Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets

Size: px
Start display at page:

Download "Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets"

Transcription

1 Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram and Saurabh Bagchi School of Electrical and Computer Engineering Purdue University

2 Challenge Modern critical infrastructures have a large number of assets, managed by multiple stakeholders. The security of these complex systems depends critically on the interdependencies between these assets. 2 Image credits: sgip.org, USC.

3 Contribution We propose a systematic framework for optimal and strategic allocation of defense resources in interdependent large-scale networks. 3 Image credits: sgip.org, USC.

4 Related Work Interdependent Security Games: each node is a decision-maker. [Laszka et. al., ACM CSUR 2014, Hota and Sundaram, GameSec 2015, ] Two player attacker-defender games Stackelberg Security Games [Jain et. al., AAMAS 2013, ] Colonel Blotto Games [Gupta et. al., GameSec 2014, ] Network Interdiction Games [Israeli and Wood, Networks 2002, ] Our framework captures externalities between the above two extremes. Multiple defenders, each responsible for a set of assets. The assets that belong to multiple defenders are interdependent. Closely related work: Multidefender Security Game [Lou et. al., 2016] 4

5 Interdependency Graph A directed graph where each node represents an asset in a networked system. Multiple defenders, denoted by the set D, each responsible for a subset of assets. When an asset u # is compromised, it can be used to attack asset u $ if (u #, u $ ) is an edge. p ) #,$ (0,1] : the probability of the above attack being successful. Independent across edges. Attacker A Defender 2 Defender 1 L # V 2 u # p #,$ u $ Defender 3 L # 0: loss experienced by the defender if asset u # is attacked successfully. 5

6 Attack Probability Defense strategies reduce the attack probabilities of the edges. Defender 1 A Attacker Defender 2 V 2 Joint strategy profile x = (x 5, x 2,, x 7 ), where each x 8 drawn from a convex and compact subset of R : ;. u = L = Defender 3 Let P = : set of paths from A to u = The attack probability on a node u = due to a given path P P = is? p #,$ A B,A C D (x) 6

7 Cost of a Defender Defender 1 A Attacker Defender 2 V 2 The cost of a defender D E is given by u = L = Defender 3 C E (x) H L = max? p #,$ D P K A B,A C D A K L M (x) Captures the notion of weakest link. 7

8 Defense Strategies x E #,N : defense allocation by defender D E on edge (u #, u $ ). Multiple defenders can potentially assign defense resources on a single edge. u # u $ E x #,N 8

9 Defense Strategies x E #,N : defense allocation by defender D E on edge (u #, u $ ). Multiple defenders can potentially assign defense resources on a single edge. More Generally: u # u $ E x #,N Let T 8 : R Q ; R U be a linear map that transforms defense strategy of defender D E, denoted by x 8, to the edges of the graph. T 8 x 8 #,$ : defense allocation by defender D E on edge (u #, u $ ). 9

10 Defense Strategies x E #,N : defense allocation by defender D E on edge (u #, u $ ). Multiple defenders can potentially assign defense resources on a single edge. More Generally: u # u $ E x #,N Let T 8 : R Q ; R U be a linear map that transforms defense strategy of defender D E, denoted by x 8, to the edges of the graph. Example: Edge-based defense strategy Defender D 5 can only defend the edge (A, D 5 ). D 2 only defends (A, D 2 ). x 5 and x 2 are scalars. T 5 = 1 0 D 5 A T 2 = 0 1 D 2 10

11 Transformation of Probabilities Define the length of an edge i, j as l ) ) #,$ log p #,$ [0, ) Under a joint defense strategy, the modified length is given by l #,$ x l ) E #,$ + H x #,N E E = l #,$ x b8 + x #,N Initial length Length under joint defense strategy x u # u $ ) l #,$ u # u $ l ) E #,$ + H x #,N 11 E

12 Transformation of Probabilities Define the length of an edge i, j as l ) ) #,$ log p #,$ [0, ) Under a joint defense strategy, the modified length is given by l #,$ x l ) E #,$ + H x #,N E Equivalently p #,$ x p ) E #,$ exp H x #,N E Satisfies the assumptions in the Gordon-Loeb model. 12

13 Observation The attack probability on a node u = due to a given path P P = is? p #,$ A B,A C D x = exp H l E #,$ + H x #,N A B,A C D E Path with the highest attack probability has the smallest length. 13

