Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets
|
|
- Hannah Gaines
- 5 years ago
- Views:
Transcription
1 Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram and Saurabh Bagchi School of Electrical and Computer Engineering Purdue University
2 Challenge Modern critical infrastructures have a large number of assets, managed by multiple stakeholders. The security of these complex systems depends critically on the interdependencies between these assets. 2 Image credits: sgip.org, USC.
3 Contribution We propose a systematic framework for optimal and strategic allocation of defense resources in interdependent large-scale networks. 3 Image credits: sgip.org, USC.
4 Related Work Interdependent Security Games: each node is a decision-maker. [Laszka et. al., ACM CSUR 2014, Hota and Sundaram, GameSec 2015, ] Two player attacker-defender games Stackelberg Security Games [Jain et. al., AAMAS 2013, ] Colonel Blotto Games [Gupta et. al., GameSec 2014, ] Network Interdiction Games [Israeli and Wood, Networks 2002, ] Our framework captures externalities between the above two extremes. Multiple defenders, each responsible for a set of assets. The assets that belong to multiple defenders are interdependent. Closely related work: Multidefender Security Game [Lou et. al., 2016] 4
5 Interdependency Graph A directed graph where each node represents an asset in a networked system. Multiple defenders, denoted by the set D, each responsible for a subset of assets. When an asset u # is compromised, it can be used to attack asset u $ if (u #, u $ ) is an edge. p ) #,$ (0,1] : the probability of the above attack being successful. Independent across edges. Attacker A Defender 2 Defender 1 L # V 2 u # p #,$ u $ Defender 3 L # 0: loss experienced by the defender if asset u # is attacked successfully. 5
6 Attack Probability Defense strategies reduce the attack probabilities of the edges. Defender 1 A Attacker Defender 2 V 2 Joint strategy profile x = (x 5, x 2,, x 7 ), where each x 8 drawn from a convex and compact subset of R : ;. u = L = Defender 3 Let P = : set of paths from A to u = The attack probability on a node u = due to a given path P P = is? p #,$ A B,A C D (x) 6
7 Cost of a Defender Defender 1 A Attacker Defender 2 V 2 The cost of a defender D E is given by u = L = Defender 3 C E (x) H L = max? p #,$ D P K A B,A C D A K L M (x) Captures the notion of weakest link. 7
8 Defense Strategies x E #,N : defense allocation by defender D E on edge (u #, u $ ). Multiple defenders can potentially assign defense resources on a single edge. u # u $ E x #,N 8
9 Defense Strategies x E #,N : defense allocation by defender D E on edge (u #, u $ ). Multiple defenders can potentially assign defense resources on a single edge. More Generally: u # u $ E x #,N Let T 8 : R Q ; R U be a linear map that transforms defense strategy of defender D E, denoted by x 8, to the edges of the graph. T 8 x 8 #,$ : defense allocation by defender D E on edge (u #, u $ ). 9
10 Defense Strategies x E #,N : defense allocation by defender D E on edge (u #, u $ ). Multiple defenders can potentially assign defense resources on a single edge. More Generally: u # u $ E x #,N Let T 8 : R Q ; R U be a linear map that transforms defense strategy of defender D E, denoted by x 8, to the edges of the graph. Example: Edge-based defense strategy Defender D 5 can only defend the edge (A, D 5 ). D 2 only defends (A, D 2 ). x 5 and x 2 are scalars. T 5 = 1 0 D 5 A T 2 = 0 1 D 2 10
11 Transformation of Probabilities Define the length of an edge i, j as l ) ) #,$ log p #,$ [0, ) Under a joint defense strategy, the modified length is given by l #,$ x l ) E #,$ + H x #,N E E = l #,$ x b8 + x #,N Initial length Length under joint defense strategy x u # u $ ) l #,$ u # u $ l ) E #,$ + H x #,N 11 E
12 Transformation of Probabilities Define the length of an edge i, j as l ) ) #,$ log p #,$ [0, ) Under a joint defense strategy, the modified length is given by l #,$ x l ) E #,$ + H x #,N E Equivalently p #,$ x p ) E #,$ exp H x #,N E Satisfies the assumptions in the Gordon-Loeb model. 12
13 Observation The attack probability on a node u = due to a given path P P = is? p #,$ A B,A C D x = exp H l E #,$ + H x #,N A B,A C D E Path with the highest attack probability has the smallest length. 13
