Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements
نویسنده
چکیده
Computer and information networks are a prime example of an environment where negative externalities abound, particularly when it comes to implementing security defenses. A typical example is that of denial-of-service prevention: ingress filtering, where attack traffic gets discarded by routers close to the perpetrators, is in principle an excellent remedy, as it prevents harmful traffic not only from reaching the victims, but also from burdening the network situated between attacker and target. However, with ingress filtering, the entities (at the ingress) that have to invest in additional filtering are not the ones (at the egress) who mostly benefit from the investment, and, may not have any incentive to participate in the scheme. As this example illustrates, it is important to understand the incentives of the different participants to a network, so that we can design schemes or intervention mechanisms to realign them with a desirable outcome. Game theory offers a solid bedrock for formally assessing the incentives of non-cooperative participants. In this talk, I will start by discussing a framework for network security games [4, 5] that we devised to help model how rational, individual, end-users would respond to security threats in large-scale networks. We decouple security decisions between self-insurance (which does not present any externalities) and self-protection (which does present externalities). Assuming fully rational players, acting with perfect information, and with the ability to perfectly execute their security decisions , we can derive results showing how much of a negative impact externalities can have on security decision-making. I will also introduce extensions of this work which deal with more limited information cases [6]. However, humans are not acting perfectly rationally when it comes to security decision-making. Prospect theory tells us that humans tend to be risk-averse when it comes to gains; and risk-seeking when it comes to losses [7]. In other words, people tend to " gamble " more than they should when it comes to security risks. I will further show, through an experiment related to our framework [3] that in addition to these biases , users have very limited " computational " ability; in particular, they seem unable to strategize over more than one decision variable at a time. I will present complementary experimental results [1] that suggest that Peltzman effects [11] also apply in computer security. Much like drivers wearing seat belts or helmets tend to drive faster, people tend to behave more insecurely online when …
منابع مشابه
Interdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملModeling Cooperation between Nodes in Wireless Networks by APD Game
Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered, which means that each node itself can decide whe...
متن کاملBankruptcy Assessment with the Interval Programming and Games Theory
Some of the parameters in issues of the reality world are uncertainty. One of the uncertain problems with the qualitative parameters is economic problems such as bankruptcy problem. In this case, there is a probability of dealing with imprecise concepts including the intervals regarding the official’s viewpoint, organizations’ managers. Accordingly, this article uses the concepts of data envelo...
متن کاملModeling Cooperation between Nodes in Wireless Networks by APD Game
Cooperation is the foundation of many protocols in wireless networks. Without cooperation, the performance of a network significantly decreases. Hence, all nodes in traditional networks are required to cooperate with each other. In this paper, instead of traditional networks, a network of rational and autonomous nodes is considered, which means that each node itself can decide whe...
متن کاملAn Experimental Study of Incentive Reversal in Sequential and Simultaneous Games
I t is commonly held that increasing monetary rewards enhance work effort. This study, however, argues that this will not ineludibly occur in team activities. Incentive Reversal may occur in sequential team productions featuring positive external impacts on agents. This seemingly paradoxical event is explained through two experiments in this article. The first experiment involves a sample ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011