14 Equilibria in the Multidefender Game The cost of Defender D E can be stated as C E x 8, x b8 H L = max? p #,$ D P K A B,A C D A K L M x Affine in x 8 for given x b8 = H L = exp min H l #,$ x b8 + x D P #,N K A K L M A B,A C D E Convex in x 8 for given x b8 14

15 Equilibria in the Multidefender Game The cost of Defender D E can be stated as C E x 8, x b8 H L = max? p #,$ D P K A B,A C D A K L M x Affine in x 8 for given x b8 = H L = exp min H l #,$ x b8 + x D P #,N K A K L M A B,A C D E Convex in x 8 for given x b8 Theorem The multidefender game is an instance of concave game [Rosen, Econometrica, 1965] and a pure Nash equilibrium exists. 15

16 Computing Best Response Theorem The best response of Defender D E can be computed by solving the following convex optimization problem. min g R h i,j Rh k M s.t. H L = e bg K A K L M y $ y n x E #,N l #,$ x b8, edge (u #, u $ ) y q = 0 y = : feasible potential of node u =, at most the length of the shortest path from node u q y q : potential of attacker node 1 r x E B E u # u $ Budget constraint E y $ y n + H x #,N E 16

17 Computing Best Response Theorem The best response of Defender D E can be computed by solving the following convex optimization problem. min g R h i,j Rh k M s.t. H L = e bg K A K L M y $ y n x E #,N l #,$ x b8, edge (u #, u $ ) y = : feasible potential of node u =, at most the length of the shortest path from node u q y q = 0 1 r x E B E When the graph does not have a cycle of negative length, a feasible potential exists and the potential at every node is equal to the length of the shortest path from the source [Cook et al, 1998]. 17

18 Observation Given the defense strategies of other players, a player can compute her best response efficiently. A social planner can efficiently compute optimal defense allocations over the entire network. 18

19 Computing Nash Equilibrium Expected loss of a player in the original formulation is nondifferentiable. In the modified convex formulation, the constraints of a player depend on the strategies of other players. Leads to a Generalized Nash Equilibrium Problem. When each player values a single asset in the network, equilibrium strategies can be computed by solving a Linear Complementarity Problem [Sreekumaran, Hota and others, arxiv: , 2015]. In this work, we compute Nash equilibrium strategies by iteratively computing the best responses of the players. 19

20 Case Studies 20

21 Example 1: SCADA Network Two interdependent control subsystems. Shared corporate network. DMZ1 0.9 L=7 0.9 CORP L= DMZ2 L= Common vendor for remote terminal units (RTUs) RTU1 L=16 RTU1 L= RTU1 L= S RTU2 L= RTU2 L= RTU2 L= CONTROL1 L= VENDOR CONTROL2 L=5 21

22 Expected Loss at Equilibrium 3 RTUs 30 RTUs Total budget: 20 and 40, respectively. Edge-based defense. Individual defense: Each player can assign resources within its subsystem. Joint defense: a player can defend anywhere in the network. When the budgets are asymmetric, it is in the selfish interest for the player with a higher budget to defend certain assets of the other player. 22

23 Example 2: Distributed Energy Resource EMS Firewall WAN Utility Firewall Utility Router Utility Switch Instance of NESCOR failure scenario: Attacker tries to gain access to the DER so that it does not trip during low voltage. FDEMS Server PV HMI PV Equipment Router / Firewall Switch EV HMI EV Supply Equipment SCADA HMI DER SCADA Server DER Management System Server ( DERMS Server ) Example network borrowed from [Jauhar et. Al., PRDC 2015.] S w18 w17 w16 w15 w14 w13 w12 w11 w10 G 1 G Each node corresponds to an attack step. w9 w7 w8 w6 w5 w4 w3 w2 w1 G 0 PV HMI PV Equipment 23 Network access to PV HMI

24 Inefficiency of Equilibrium Investments We plot tnunvwv xyz{ }y~z xyz{ }y~z {z { {~ U:wn n nwv against the total budget. Inefficiency increases when a. total budget increases, and b. difference in the budgets of the players increases. Similar trends for both edge-based and node-based defenses. Ratio of Expected Losses % 33% 40% 45% Total Budget Percentage denotes the fraction of total budget that belongs to the PV defender. 24

25 Summary and Conclusion Proposed a general framework to compute optimal and gametheoretic defense allocation under network interdependencies. Demonstrated its applications in industrial control systems and the smart grid. Future work: Analytical investigations on the equilibrium computation problem Theoretical bounds on Price of Anarchy Validation of this approach in large-scale practical problems 25

26 Thank you!

Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets

Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram and Saurabh Bagchi School of Electrical and Computer Engineering,

More information

Human Biases Meet Cybersecurity of Embedded and Networked Systems

Human Biases Meet Cybersecurity of Embedded and Networked Systems Human Biases Meet Cybersecurity of Embedded and Networked Systems Saurabh Bagchi and Shreyas Sundaram School of Electrical and Computer Engineering CERIAS Purdue University Vision for Security of Embedded

More information

Strategic Network Formation

Strategic Network Formation Strategic Network Formation Zhongjing Yu, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming What s meaning of Strategic Network Formation? Node : a individual.