14 Equilibria in the Multidefender Game The cost of Defender D E can be stated as C E x 8, x b8 H L = max? p #,$ D P K A B,A C D A K L M x Affine in x 8 for given x b8 = H L = exp min H l #,$ x b8 + x D P #,N K A K L M A B,A C D E Convex in x 8 for given x b8 14
15 Equilibria in the Multidefender Game The cost of Defender D E can be stated as C E x 8, x b8 H L = max? p #,$ D P K A B,A C D A K L M x Affine in x 8 for given x b8 = H L = exp min H l #,$ x b8 + x D P #,N K A K L M A B,A C D E Convex in x 8 for given x b8 Theorem The multidefender game is an instance of concave game [Rosen, Econometrica, 1965] and a pure Nash equilibrium exists. 15
16 Computing Best Response Theorem The best response of Defender D E can be computed by solving the following convex optimization problem. min g R h i,j Rh k M s.t. H L = e bg K A K L M y $ y n x E #,N l #,$ x b8, edge (u #, u $ ) y q = 0 y = : feasible potential of node u =, at most the length of the shortest path from node u q y q : potential of attacker node 1 r x E B E u # u $ Budget constraint E y $ y n + H x #,N E 16
17 Computing Best Response Theorem The best response of Defender D E can be computed by solving the following convex optimization problem. min g R h i,j Rh k M s.t. H L = e bg K A K L M y $ y n x E #,N l #,$ x b8, edge (u #, u $ ) y = : feasible potential of node u =, at most the length of the shortest path from node u q y q = 0 1 r x E B E When the graph does not have a cycle of negative length, a feasible potential exists and the potential at every node is equal to the length of the shortest path from the source [Cook et al, 1998]. 17
18 Observation Given the defense strategies of other players, a player can compute her best response efficiently. A social planner can efficiently compute optimal defense allocations over the entire network. 18
19 Computing Nash Equilibrium Expected loss of a player in the original formulation is nondifferentiable. In the modified convex formulation, the constraints of a player depend on the strategies of other players. Leads to a Generalized Nash Equilibrium Problem. When each player values a single asset in the network, equilibrium strategies can be computed by solving a Linear Complementarity Problem [Sreekumaran, Hota and others, arxiv: , 2015]. In this work, we compute Nash equilibrium strategies by iteratively computing the best responses of the players. 19
20 Case Studies 20
21 Example 1: SCADA Network Two interdependent control subsystems. Shared corporate network. DMZ1 0.9 L=7 0.9 CORP L= DMZ2 L= Common vendor for remote terminal units (RTUs) RTU1 L=16 RTU1 L= RTU1 L= S RTU2 L= RTU2 L= RTU2 L= CONTROL1 L= VENDOR CONTROL2 L=5 21
22 Expected Loss at Equilibrium 3 RTUs 30 RTUs Total budget: 20 and 40, respectively. Edge-based defense. Individual defense: Each player can assign resources within its subsystem. Joint defense: a player can defend anywhere in the network. When the budgets are asymmetric, it is in the selfish interest for the player with a higher budget to defend certain assets of the other player. 22
23 Example 2: Distributed Energy Resource EMS Firewall WAN Utility Firewall Utility Router Utility Switch Instance of NESCOR failure scenario: Attacker tries to gain access to the DER so that it does not trip during low voltage. FDEMS Server PV HMI PV Equipment Router / Firewall Switch EV HMI EV Supply Equipment SCADA HMI DER SCADA Server DER Management System Server ( DERMS Server ) Example network borrowed from [Jauhar et. Al., PRDC 2015.] S w18 w17 w16 w15 w14 w13 w12 w11 w10 G 1 G Each node corresponds to an attack step. w9 w7 w8 w6 w5 w4 w3 w2 w1 G 0 PV HMI PV Equipment 23 Network access to PV HMI
24 Inefficiency of Equilibrium Investments We plot tnunvwv xyz{ }y~z xyz{ }y~z {z { {~ U:wn n nwv against the total budget. Inefficiency increases when a. total budget increases, and b. difference in the budgets of the players increases. Similar trends for both edge-based and node-based defenses. Ratio of Expected Losses % 33% 40% 45% Total Budget Percentage denotes the fraction of total budget that belongs to the PV defender. 24
25 Summary and Conclusion Proposed a general framework to compute optimal and gametheoretic defense allocation under network interdependencies. Demonstrated its applications in industrial control systems and the smart grid. Future work: Analytical investigations on the equilibrium computation problem Theoretical bounds on Price of Anarchy Validation of this approach in large-scale practical problems 25
