon 2017) Khalili MM, Naghizadeh P, Liu M (2017) Designing cyber insurance policies in the presence of security interdependence. In: The 12th workshop on the economics of networks, systems and computation (NetEcon 2017)
24.
go back to reference Khouzani MHR, Sarkar S, Altman E (2011) A dynamic game solution to malware attack. In: IEEE INFOCOM Khouzani MHR, Sarkar S, Altman E (2011) A dynamic game solution to malware attack. In: IEEE INFOCOM
25.
go back to reference Kumar PR, Varaiya P (2015) Stochastic systems: estimation, identification, and adaptive control, vol 75. SIAM, PhiladelphiaCrossRef Kumar PR, Varaiya P (2015) Stochastic systems: estimation, identification, and adaptive control, vol 75. SIAM, PhiladelphiaCrossRef
26.
go back to reference Kunreuther H, Heal G (2003) Interdependent security. J Risk Uncertain 26(2):231–249CrossRef Kunreuther H, Heal G (2003) Interdependent security. J Risk Uncertain 26(2):231–249CrossRef
27.
go back to reference Laszka A, Felegyhazi M, Buttyan L (2014) A survey of interdependent information security games. ACM Comput Surv 47(2):1–38CrossRef Laszka A, Felegyhazi M, Buttyan L (2014) A survey of interdependent information security games. ACM Comput Surv 47(2):1–38CrossRef
28.
go back to reference Lelarge M (2009) Economics of malware: Epidemic risks model, network externalities and incentives. In: 2009 47th annual Allerton conference on communication, control, and computing (Allerton), pp 1353–1360 Lelarge M (2009) Economics of malware: Epidemic risks model, network externalities and incentives. In: 2009 47th annual Allerton conference on communication, control, and computing (Allerton), pp 1353–1360
29.
go back to reference Lelarge M, Bolot J (2009) Economic incentives to increase security in the internet: the case for insurance. IEEE INFOCOM 2009:1494–1502 Lelarge M, Bolot J (2009) Economic incentives to increase security in the internet: the case for insurance. IEEE INFOCOM 2009:1494–1502
30.
go back to reference Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM
31.
go back to reference Liang X, Xiao Y (2013) Game theory for network security. IEEE Commun Surv Tutor 15(1):472CrossRef Liang X, Xiao Y (2013) Game theory for network security. IEEE Commun Surv Tutor 15(1):472CrossRef
32.
go back to reference Liu H (2014) Efficient dynamic mechanisms in environments with interdependent valuations. Available at SSRN 2504731 Liu H (2014) Efficient dynamic mechanisms in environments with interdependent valuations. Available at SSRN 2504731
33.
go back to reference Manshaei MH, Zhu Q, Alpcan T, Basar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):1–39CrossRef Manshaei MH, Zhu Q, Alpcan T, Basar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):1–39CrossRef
34.
go back to reference Maskin E (1999) Nash equilibrium and welfare optimality. Rev Econ Stud 66:23–38 . Reprinted in Laffont JJ (ed) The principal agent model: the economic theory of incentives. Edward Elgar, London (2003) Maskin E (1999) Nash equilibrium and welfare optimality. Rev Econ Stud 66:23–38 . Reprinted in Laffont JJ (ed) The principal agent model: the economic theory of incentives. Edward Elgar, London (2003)
35.
37.
go back to reference Naghizadeh P, Liu M (2016) On the role of public and private assessments in security information sharing agreements. arXiv preprint arXiv:1604.04871 Naghizadeh P, Liu M (2016) On the role of public and private assessments in security information sharing agreements. arXiv preprint arXiv:​1604.​04871
38.
go back to reference Naghizadeh P, Liu M (2016) Opting out of incentive mechanisms: a study of security as a non-excludable public good. IEEE Trans Inf Forensics Secur 11:2790–2803CrossRef Naghizadeh P, Liu M (2016) Opting out of incentive mechanisms: a study of security as a non-excludable public good. IEEE Trans Inf Forensics Secur 11:2790–2803CrossRef
39.
go back to reference Nowzari C, Preciado VM, Pappas GJ (2015) Analysis and control of epidemics: a survey of spreading processes on complex networks. arXiv:1505.00768 Nowzari C, Preciado VM, Pappas GJ (2015) Analysis and control of epidemics: a survey of spreading processes on complex networks. arXiv:​1505.​00768
40.
go back to reference Ogut H, Menon N, Raghunathan S (2005) Cyber insurance and it security investment: impact of interdependence risk. In: WEIS Ogut H, Menon N, Raghunathan S (2005) Cyber insurance and it security investment: impact of interdependence risk. In: WEIS
41.
go back to reference Theodorakopoulos G, Boudec JYL, Baras JS (2013) Selfish response to epidemic propagation. IEEE Trans Autom Control 58(2):363–376MathSciNetCrossRef Theodorakopoulos G, Boudec JYL, Baras JS (2013) Selfish response to epidemic propagation. IEEE Trans Autom Control 58(2):363–376MathSciNetCrossRef
42.
go back to reference Trajanovski S, Hayel Y, Altman E, Wang H, Mieghem PV (2015) Decentralized protection strategies against sis epidemics in networks. IEEE Trans Control Netw Syst 2:406–419MathSciNetCrossRef Trajanovski S, Hayel Y, Altman E, Wang H, Mieghem PV (2015) Decentralized protection strategies against sis epidemics in networks. IEEE Trans Control Netw Syst 2:406–419MathSciNetCrossRef
Metadata
Title
An Efficient Dynamic Allocation Mechanism for Security in Networks of Interdependent Strategic Agents
Authors
Farzaneh Farhadi
Hamidreza Tavafoghi
Demosthenis Teneketzis
S. Jamaloddin Golestani
Publication date
19-09-2018
Publisher
Springer US
Published in
Dynamic Games and Applications / Issue 4/2019
Print ISSN: 2153-0785
Electronic ISSN: 2153-0793
DOI
https://doi.org/10.1007/s13235-018-0284-4

Other articles of this Issue 4/2019

Dynamic Games and Applications 4/2019 Go to the issue

Premium Partner