More information

Nash equilibria in Voronoi Games on Graphs

Nash equilibria in Voronoi Games on Graphs Nash equilibria in Voronoi Games on Graphs Christoph Dürr, Nguyễn Kim Thắng (Ecole Polytechnique) ESA, Eilat October 07 Plan Motivation : Study the interaction between selfish agents on Internet k players,

More information

Introduction to algorithmic mechanism design

Introduction to algorithmic mechanism design Introduction to algorithmic mechanism design Elias Koutsoupias Department of Computer Science University of Oxford EWSCS 2014 March 5-7, 2014 Part I Game Theory and Computer Science Why Game Theory and

More information

Network Improvement for Equilibrium Routing

Network Improvement for Equilibrium Routing Network Improvement for Equilibrium Routing UMANG BHASKAR University of Waterloo and KATRINA LIGETT California Institute of Technology Routing games are frequently used to model the behavior of traffic

More information

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy.

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy. Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami games and the internet Basic idea: The internet is a huge experiment

More information

A Graph-Theoretic Network Security Game

A Graph-Theoretic Network Security Game A Graph-Theoretic Network Security Game Marios Mavronicolas Vicky Papadopoulou Anna Philippou Paul Spirakis May 16, 2008 A preliminary version of this work appeared in the Proceedings of the 1st International

More information

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Symposium on Principles of Distributed Computing July 5, 4 Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos Papadimitriou,

More information

Colonel Blotto in the Phishing War

Colonel Blotto in the Phishing War Colonel Blotto in the Phishing War Pern Hui Chia Centre for Quantifiable Quality of Service in Comm. Systems (Q2S), NTNU John Chuang School of Information, UC Berkeley GameSec 2011, Nov 14-15, College

More information

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami warning, again 1 In the few remaining lectures, we will briefly

More information

Online Appendix: A Stackelberg Game Model for Botnet Data Exfiltration

Online Appendix: A Stackelberg Game Model for Botnet Data Exfiltration Online Appendix: A Stackelberg Game Model for Botnet Data Exfiltration June 29, 2017 We first provide Lemma 1 showing that the urban security problem presented in (Jain et al. 2011) (see the Related Work

More information

The Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE

The Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2349 The Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE Abstract A game-theoretic

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game

More information

Games in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University

Games in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University Games in Networks: the price of anarchy, stability and learning Éva Tardos Cornell University Why care about Games? Users with a multitude of diverse economic interests sharing a Network (Internet) browsers

More information

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability Professor Anna Nagurney Department of Operations and Information Management Isenberg School of Management

More information

Example 1: An algorithmic view of the small world phenomenon

Example 1: An algorithmic view of the small world phenomenon Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 1: Jan 17, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 1: An algorithmic view of the small world phenomenon The story

More information

An Introduction to Bilevel Programming

An Introduction to Bilevel Programming An Introduction to Bilevel Programming Chris Fricke Department of Mathematics and Statistics University of Melbourne Outline What is Bilevel Programming? Origins of Bilevel Programming. Some Properties

More information

Game-theoretic Robustness of Many-to-one Networks

Game-theoretic Robustness of Many-to-one Networks Game-theoretic Robustness of Many-to-one Networks Aron Laszka, Dávid Szeszlér 2, and Levente Buttyán Budapest University of Technology and Economics, Department of Telecommunications, Laboratory of Cryptography

More information

Modelling competition in demand-based optimization models

Modelling competition in demand-based optimization models Modelling competition in demand-based optimization models Stefano Bortolomiol Virginie Lurkin Michel Bierlaire Transport and Mobility Laboratory (TRANSP-OR) École Polytechnique Fédérale de Lausanne Workshop