26 Thank you!
Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets
Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram and Saurabh Bagchi School of Electrical and Computer Engineering,
More informationHuman Biases Meet Cybersecurity of Embedded and Networked Systems
Human Biases Meet Cybersecurity of Embedded and Networked Systems Saurabh Bagchi and Shreyas Sundaram School of Electrical and Computer Engineering CERIAS Purdue University Vision for Security of Embedded
More informationStrategic Network Formation
Strategic Network Formation Zhongjing Yu, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming What s meaning of Strategic Network Formation? Node : a individual.
More informationNash equilibria in Voronoi Games on Graphs
Nash equilibria in Voronoi Games on Graphs Christoph Dürr, Nguyễn Kim Thắng (Ecole Polytechnique) ESA, Eilat October 07 Plan Motivation : Study the interaction between selfish agents on Internet k players,
More informationIntroduction to algorithmic mechanism design
Introduction to algorithmic mechanism design Elias Koutsoupias Department of Computer Science University of Oxford EWSCS 2014 March 5-7, 2014 Part I Game Theory and Computer Science Why Game Theory and
More informationNetwork Improvement for Equilibrium Routing
Network Improvement for Equilibrium Routing UMANG BHASKAR University of Waterloo and KATRINA LIGETT California Institute of Technology Routing games are frequently used to model the behavior of traffic
More informationAlgorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy.
Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami games and the internet Basic idea: The internet is a huge experiment
More informationA Graph-Theoretic Network Security Game
A Graph-Theoretic Network Security Game Marios Mavronicolas Vicky Papadopoulou Anna Philippou Paul Spirakis May 16, 2008 A preliminary version of this work appeared in the Proceedings of the 1st International
More informationSelfish Caching in Distributed Systems: A Game-Theoretic Analysis
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Symposium on Principles of Distributed Computing July 5, 4 Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos Papadimitriou,
More informationColonel Blotto in the Phishing War
Colonel Blotto in the Phishing War Pern Hui Chia Centre for Quantifiable Quality of Service in Comm. Systems (Q2S), NTNU John Chuang School of Information, UC Berkeley GameSec 2011, Nov 14-15, College
More informationAlgorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy
Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami warning, again 1 In the few remaining lectures, we will briefly
More informationOnline Appendix: A Stackelberg Game Model for Botnet Data Exfiltration
Online Appendix: A Stackelberg Game Model for Botnet Data Exfiltration June 29, 2017 We first provide Lemma 1 showing that the urban security problem presented in (Jain et al. 2011) (see the Related Work
More informationThe Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2349 The Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE Abstract A game-theoretic
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game
More informationGames in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University
Games in Networks: the price of anarchy, stability and learning Éva Tardos Cornell University Why care about Games? Users with a multitude of diverse economic interests sharing a Network (Internet) browsers
More informationA Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability Professor Anna Nagurney Department of Operations and Information Management Isenberg School of Management
