Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
When selfish meets evil: byzantine players in a virus inoculation game
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
ICDCSW '06 Proceedings of the 26th IEEE International ConferenceWorkshops on Distributed Computing Systems
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
A graph-theoretic network security game
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Network game with attacker and protector entities
ISAAC'05 Proceedings of the 16th international conference on Algorithms and Computation
MFCS'06 Proceedings of the 31st international conference on Mathematical Foundations of Computer Science
A graph-theoretic network security game
International Journal of Autonomous and Adaptive Communications Systems
How many attackers can selfish defenders catch?
Discrete Applied Mathematics
Hi-index | 0.00 |
Consider a network vulnerable to security attacks and equipped with defense mechanisms. How much is the loss in the provided security guarantees due to the selfish nature of attacks and defenses? The Price of Defense was recently introduced in [7] as a worst-case measure, over all associated Nash equilibria, of this loss. In the particular strategic game considered in [7], there are two classes of confronting randomized players on a graph G(V, E): νattackers, each choosing vertices and wishing to minimize the probability of being caught, and a single defender, who chooses edges and gains the expected number of attackers it catches. In this work, we continue the study of the Price of Defense. We obtain the following results: – The Price of Defense is at least $\frac{|V|}{2}$; this implies that the Perfect Matching Nash equilibria considered in [7] are optimal with respect to the Price of Defense, so that the lower bound is tight. – We define Defense-Optimal graphs as those admitting a Nash equilibrium that attains the (tight) lower bound of $\frac{|V|}{2}$. We obtain: ∙ A graph is Defense-Optimal if and only if it has a Fractional Perfect Matching. Since graphs with a Fractional Perfect Matching are recognizable in polynomial time, the same holds for Defense-Optimal graphs. ∙ We identify a very simple graph that is Defense-Optimal but has no Perfect Matching Nash equilibrium. – Inspired by the established connection between Nash equilibria and Fractional Perfect Matchings, we transfer a known bivaluedness result about Fractional Matchings to a certain class of Nash equilibria. So, the connection to Fractional Graph Theory may be the key to revealing the combinatorial structure of Nash equilibria for our network security game.