More information

Secure Message Delivery Games for Device-to-Device Communications

Secure Message Delivery Games for Device-to-Device Communications Secure Message Delivery Games for Device-to-Device Communications GameSec 2014 Manos Panaousis November 6, 2014 Manos Panaousis (University of Brighton) GameSec 14 November 6, 2014 1 / 20 Future smartphones

More information

Impact of End-User Behavior on User/Network Association in HetNets

Impact of End-User Behavior on User/Network Association in HetNets Impact of End-User Behavior on User/Network Association in HetNets Mohammad Yousefvand, Mohammad Hajimirsadeghi, and Narayan B. Mandayam WINLAB, Rutgers, The State University of New Jersey, North Brunswick,

More information

Constant Price of Anarchy in Network Creation Games via Public Service Advertising

Constant Price of Anarchy in Network Creation Games via Public Service Advertising Constant Price of Anarchy in Network Creation Games via Public Service Advertising Erik D. Demaine and Morteza Zadimoghaddam MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA 02139,

More information

Lecture 25 Nonlinear Programming. November 9, 2009

Lecture 25 Nonlinear Programming. November 9, 2009 Nonlinear Programming November 9, 2009 Outline Nonlinear Programming Another example of NLP problem What makes these problems complex Scalar Function Unconstrained Problem Local and global optima: definition,

More information

CDG2A/CDZ4A/CDC4A/ MBT4A ELEMENTS OF OPERATIONS RESEARCH. Unit : I - V

CDG2A/CDZ4A/CDC4A/ MBT4A ELEMENTS OF OPERATIONS RESEARCH. Unit : I - V CDG2A/CDZ4A/CDC4A/ MBT4A ELEMENTS OF OPERATIONS RESEARCH Unit : I - V UNIT I Introduction Operations Research Meaning and definition. Origin and History Characteristics and Scope Techniques in Operations

More information

A Game Theoretic Analysis of Network Design with Socially-Aware Users

A Game Theoretic Analysis of Network Design with Socially-Aware Users A Game Theoretic Analysis of Network Design with Socially-Aware Users Jocelyne Elias, Fabio Martignon, Konstantin Avrachenkov, Giovanni Neglia Abstract In many scenarios network design is not enforced

More information

The Price of Selfishness in Network Coding

The Price of Selfishness in Network Coding The Price of Selfishness in Network Coding Jason R. Marden and Michelle Effros Abstract We introduce a game theoretic framework for studying a restricted form of network coding in a general wireless network.

More information

Minimizing the Diameter of a Network using Shortcut Edges

Minimizing the Diameter of a Network using Shortcut Edges Minimizing the Diameter of a Network using Shortcut Edges Erik D. Demaine and Morteza Zadimoghaddam MIT Computer Science and Artificial Intelligence Laboratory 32 Vassar St., Cambridge, MA 02139, USA {edemaine,morteza}@mit.edu

More information

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 Mathematical programming (optimization) problem: min f (x) s.t. x X R n set of feasible solutions with linear objective function

More information

How Bad is Selfish Routing?

How Bad is Selfish Routing? How Bad is Selfish Routing? Tim Roughgarden and Éva Tardos Presented by Brighten Godfrey 1 Game Theory Two or more players For each player, a set of strategies For each combination of played strategies,

More information

Lecture Notes on Congestion Games

Lecture Notes on Congestion Games Lecture Notes on Department of Computer Science RWTH Aachen SS 2005 Definition and Classification Description of n agents share a set of resources E strategy space of player i is S i 2 E latency for resource

More information

Bottleneck Routing Games on Grids. Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University

Bottleneck Routing Games on Grids. Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University Bottleneck Routing Games on Grids ostas Busch Rajgopal Kannan Alfred Samman Department of omputer Science Louisiana State University 1 Talk Outline Introduction Basic Game hannel Game xtensions 2 2-d Grid:

More information

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix

More information

Convergence Issues in Competitive Games

Convergence Issues in Competitive Games Convergence Issues in Competitive Games Vahab S Mirrokni 1, Adrian Vetta 2 and A Sidoropoulous 3 1 Computer Science and Artificial Intelligence Laboratory (CSAIL), MIT mail: mirrokni@theorylcsmitedu 2

More information

Robust Resource Allocation in Security Games and Ensemble Modeling of Adversary Behavior

Robust Resource Allocation in Security Games and Ensemble Modeling of Adversary Behavior Robust Resource Allocation in Security Games and Ensemble Modeling of Adversary Behavior Arjun Tambe University of Southern California 941 Bloom Walk, Los Angeles, CA 90089-0781 arjuntambe@yahoo.com Thanh