More informationExample 1: An algorithmic view of the small world phenomenon
Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 1: Jan 17, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 1: An algorithmic view of the small world phenomenon The story
More informationAn Introduction to Bilevel Programming
An Introduction to Bilevel Programming Chris Fricke Department of Mathematics and Statistics University of Melbourne Outline What is Bilevel Programming? Origins of Bilevel Programming. Some Properties
More informationGame-theoretic Robustness of Many-to-one Networks
Game-theoretic Robustness of Many-to-one Networks Aron Laszka, Dávid Szeszlér 2, and Levente Buttyán Budapest University of Technology and Economics, Department of Telecommunications, Laboratory of Cryptography
More informationModelling competition in demand-based optimization models
Modelling competition in demand-based optimization models Stefano Bortolomiol Virginie Lurkin Michel Bierlaire Transport and Mobility Laboratory (TRANSP-OR) École Polytechnique Fédérale de Lausanne Workshop
More informationSecure Message Delivery Games for Device-to-Device Communications
Secure Message Delivery Games for Device-to-Device Communications GameSec 2014 Manos Panaousis November 6, 2014 Manos Panaousis (University of Brighton) GameSec 14 November 6, 2014 1 / 20 Future smartphones
More informationImpact of End-User Behavior on User/Network Association in HetNets
Impact of End-User Behavior on User/Network Association in HetNets Mohammad Yousefvand, Mohammad Hajimirsadeghi, and Narayan B. Mandayam WINLAB, Rutgers, The State University of New Jersey, North Brunswick,
More informationConstant Price of Anarchy in Network Creation Games via Public Service Advertising
Constant Price of Anarchy in Network Creation Games via Public Service Advertising Erik D. Demaine and Morteza Zadimoghaddam MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA 02139,
More informationLecture 25 Nonlinear Programming. November 9, 2009
Nonlinear Programming November 9, 2009 Outline Nonlinear Programming Another example of NLP problem What makes these problems complex Scalar Function Unconstrained Problem Local and global optima: definition,
More informationCDG2A/CDZ4A/CDC4A/ MBT4A ELEMENTS OF OPERATIONS RESEARCH. Unit : I - V
CDG2A/CDZ4A/CDC4A/ MBT4A ELEMENTS OF OPERATIONS RESEARCH Unit : I - V UNIT I Introduction Operations Research Meaning and definition. Origin and History Characteristics and Scope Techniques in Operations
More informationA Game Theoretic Analysis of Network Design with Socially-Aware Users
A Game Theoretic Analysis of Network Design with Socially-Aware Users Jocelyne Elias, Fabio Martignon, Konstantin Avrachenkov, Giovanni Neglia Abstract In many scenarios network design is not enforced
More informationThe Price of Selfishness in Network Coding
The Price of Selfishness in Network Coding Jason R. Marden and Michelle Effros Abstract We introduce a game theoretic framework for studying a restricted form of network coding in a general wireless network.
More informationMinimizing the Diameter of a Network using Shortcut Edges
Minimizing the Diameter of a Network using Shortcut Edges Erik D. Demaine and Morteza Zadimoghaddam MIT Computer Science and Artificial Intelligence Laboratory 32 Vassar St., Cambridge, MA 02139, USA {edemaine,morteza}@mit.edu
More information4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 Mathematical programming (optimization) problem: min f (x) s.t. x X R n set of feasible solutions with linear objective function
More informationHow Bad is Selfish Routing?
