A Graph-Theoretic Game and its Application to the $k$-Server Problem
SIAM Journal on Computing
Algorithms, games, and the internet
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
An O(v|v| c |E|) algoithm for finding maximum matching in general graphs
SFCS '80 Proceedings of the 21st Annual Symposium on Foundations of Computer Science
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
Network game with attacker and protector entities
ISAAC'05 Proceedings of the 16th international conference on Algorithms and Computation
An exercise in selfish stabilization
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
The price of defense and fractional matchings
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
Network game with attacker and protector entities
ISAAC'05 Proceedings of the 16th international conference on Algorithms and Computation
MFCS'06 Proceedings of the 31st international conference on Mathematical Foundations of Computer Science
Network games with and without synchroneity
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Could firewall rules be public – a game theoretical perspective
Security and Communication Networks
Hi-index | 0.00 |
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. We model this practical network scenario as a non-cooperative multi-player game on a graph, with two kinds of players, a set of attackers and a protector player, representing the viruses and the system security software, respectively. Each attacker player chooses a node of the graph (or a set of them, via a probability distribution) to infect. The protector player chooses independently, in a basic case of the problem, a simple path or an edge of the graph (or a set of them, via a probability distribution) and cleans this part of the network from attackers. Each attacker wishes to maximize the probability of escaping its cleaning by the protector. In contrast, the protector aims at maximizing the expected number of cleaned attackers. We call the two games obtained from the two basic cases considered, as the Path and the Edge model, respectively. We are interested in the associated Nash equilibria on them, where no network entity can unilaterally improve its local objective. We obtain the following results: – The problem of existence of a pure Nash equilibrium is $\cal NP$-complete for the Path model. This opposed to that, no instance of the Edge model possesses a pure Nash equilibrium, proved in [4]. – We compute, in polynomial time, mixed Nash equilibria on corresponding graph instances. These graph families include, regular graphs, graphs that can be decomposed, in polynomially time, into vertex disjoint r-regular subgraphs, graphs with perfect matchings and trees. – We utilize the notion of social cost [3] for measuring system performance on such scenario; here is defined to be the utility of the protector. We prove that the corresponding Price of Anarchy in any mixed Nash equilibria of the game is upper and lower bounded by a linear function of the number of vertices of the graph.