More information

Nash Equilibrium Load Balancing

Nash Equilibrium Load Balancing Nash Equilibrium Load Balancing Computer Science Department Collaborators: A. Kothari, C. Toth, Y. Zhou Load Balancing A set of m servers or machines. A set of n clients or jobs. Each job can be run only

More information

Simple Channel-Change Games for Spectrum- Agile Wireless Networks

Simple Channel-Change Games for Spectrum- Agile Wireless Networks 1 Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 5 th, 26 Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Abstract The proliferation

More information

Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks

Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks Sebastian Streg December 10, 2005 1 Introduction Efficiency in networks with lots of traffic is a serious problem

More information

Network Topology and Equilibrium Existence in Weighted Network Congestion Games

Network Topology and Equilibrium Existence in Weighted Network Congestion Games Network Topology and Equilibrium Existence in Weighted Network Congestion Games Igal Milchtaich, Bar-Ilan University August 2010 Abstract. Every finite noncooperative game can be presented as a weighted

More information

Analysing Latency and Link Utilization of Selfish Overlay Routing

Analysing Latency and Link Utilization of Selfish Overlay Routing International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 143-147 S. Prayla Shyry1 & V. Ramachandran2 Research Scholar, Sathyabama University, Chennai, India Professor,

More information

CIE4801 Transportation and spatial modelling (Uncongested) Assignment

CIE4801 Transportation and spatial modelling (Uncongested) Assignment CIE4801 Transportation and spatial modelling (Uncongested) Assignment Rob van Nes, Transport & Planning 17/4/13 Delft University of Technology Challenge the future Content What do we want to know? Shortest

More information

Prioritizing Interdictions on a Shortest Path Network

Prioritizing Interdictions on a Shortest Path Network University of Arkansas, Fayetteville ScholarWorks@UARK Industrial Engineering Undergraduate Honors Theses Industrial Engineering 5-215 Prioritizing Interdictions on a Shortest Path Network Hayden D. Summerhill

More information

Addressing Cyber Threats in Power Generation and Distribution

Addressing Cyber Threats in Power Generation and Distribution Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems

More information

Mechanism Design in Large Congestion Games

Mechanism Design in Large Congestion Games Mechanism Design in Large Congestion Games Ryan Rogers, Aaron Roth, Jonathan Ullman, and Steven Wu July 22, 2015 Routing Game l e (y) Routing Game Routing Game A routing game G is defined by Routing Game

More information

Hedonic Clustering Games

Hedonic Clustering Games Hedonic Clustering Games [Extended Abstract] Moran Feldman CS Dept., Technion Haifa, Israel moranfe@cs.technion.ac.il Liane Lewin-Eytan IBM Haifa Research Lab. Haifa, Israel lianel@il.ibm.com Joseph (Seffi)

More information

A Game Theoretic Approach to Network Coding

A Game Theoretic Approach to Network Coding IW 2009, Volos, Greece, June 10-12, 2009 A Game heoretic Approach to Network Coding Jason R. Marden and Michelle Effros Abstract We introduce a game theoretic framework for studying a restricted form of

More information

A Game-Theoretic Framework for Congestion Control in General Topology Networks

A Game-Theoretic Framework for Congestion Control in General Topology Networks A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control

More information

Department of Mathematics Oleg Burdakov of 30 October Consider the following linear programming problem (LP):

Department of Mathematics Oleg Burdakov of 30 October Consider the following linear programming problem (LP): Linköping University Optimization TAOP3(0) Department of Mathematics Examination Oleg Burdakov of 30 October 03 Assignment Consider the following linear programming problem (LP): max z = x + x s.t. x x

More information

Algorithmic Game Theory - Introduction, Complexity, Nash

Algorithmic Game Theory - Introduction, Complexity, Nash Algorithmic Game Theory - Introduction, Complexity, Nash Branislav Bošanský Czech Technical University in Prague branislav.bosansky@agents.fel.cvut.cz February 25, 2018 About This Course main topics of

More information

On the Efficiency of Negligence Rule

On the Efficiency of Negligence Rule Jawaharlal Nehru University From the SelectedWorks of Satish K. Jain 2009 On the Efficiency of Negligence Rule Satish K. Jain, Jawaharlal Nehru University Available at: https://works.bepress.com/satish_jain/2/

More information

The Future of Industrial Control Systems Security

The Future of Industrial Control Systems Security The Future of Industrial Control Systems Security Amir Samoiloff, CEO, Siga Security Ilan Gendelman, CTO, Siga Security www.sigasec.com The Importance of Operating Technology Systems Modern life relies

