Saurabh Bagchi ECE & CS, Purdue University Joint work with:

Slides:



Advertisements
Similar presentations
1 Cyber Insurance and IT Security Investment: Impact of Interdependent Risk Hulisi Ogut, UT-Dallas Srinivasan Raghunathan, UT-Dallas Nirup Menon, UT-Dallas.
Advertisements

Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.
Risk Models and Controlled Mitigation of IT Security R. Ann Miura-Ko Stanford University February 27, 2009.
Nash’s Theorem Theorem (Nash, 1951): Every finite game (finite number of players, finite number of pure strategies) has at least one mixed-strategy Nash.
Mixed Strategies CMPT 882 Computational Game Theory Simon Fraser University Spring 2010 Instructor: Oliver Schulte.
Fast Convergence of Selfish Re-Routing Eyal Even-Dar, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Notes: Use this cover page for internal presentations The Behavioural Components Of Risk Aversion Greg B Davies University College.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Network Security An Economics Perspective IS250 Spring 2010 John Chuang.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
The Endowment Effect, Loss Aversion, and Status Quo Bias Daniel Kahneman, Jack L Knetsch, and Richard H Thaler (1991) Harish K Subramanian (11/18/03)
Behavioral Finance and Asset Pricing What effect does psychological bias (irrationality) have on asset demands and asset prices?
Game-Theoretic Approaches to Multi-Agent Systems Bernhard Nebel.
Behavioural Economics A presentation by - Alex Godwin, William Pratt, Lucy Mace, Jack Bovey, Luke Baker and Elise Girdler.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Monopolistic Competition
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
A Study of Computational and Human Strategies in Revelation Games 1 Noam Peled, 2 Kobi Gal, 1 Sarit Kraus 1 Bar-Ilan university, Israel. 2 Ben-Gurion university,
The Capital Structure Puzzle: Another Look at the Evidence
A Game Theoretic Framework for Incentives in P2P Systems --- CS. Uni. California Jun Cai Advisor: Jens Graupmann.
March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.
The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.
McGraw-Hill/Irwin Copyright  2008 by The McGraw-Hill Companies, Inc. All rights reserved. GAME THEORY, STRATEGIC DECISION MAKING, AND BEHAVIORAL ECONOMICS.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Computing and Approximating Equilibria: How… …and What’s the Point? Yevgeniy Vorobeychik Sandia National Laboratories.
The Cambridge Centre for Climate Change Mitigation Research (4CMR) Discussion of ‘Portfolio Optimisation for the Anxious’ presented by Greg Davies Behavioural.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
1 What is Game Theory About? r Analysis of situations where conflict of interests is present r Goal is to prescribe how conflicts can be resolved 2 2 r.
Ch15: Decision Theory & Bayesian Inference 15.1: INTRO: We are back to some theoretical statistics: 1.Decision Theory –Make decisions in the presence of.
On Investor Behavior Objective Define and discuss the concept of rational behavior.
Slide 1/20 Defending Against Strategic Adversaries in Dynamic Pricing Markets for Smart Grids Paul Wood, Saurabh Bagchi Purdue University
Computation, The Missing Ingredient in Classical Economics Edward Tsang Centre for Computational Finance and Economic Agents (CCFEA) University of Essex.
Monopolistic Competition & Oligopoly. Unit Objectives Describe the characteristics of monopolistic competition and oligopoly Discover how monopolistic.
Behavioral Issues in Multiple Criteria Decision Making Jyrki Wallenius, Aalto University School of Business Summer School on Behavioral Operational Research:
Monopolistic Competition & Oligopoly
8 Perfect Competition SLIDES CREATED BY ERIC CHIANG CHAPTER 8 SLIDE 1
How Much and On What? Defending and Deterring Strategic Attackers
Proposal Selection Form
On a Network Creation Game
Tools for Decision Analysis: Analysis of Risky Decisions
C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta
A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
Non-additive Security Games
Module 32 Game Theory.
The Future of Pension Plan Funding London School of Economics UBS Pensions Research Programme Paper: Optimal Portfolio Allocation for Pension Funds in.
Monopolistic Competition Part II
Panel: Theory and fundamental understanding of network system resiliency, performance and usability Ness B. Shroff Electrical and Computer Engineering.
TOPIC 3.1 CAPITAL MARKET THEORY
When Security Games Go Green
Further Inference in the Multiple Regression Model
The art of Emotional Decisions (Sunk Cost Evaluation)
Hypothesis Theory examples.
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Multiagent Systems Game Theory © Manfred Huber 2018.
10b - ARE BUSINESSES EFFICIENT? Monopoly in the Long Run
Behavioural Economics
Chi Square Analysis The chi square analysis allows you to use statistics to determine if your data is “good” or not. In our fruit fly labs we are using.
CASE − Cognitive Agents for Social Environments
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 11 Game with Bounded Rationality Zhu Han, Dusit Niyato, Walid.
Chi Square Analysis The chi square analysis allows you to use statistics to determine if your data is “good”. In our fruit fly labs we are using laws of.
3.3 Network-Centric Community Detection
Multiagent Systems Repeated Games © Manfred Huber 2018.
EASTERN MEDITERRANEAN UNIVERSITY DEPARTMENT OF INDUSTRIAL ENGINEERING IENG314 OPERATIONS RESEARCH II SAMIR SAMEER ABUYOUSSEF
Jump-Shot Or Drive? (Using Mixed Strategy Nash Equilibria to Predict Player Behavior) By Patrick Long.
Chi Square Analysis The chi square analysis allows you to use statistics to determine if your data “good” or not. In our fruit fly labs we are using laws.
Optimal defence of single object with imperfect false targets
Blockchain Mining Games
Presentation transcript:

Learning about Protecting Distributed Infrastructure from Behavioral Economists Saurabh Bagchi ECE & CS, Purdue University Joint work with: ECE: Shreyas Sundaram, Mustafa Abdallah Economics: Tim Cason, Daniel Woods Supported by NSF SaTC grant CNS-1718637 (2017-20)

Security is Only Too Human Security of large-scale systems (such as the power grid, industrial plants, and communication and computer networks) depend critically on human decisions A few thousand papers on optimal decision making for protecting interconnected systems But relies on classical economic models of perfectly rational and optimal behavior for human decision-makers But behavioral economics shows humans are only partly rational and thus, consistently deviate from the above-mentioned classical models. 3: Or assumes some algorithm makes all the decisions. However, large-scale security decisions almost always involve humans.

Behavioral Weighting Function Human perceptions of rewards and losses can differ substantially from their true values These perceptions can have a significant impact on the investments made to protect the systems that the individuals are managing. Humans overweight low attack probabilities and underweight large attack probabilities. Example: Prelec [1998] weighting function: 𝑤 𝑥 = exp − − ln (𝑥) α where parameter α ∈ 0,1 . When α = 1 this is rational behavior. The smaller is α, the greater is the degree of bias. Cross over happens at 1/e = 0.37

What’s Nobel Got to Do With It? Daniel Kahneman (2002 Economics Nobel Laureate): Prospect theory as a model of decision making under risk, as a counterpoint to expected utility theory Richard Thaler (2017 Economics Nobel Laureate): “I discovered the presence of human life in a place not far, far away, where my fellow economists thought it did not exist: the economy.” 2015 film The Big Short, in which Richard Thaler and Selena Gomez explain synthetic CDOs He has been aware that he was considered heretical flying in the face of well-accepted economic theory. But it is now considered niche mainstream.

Our Research Direction Game-theoretic framework involving attack graph models of large-scale interdependent systems and multiple defenders Each human defender misperceives the probabilities of successful attack in the attack graph We characterize impacts of such misperceptions on the security investments made by each defender Attacker A 𝑢 𝑗 𝑢 𝑖 Defender 2 The cost of a defender 𝐷 𝑘 is: 𝐶 𝑘 x ≜ 𝑢 𝑚 ∈ 𝑉 𝑘 𝐿 𝑚 max 𝑃∈ ℙ 𝑚 𝑢 𝑖 , 𝑢 𝑗 ∈𝑃 𝒘(𝑝 𝑖,𝑗 (x)) Defender 1 𝐿 𝑖 The defender Dk will invest to minimize his cost. Summed over all his crown jewels. 𝑝 𝑖,𝑗 Defender 3

Initial Observations Both games (vertex based and path based) have Convex cost function given a convex decreasing probability function Both games have a Pure Nash Equilibrium (PNE) state In each game, we can compute the best response by solving a convex optimization problem They have different investment decisions than standard security game which maximizes expected utility A rational player can benefit from a biased player Both players rational Player 2 biased 0.696 2 3 2.081 2 3 1.278 0.4254 2.719 L2 = 200 L2 = 200 1.516 1 1 1.974 5 6 0.4254 5 6 4 19.2 4 7.5924 L1 = 200 1.516 8.576 Overall Loss =18.1436 L1 = 200 Overall Loss = 0.3616