How Bad is Selfish Routing? Tim Roughgarden and Éva Tardos Presented by Brighten Godfrey 1 Game Theory Two or more players For each player, a set of strategies For each combination of played strategies,
More informationLecture Notes on Congestion Games
Lecture Notes on Department of Computer Science RWTH Aachen SS 2005 Definition and Classification Description of n agents share a set of resources E strategy space of player i is S i 2 E latency for resource
More informationBottleneck Routing Games on Grids. Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University
Bottleneck Routing Games on Grids ostas Busch Rajgopal Kannan Alfred Samman Department of omputer Science Louisiana State University 1 Talk Outline Introduction Basic Game hannel Game xtensions 2 2-d Grid:
More informationOn the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games
On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix
More informationConvergence Issues in Competitive Games
Convergence Issues in Competitive Games Vahab S Mirrokni 1, Adrian Vetta 2 and A Sidoropoulous 3 1 Computer Science and Artificial Intelligence Laboratory (CSAIL), MIT mail: mirrokni@theorylcsmitedu 2
More informationRobust Resource Allocation in Security Games and Ensemble Modeling of Adversary Behavior
Robust Resource Allocation in Security Games and Ensemble Modeling of Adversary Behavior Arjun Tambe University of Southern California 941 Bloom Walk, Los Angeles, CA 90089-0781 arjuntambe@yahoo.com Thanh
More informationNash Equilibrium Load Balancing
Nash Equilibrium Load Balancing Computer Science Department Collaborators: A. Kothari, C. Toth, Y. Zhou Load Balancing A set of m servers or machines. A set of n clients or jobs. Each job can be run only
More informationSimple Channel-Change Games for Spectrum- Agile Wireless Networks
1 Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 5 th, 26 Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Abstract The proliferation
More informationTopics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks
Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks Sebastian Streg December 10, 2005 1 Introduction Efficiency in networks with lots of traffic is a serious problem
More informationNetwork Topology and Equilibrium Existence in Weighted Network Congestion Games
Network Topology and Equilibrium Existence in Weighted Network Congestion Games Igal Milchtaich, Bar-Ilan University August 2010 Abstract. Every finite noncooperative game can be presented as a weighted
More informationAnalysing Latency and Link Utilization of Selfish Overlay Routing
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 143-147 S. Prayla Shyry1 & V. Ramachandran2 Research Scholar, Sathyabama University, Chennai, India Professor,
More informationCIE4801 Transportation and spatial modelling (Uncongested) Assignment
CIE4801 Transportation and spatial modelling (Uncongested) Assignment Rob van Nes, Transport & Planning 17/4/13 Delft University of Technology Challenge the future Content What do we want to know? Shortest
More informationPrioritizing Interdictions on a Shortest Path Network
University of Arkansas, Fayetteville ScholarWorks@UARK Industrial Engineering Undergraduate Honors Theses Industrial Engineering 5-215 Prioritizing Interdictions on a Shortest Path Network Hayden D. Summerhill
More informationAddressing Cyber Threats in Power Generation and Distribution
Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems
More informationMechanism Design in Large Congestion Games
Mechanism Design in Large Congestion Games Ryan Rogers, Aaron Roth, Jonathan Ullman, and Steven Wu July 22, 2015 Routing Game l e (y) Routing Game Routing Game A routing game G is defined by Routing Game
More informationHedonic Clustering Games
Hedonic Clustering Games [Extended Abstract] Moran Feldman CS Dept., Technion Haifa, Israel moranfe@cs.technion.ac.il Liane Lewin-Eytan IBM Haifa Research Lab. Haifa, Israel lianel@il.ibm.com Joseph (Seffi)
More informationA Game Theoretic Approach to Network Coding
IW 2009, Volos, Greece, June 10-12, 2009 A Game heoretic Approach to Network Coding Jason R. Marden and Michelle Effros Abstract We introduce a game theoretic framework for studying a restricted form of
More informationA Game-Theoretic Framework for Congestion Control in General Topology Networks