More information

Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains

Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe University of Southern California,

More information

Complexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games

Complexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games Algorithmic Game Theory Complexity of pure Nash equilibria We investigate the complexity of finding Nash equilibria in different kinds of congestion games. Our study is restricted to congestion games with

More information

Applied Lagrange Duality for Constrained Optimization

Applied Lagrange Duality for Constrained Optimization Applied Lagrange Duality for Constrained Optimization Robert M. Freund February 10, 2004 c 2004 Massachusetts Institute of Technology. 1 1 Overview The Practical Importance of Duality Review of Convexity

More information

Games and Cyber Security

Games and Cyber Security Games and Cyber Security Seminar at University of Bristol Manos Panaousis June 3, 2015 Outline 1 Why and how game theory can support decision-making in cyber security 2 Discuss fundamental concepts of

More information

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns This is a closed-book exam. You should have no material on your desk other than the exam itself and a pencil or pen.

More information

AI Technology for Quickly Solving Urban Security Positioning Problems

AI Technology for Quickly Solving Urban Security Positioning Problems AI Technology for Quickly Solving Urban Security Positioning Problems Hiroaki Iwashita Kotaro Ohori Hirokazu Anai Security games are used for mathematically optimizing security measures aimed at minimizing

More information

Multiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1

Multiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1 Multiple Agents Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1 Assumptions Assumptions Definitions Partially bservable Each agent can act autonomously.

More information

EC422 Mathematical Economics 2

EC422 Mathematical Economics 2 EC422 Mathematical Economics 2 Chaiyuth Punyasavatsut Chaiyuth Punyasavatust 1 Course materials and evaluation Texts: Dixit, A.K ; Sydsaeter et al. Grading: 40,30,30. OK or not. Resources: ftp://econ.tu.ac.th/class/archan/c

More information

Introduction to Dynamic Traffic Assignment

Introduction to Dynamic Traffic Assignment Introduction to Dynamic Traffic Assignment CE 392D January 22, 2018 WHAT IS EQUILIBRIUM? Transportation systems involve interactions among multiple agents. The basic facts are: Although travel choices

More information

Vertical Handover Decision Strategies A double-sided auction approach

Vertical Handover Decision Strategies A double-sided auction approach Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous

More information

A Survey of Uniqueness Results for Selfish Routing

A Survey of Uniqueness Results for Selfish Routing A Survey of Uniqueness Results for Selfish Routing Nahum Shimkin epartment of Electrical Engineering Technion, Israel Institute of Technology Haifa 32000, Israel shimkin@ee.technion.ac.il Abstract. We

More information

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3) COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms

More information

A Simplex-like Algorithm for Fisher Markets

A Simplex-like Algorithm for Fisher Markets A Simplex-like Algorithm for Fisher Markets Bharat Adsul 1, Ch. Sobhan Babu 2, Jugal Garg 1, Ruta Mehta 1, and Milind Sohoni 1 1 Indian Institute of Technology, Bombay adsul,jugal,ruta,sohoni@cse.iitb.ac.in

More information

Learning Graphical Game Models

Learning Graphical Game Models Learning Graphical Game Models Quang Duong Yevgeniy Vorobeychik Satinder Singh Michael P. Wellman Computer Science & Engineering University of Michigan Ann Arbor, MI 4819-2121 USA Computer & Information

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 5, MAY

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 5, MAY IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 55, NO 5, MAY 2007 1911 Game Theoretic Cross-Layer Transmission Policies in Multipacket Reception Wireless Networks Minh Hanh Ngo, Student Member, IEEE, and

More information

Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility. Fei Fang Wean Hall 4126

Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility. Fei Fang Wean Hall 4126 Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu Wean Hall 4126 Societal Challenges: Security and Sustainability 2 Societal Challenges: Security

More information

Optimal Routing Control: Repeated Game Approach

Optimal Routing Control: Repeated Game Approach IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 47, NO. 3, MARCH 2002 437 Optimal Routing Control: Repeated Game Approach Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract Communication networks

More information

Approximation Techniques for Utilitarian Mechanism Design

Approximation Techniques for Utilitarian Mechanism Design Approximation Techniques for Utilitarian Mechanism Design Department of Computer Science RWTH Aachen Germany joint work with Patrick Briest and Piotr Krysta 05/16/2006 1 Introduction to Utilitarian Mechanism

More information

Bilinear Programming

Bilinear Programming Bilinear Programming Artyom G. Nahapetyan Center for Applied Optimization Industrial and Systems Engineering Department University of Florida Gainesville, Florida 32611-6595 Email address: artyom@ufl.edu

More information

Challenging Applications of Stochastic Programming

Challenging Applications of Stochastic Programming Challenging Applications of Stochastic Programming Anton J. School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, Georgia, USA Stochastic Programming SPXII Conference Halifax

More information

Understanding the Internet Graph. Christos H. Papadimitriou

Understanding the Internet Graph. Christos H. Papadimitriou Understanding the Internet Graph Christos H. Papadimitriou www.cs.berkeley.edu/~christos Goals To understand the Internet topology using tools from graph and game theory To contribute to the rigorous foundations

More information

A Signaling Game Approach to Databases Querying

A Signaling Game Approach to Databases Querying A Signaling Game Approach to Databases Querying Ben McCamish 1, Arash Termehchy 1, Behrouz Touri 2, and Eduardo Cotilla-Sanchez 1 1 School of Electrical Engineering and Computer Science, Oregon State University

More information

Convex Optimization. Chapter 1 - chapter 2.2

Convex Optimization. Chapter 1 - chapter 2.2 Convex Optimization Chapter 1 - chapter 2.2 Introduction In optimization literatures, one will frequently encounter terms like linear programming, convex set convex cone, convex hull, semidefinite cone

More information

Using Game Theory To Solve Network Security. A brief survey by Willie Cohen

Using Game Theory To Solve Network Security. A brief survey by Willie Cohen Using Game Theory To Solve Network Security A brief survey by Willie Cohen Network Security Overview By default networks are very insecure There are a number of well known methods for securing a network

More information

Strong Equilibrium in Cost Sharing Connection Games

Strong Equilibrium in Cost Sharing Connection Games Strong Equilibrium in Cost Sharing Connection Games Amir Epstein School of Computer Science Tel-Aviv University Tel-Aviv, 69978, Israel amirep@tau.ac.il Michal Feldman School of Computer Science The Hebrew

More information

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness Tim Roughgarden December 2, 2013 1 The Big Picture We now have an impressive list of tractability results polynomial-time

More information

Game Theory & Networks

Game Theory & Networks Game Theory & Networks (an incredibly brief overview) ndrew Smith ECS 253/ME 289 May 10th, 2016 Game theory can help us answer important questions for scenarios where: players/agents (nodes) are autonomous

More information

Real life Problem. Review

Real life Problem. Review Linear Programming The Modelling Cycle in Decision Maths Accept solution Real life Problem Yes No Review Make simplifying assumptions Compare the solution with reality is it realistic? Interpret the solution

More information

Bounded, Closed, and Compact Sets

Bounded, Closed, and Compact Sets Bounded, Closed, and Compact Sets Definition Let D be a subset of R n. Then D is said to be bounded if there is a number M > 0 such that x < M for all x D. D is closed if it contains all the boundary points.

More information

Smart Grid Implementation Lessons Learned

Smart Grid Implementation Lessons Learned Smart Grid Implementation Lessons Learned EMMOS 2016 September 13, 2016 Andrew Hanson Distribution Operations & Automation Lead North America Agenda Smart Meters & AMI DSCADA / ADMS Data Readiness Field

More information

Bayesian Action-Graph Games

Bayesian Action-Graph Games Bayesian Action-Graph Games Albert Xin Jiang and Kevin Leyton-Brown Department of Computer Science University of British Columbia November 13, 2011 Equilibrium Computation in Bayesian Games Equilibrium

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Integer Programming. Xi Chen. Department of Management Science and Engineering International Business School Beijing Foreign Studies University

Integer Programming. Xi Chen. Department of Management Science and Engineering International Business School Beijing Foreign Studies University Integer Programming Xi Chen Department of Management Science and Engineering International Business School Beijing Foreign Studies University Xi Chen (chenxi0109@bfsu.edu.cn) Integer Programming 1 / 42

More information

ADENSE wireless network is defined to be a wireless network

ADENSE wireless network is defined to be a wireless network 1094 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 16, NO 5, OCTOBER 2008 The Analysis of Nash Equilibria of the One-Shot Random-Access Game for Wireless Networks and the Behavior of Selfish Nodes Hazer Inaltekin,