A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control
More informationDepartment of Mathematics Oleg Burdakov of 30 October Consider the following linear programming problem (LP):
Linköping University Optimization TAOP3(0) Department of Mathematics Examination Oleg Burdakov of 30 October 03 Assignment Consider the following linear programming problem (LP): max z = x + x s.t. x x
More informationAlgorithmic Game Theory - Introduction, Complexity, Nash
Algorithmic Game Theory - Introduction, Complexity, Nash Branislav Bošanský Czech Technical University in Prague branislav.bosansky@agents.fel.cvut.cz February 25, 2018 About This Course main topics of
More informationOn the Efficiency of Negligence Rule
Jawaharlal Nehru University From the SelectedWorks of Satish K. Jain 2009 On the Efficiency of Negligence Rule Satish K. Jain, Jawaharlal Nehru University Available at: https://works.bepress.com/satish_jain/2/
More informationThe Future of Industrial Control Systems Security
The Future of Industrial Control Systems Security Amir Samoiloff, CEO, Siga Security Ilan Gendelman, CTO, Siga Security www.sigasec.com The Importance of Operating Technology Systems Modern life relies
More informationUrban Security: Game-Theoretic Resource Allocation in Networked Physical Domains
Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe University of Southern California,
More informationComplexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games
Algorithmic Game Theory Complexity of pure Nash equilibria We investigate the complexity of finding Nash equilibria in different kinds of congestion games. Our study is restricted to congestion games with
More informationApplied Lagrange Duality for Constrained Optimization
Applied Lagrange Duality for Constrained Optimization Robert M. Freund February 10, 2004 c 2004 Massachusetts Institute of Technology. 1 1 Overview The Practical Importance of Duality Review of Convexity
More informationGames and Cyber Security
Games and Cyber Security Seminar at University of Bristol Manos Panaousis June 3, 2015 Outline 1 Why and how game theory can support decision-making in cyber security 2 Discuss fundamental concepts of
More informationMIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns
MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns This is a closed-book exam. You should have no material on your desk other than the exam itself and a pencil or pen.
More informationAI Technology for Quickly Solving Urban Security Positioning Problems
AI Technology for Quickly Solving Urban Security Positioning Problems Hiroaki Iwashita Kotaro Ohori Hirokazu Anai Security games are used for mathematically optimizing security measures aimed at minimizing
More informationMultiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1
Multiple Agents Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1 Assumptions Assumptions Definitions Partially bservable Each agent can act autonomously.
More informationEC422 Mathematical Economics 2
EC422 Mathematical Economics 2 Chaiyuth Punyasavatsut Chaiyuth Punyasavatust 1 Course materials and evaluation Texts: Dixit, A.K ; Sydsaeter et al. Grading: 40,30,30. OK or not. Resources: ftp://econ.tu.ac.th/class/archan/c
More informationIntroduction to Dynamic Traffic Assignment
Introduction to Dynamic Traffic Assignment CE 392D January 22, 2018 WHAT IS EQUILIBRIUM? Transportation systems involve interactions among multiple agents. The basic facts are: Although travel choices
More informationVertical Handover Decision Strategies A double-sided auction approach
Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous
More informationA Survey of Uniqueness Results for Selfish Routing
A Survey of Uniqueness Results for Selfish Routing Nahum Shimkin epartment of Electrical Engineering Technion, Israel Institute of Technology Haifa 32000, Israel shimkin@ee.technion.ac.il Abstract. We
More informationLecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)
COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms
More informationA Simplex-like Algorithm for Fisher Markets
A Simplex-like Algorithm for Fisher Markets Bharat Adsul 1, Ch. Sobhan Babu 2, Jugal Garg 1, Ruta Mehta 1, and Milind Sohoni 1 1 Indian Institute of Technology, Bombay adsul,jugal,ruta,sohoni@cse.iitb.ac.in