More information

Securing Interdependent Assets

Securing Interdependent Assets Noname manuscript No. (will be inserted by the editor) Securing Interdependent Assets Yevgeniy Vorobeychik Joshua Letchford the date of receipt and acceptance should be inserted later Abstract Stackelberg

More information

Uncertainty Regarding Interpretation of the `Negligence Rule' and Its Implications for the Efficiency of Outcomes

Uncertainty Regarding Interpretation of the `Negligence Rule' and Its Implications for the Efficiency of Outcomes Jawaharlal Nehru University From the SelectedWorks of Satish K. Jain 2011 Uncertainty Regarding Interpretation of the `Negligence Rule' and Its Implications for the Efficiency of Outcomes Satish K. Jain,

More information

ON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS

ON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS ON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS 1 Cristina Comaniciu Stevens Institute of Technology A DIFFERENT PERSPECTIVE ON SECURITY FOR WIRELESS Security is a key requirement

More information

doi: /j.ipl

doi: /j.ipl doi: 101016/jipl201110015 A comment on pure-strategy Nash equilibria in competitive diffusion games Reiko Takehara a, Masahiro Hachimori a, Maiko Shigeno a,1, a Graduate School of Systems and Information

More information

WIRELESS networks are envisioned to play a crucial role

WIRELESS networks are envisioned to play a crucial role 264 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 2, AUGUST 2007 A Pricing Mechanism for Resource Allocation in Wireless Multimedia Applications Fangwen Fu, Tudor M. Stoenescu, and

More information

1.1 What is Microeconomics?

1.1 What is Microeconomics? 1.1 What is Microeconomics? Economics is the study of allocating limited resources to satisfy unlimited wants. Such a tension implies tradeoffs among competing goals. The analysis can be carried out at

More information

Constraint Satisfaction Algorithms for Graphical Games

Constraint Satisfaction Algorithms for Graphical Games Constraint Satisfaction Algorithms for Graphical Games Vishal Soni soniv@umich.edu Satinder Singh baveja@umich.edu Computer Science and Engineering Division University of Michigan, Ann Arbor Michael P.

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

5.3 Cutting plane methods and Gomory fractional cuts

5.3 Cutting plane methods and Gomory fractional cuts 5.3 Cutting plane methods and Gomory fractional cuts (ILP) min c T x s.t. Ax b x 0integer feasible region X Assumption: a ij, c j and b i integer. Observation: The feasible region of an ILP can be described

More information

THE PRICE OF STABILITY FOR NETWORK DESIGN WITH FAIR COST ALLOCATION

THE PRICE OF STABILITY FOR NETWORK DESIGN WITH FAIR COST ALLOCATION THE PRICE OF STABILITY FOR NETWORK DESIGN WITH FAIR COST ALLOCATION ELLIOT ANSHELEVICH, ANIRBAN DASGUPTA, JON KLEINBERG, ÉVA TARDOS, TOM WEXLER, AND TIM ROUGHGARDEN Abstract. Network design is a fundamental

More information

Linear Programming. Linear programming provides methods for allocating limited resources among competing activities in an optimal way.

Linear Programming. Linear programming provides methods for allocating limited resources among competing activities in an optimal way. University of Southern California Viterbi School of Engineering Daniel J. Epstein Department of Industrial and Systems Engineering ISE 330: Introduction to Operations Research - Deterministic Models Fall

More information

DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS. A Thesis by. Hoang Dang. Bachelor of Arts, Lakeland College, 2007

DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS. A Thesis by. Hoang Dang. Bachelor of Arts, Lakeland College, 2007 DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS A Thesis by Hoang Dang Bachelor of Arts, Lakeland College, 2007 Submitted to the Department of Electrical Engineering and Computer Science

More information

Strategic Characterization of the Index of an Equilibrium. Arndt von Schemde. Bernhard von Stengel

Strategic Characterization of the Index of an Equilibrium. Arndt von Schemde. Bernhard von Stengel Strategic Characterization of the Index of an Equilibrium Arndt von Schemde Bernhard von Stengel Department of Mathematics London School of Economics Battle of the sexes he she football football opera

More information

MVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg

MVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:

More information

New Penalty Approaches for Bilevel Optimization Problems arising in Transportation Network Design

New Penalty Approaches for Bilevel Optimization Problems arising in Transportation Network Design New Penalty Approaches for Bilevel Optimization Problems arising in Transportation Network Design Jörg Fliege, Konstantinos Kaparis, & Huifu Xu Melbourne, 2013 Contents 1 Problem Statement 2 A Slight Detour:

More information