More informationLearning Graphical Game Models
Learning Graphical Game Models Quang Duong Yevgeniy Vorobeychik Satinder Singh Michael P. Wellman Computer Science & Engineering University of Michigan Ann Arbor, MI 4819-2121 USA Computer & Information
More informationIEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 5, MAY
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 55, NO 5, MAY 2007 1911 Game Theoretic Cross-Layer Transmission Policies in Multipacket Reception Wireless Networks Minh Hanh Ngo, Student Member, IEEE, and
More informationData-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility. Fei Fang Wean Hall 4126
Data-Aware Game Theory and Mechanism Design for Security, Sustainability and Mobility Fei Fang feifang@cmu.edu Wean Hall 4126 Societal Challenges: Security and Sustainability 2 Societal Challenges: Security
More informationOptimal Routing Control: Repeated Game Approach
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 47, NO. 3, MARCH 2002 437 Optimal Routing Control: Repeated Game Approach Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract Communication networks
More informationApproximation Techniques for Utilitarian Mechanism Design
Approximation Techniques for Utilitarian Mechanism Design Department of Computer Science RWTH Aachen Germany joint work with Patrick Briest and Piotr Krysta 05/16/2006 1 Introduction to Utilitarian Mechanism
More informationBilinear Programming
Bilinear Programming Artyom G. Nahapetyan Center for Applied Optimization Industrial and Systems Engineering Department University of Florida Gainesville, Florida 32611-6595 Email address: artyom@ufl.edu
More informationChallenging Applications of Stochastic Programming
Challenging Applications of Stochastic Programming Anton J. School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, Georgia, USA Stochastic Programming SPXII Conference Halifax
More informationUnderstanding the Internet Graph. Christos H. Papadimitriou
Understanding the Internet Graph Christos H. Papadimitriou www.cs.berkeley.edu/~christos Goals To understand the Internet topology using tools from graph and game theory To contribute to the rigorous foundations
More informationA Signaling Game Approach to Databases Querying
A Signaling Game Approach to Databases Querying Ben McCamish 1, Arash Termehchy 1, Behrouz Touri 2, and Eduardo Cotilla-Sanchez 1 1 School of Electrical Engineering and Computer Science, Oregon State University
More informationConvex Optimization. Chapter 1 - chapter 2.2
Convex Optimization Chapter 1 - chapter 2.2 Introduction In optimization literatures, one will frequently encounter terms like linear programming, convex set convex cone, convex hull, semidefinite cone
More informationUsing Game Theory To Solve Network Security. A brief survey by Willie Cohen
Using Game Theory To Solve Network Security A brief survey by Willie Cohen Network Security Overview By default networks are very insecure There are a number of well known methods for securing a network
More informationStrong Equilibrium in Cost Sharing Connection Games
Strong Equilibrium in Cost Sharing Connection Games Amir Epstein School of Computer Science Tel-Aviv University Tel-Aviv, 69978, Israel amirep@tau.ac.il Michal Feldman School of Computer Science The Hebrew
More informationCS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness
CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness Tim Roughgarden December 2, 2013 1 The Big Picture We now have an impressive list of tractability results polynomial-time
More informationGame Theory & Networks
Game Theory & Networks (an incredibly brief overview) ndrew Smith ECS 253/ME 289 May 10th, 2016 Game theory can help us answer important questions for scenarios where: players/agents (nodes) are autonomous
More informationReal life Problem. Review
Linear Programming The Modelling Cycle in Decision Maths Accept solution Real life Problem Yes No Review Make simplifying assumptions Compare the solution with reality is it realistic? Interpret the solution
More informationBounded, Closed, and Compact Sets
Bounded, Closed, and Compact Sets Definition Let D be a subset of R n. Then D is said to be bounded if there is a number M > 0 such that x < M for all x D. D is closed if it contains all the boundary points.
More informationSmart Grid Implementation Lessons Learned
Smart Grid Implementation Lessons Learned EMMOS 2016 September 13, 2016 Andrew Hanson Distribution Operations & Automation Lead North America Agenda Smart Meters & AMI DSCADA / ADMS Data Readiness Field
More informationBayesian Action-Graph Games
Bayesian Action-Graph Games Albert Xin Jiang and Kevin Leyton-Brown Department of Computer Science University of British Columbia November 13, 2011 Equilibrium Computation in Bayesian Games Equilibrium
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationInteger Programming. Xi Chen. Department of Management Science and Engineering International Business School Beijing Foreign Studies University
Integer Programming Xi Chen Department of Management Science and Engineering International Business School Beijing Foreign Studies University Xi Chen (chenxi0109@bfsu.edu.cn) Integer Programming 1 / 42
More informationADENSE wireless network is defined to be a wireless network
1094 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 16, NO 5, OCTOBER 2008 The Analysis of Nash Equilibria of the One-Shot Random-Access Game for Wireless Networks and the Behavior of Selfish Nodes Hazer Inaltekin,
More informationSecuring Interdependent Assets
Noname manuscript No. (will be inserted by the editor) Securing Interdependent Assets Yevgeniy Vorobeychik Joshua Letchford the date of receipt and acceptance should be inserted later Abstract Stackelberg
More informationUncertainty Regarding Interpretation of the `Negligence Rule' and Its Implications for the Efficiency of Outcomes
Jawaharlal Nehru University From the SelectedWorks of Satish K. Jain 2011 Uncertainty Regarding Interpretation of the `Negligence Rule' and Its Implications for the Efficiency of Outcomes Satish K. Jain,
More informationON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS
ON SECURITY-ENERGY TRADEOFFS AND COOPERATION FOR WIRELESS AD HOC NETWORKS 1 Cristina Comaniciu Stevens Institute of Technology A DIFFERENT PERSPECTIVE ON SECURITY FOR WIRELESS Security is a key requirement
More informationdoi: /j.ipl
doi: 101016/jipl201110015 A comment on pure-strategy Nash equilibria in competitive diffusion games Reiko Takehara a, Masahiro Hachimori a, Maiko Shigeno a,1, a Graduate School of Systems and Information
More informationWIRELESS networks are envisioned to play a crucial role
264 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 2, AUGUST 2007 A Pricing Mechanism for Resource Allocation in Wireless Multimedia Applications Fangwen Fu, Tudor M. Stoenescu, and
More information1.1 What is Microeconomics?
1.1 What is Microeconomics? Economics is the study of allocating limited resources to satisfy unlimited wants. Such a tension implies tradeoffs among competing goals. The analysis can be carried out at
More informationConstraint Satisfaction Algorithms for Graphical Games
Constraint Satisfaction Algorithms for Graphical Games Vishal Soni soniv@umich.edu Satinder Singh baveja@umich.edu Computer Science and Engineering Division University of Michigan, Ann Arbor Michael P.
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More information5.3 Cutting plane methods and Gomory fractional cuts
5.3 Cutting plane methods and Gomory fractional cuts (ILP) min c T x s.t. Ax b x 0integer feasible region X Assumption: a ij, c j and b i integer. Observation: The feasible region of an ILP can be described
More informationTHE PRICE OF STABILITY FOR NETWORK DESIGN WITH FAIR COST ALLOCATION
THE PRICE OF STABILITY FOR NETWORK DESIGN WITH FAIR COST ALLOCATION ELLIOT ANSHELEVICH, ANIRBAN DASGUPTA, JON KLEINBERG, ÉVA TARDOS, TOM WEXLER, AND TIM ROUGHGARDEN Abstract. Network design is a fundamental
More informationLinear Programming. Linear programming provides methods for allocating limited resources among competing activities in an optimal way.
University of Southern California Viterbi School of Engineering Daniel J. Epstein Department of Industrial and Systems Engineering ISE 330: Introduction to Operations Research - Deterministic Models Fall
More informationDATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS. A Thesis by. Hoang Dang. Bachelor of Arts, Lakeland College, 2007
DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS A Thesis by Hoang Dang Bachelor of Arts, Lakeland College, 2007 Submitted to the Department of Electrical Engineering and Computer Science
More informationStrategic Characterization of the Index of an Equilibrium. Arndt von Schemde. Bernhard von Stengel
Strategic Characterization of the Index of an Equilibrium Arndt von Schemde Bernhard von Stengel Department of Mathematics London School of Economics Battle of the sexes he she football football opera
More informationMVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg
MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:
More informationNew Penalty Approaches for Bilevel Optimization Problems arising in Transportation Network Design
New Penalty Approaches for Bilevel Optimization Problems arising in Transportation Network Design Jörg Fliege, Konstantinos Kaparis, & Huifu Xu Melbourne, 2013 Contents 1 Problem Statement 2 A Slight Detour:
More information