1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.

Slides:



Advertisements
Similar presentations
The role of compatibility in the diffusion of technologies in social networks Mohammad Mahdian Yahoo! Research Joint work with N. Immorlica, J. Kleinberg,
Advertisements

Mathematical Preliminaries
Analysis of Computer Algorithms
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson.
Generating Random Spanning Trees Sourav Chatterji Sumit Gulwani EECS Department University of California, Berkeley.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Analysis of Algorithms
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 Approximability Results for Induced Matchings in Graphs David Manlove University of Glasgow Joint work with Billy Duckworth Michele Zito Macquarie University.
Formal Models of Computation Part III Computability & Complexity
Reductions Complexity ©D.Moshkovitz.
6.896: Topics in Algorithmic Game Theory Lecture 21 Yang Cai.
1 Bart Jansen Polynomial Kernels for Hard Problems on Disk Graphs Accepted for presentation at SWAT 2010.
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman TexPoint fonts used in EMF. Read the TexPoint manual.
COMP 482: Design and Analysis of Algorithms
Abbas Edalat Imperial College London Contains joint work with Andre Lieutier (AL) and joint work with Marko Krznaric (MK) Data Types.
1 On c-Vertex Ranking of Graphs Yung-Ling Lai & Yi-Ming Chen National Chiayi University Taiwan.
Addition 1’s to 20.
25 seconds left…...
Complexity ©D.Moshkovits 1 Where Can We Draw The Line? On the Hardness of Satisfiability Problems.
Week 1.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
From Approximative Kernelization to High Fidelity Reductions joint with Michael Fellows Ariel Kulik Frances Rosamond Technion Charles Darwin Univ. Hadas.
Trees Chapter 11.
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
Epp, section 10.? CS 202 Aaron Bloomfield
 Theorem 5.9: Let G be a simple graph with n vertices, where n>2. G has a Hamilton circuit if for any two vertices u and v of G that are not adjacent,
Lecture 9 - Cop-win Graphs and Retracts Dr. Anthony Bonato Ryerson University AM8002 Fall 2014.
Minimum Vertex Cover in Rectangle Graphs
1 Graphs with Maximal Induced Matchings of the Same Size Ph. Baptiste 1, M. Kovalyov 2, Yu. Orlovich 3, F. Werner 4, I. Zverovich 3 1 Ecole Polytechnique,
1 Almost all cop-win graphs contain a universal vertex Anthony Bonato Ryerson University CanaDAM 2011.
Price Of Anarchy: Routing
A survey of some results on the Firefighter Problem Kah Loon Ng DIMACS Wow! I need reinforcements!
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 On the price of anarchy and stability of correlated equilibria of linear congestion games By George Christodoulou Elias Koutsoupias Presented by Efrat.
On the Price of Stability for Designing Undirected Networks with Fair Cost Allocations Svetlana Olonetsky Joint work with Amos Fiat, Haim Kaplan, Meital.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Near-Optimal Network Design With Selfish Agents Elliot Anshelevich, Anirban Dasgupta, Éva Tardos, Tom Wexler STOC’03, June 9–11, 2003, San Diego, California,
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
1 Network Creation Game A. Fabrikant, A. Luthra, E. Maneva, C. H. Papadimitriou, and S. Shenker, PODC 2003 (Part of the Slides are taken from Alex Fabrikant’s.
One Hundred Bounds on the Price of Anarchy Marios Mavronicolas Department of Computer Science University of Cyprus Cyprus School on Algorithmic Game Theory.
The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.
1 COMMUNICATION NETWORKS AND COMPLEXITY COOPERATION AND ANTAGONISM IN SELFISH NETWORKS (ALGORITHMIC ISSUES) Paul G. Spirakis RACTI (Greece) August 2006.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy.
Approximation Algorithms
On a Network Creation Game PoA Seminar Presenting: Oren Gilon Based on an article by Fabrikant et al 1.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Ásbjörn H Kristbjörnsson1 The complexity of Finding Nash Equilibria Ásbjörn H Kristbjörnsson Algorithms, Logic and Complexity.
Hedonic Clustering Games Moran Feldman Joint work with: Seffi Naor and Liane Lewin-Eytan.
Vasilis Syrgkanis Cornell University
Approximation Algorithms Greedy Strategies. I hear, I forget. I learn, I remember. I do, I understand! 2 Max and Min  min f is equivalent to max –f.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
What is the next line of the proof?
Exact Algorithms via Monotone Local Search
Chapter 5. Optimal Matchings
Instructor: Shengyu Zhang
Network Formation Games
Network Formation Games
Presentation transcript:

1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University of Patras and RACTI, Greece §

WINE, Dec A Network Security Problem Information network with nodes insecure and vulnerable to infection by attackers e.g., viruses, Trojan horses, eavesdroppers, and a system security software or a defender of limited power, e.g. able to clean a part of the network. In particular, we consider a graph G with attackers each of them locating on a node of G and a defender, able to clean a single edge of the graph.

WINE, Dec A Network Security Game: Edge Model We modeled the problem as a Game on a graph G(V, E) with two kinds of players (set ): attackers (set ) or vertex players (vps) vp i, each of them with action set, S vp i = V, a defender or the edge player ep, with action set, S ep = E, and Individual Profits in a profile, vertex player vp i : i.e., 1 if it is not caught by the edge player, and 0 otherwise. Edge player ep:, i.e. gains the number of vps incident to its selected edge s ep.

WINE, Dec Nash Equilibria in the Edge Model We consider pure and mixed strategy profiles. Study associated Nash equilibria (NE), where no player can unilaterally improve its Individual Cost by switching to another configuration.

WINE, Dec Notation P s (ep, e): probability ep chooses edge e in s P s (vp i,  ): probability vp i chooses vertex  in s P s (vp,  ) =  i 2 N vp P s (vp i,v): # vps located on vertex  in s D s (i): the support (actions assigned positive probability) of player i2 in s. ENeigh s (  ) = P s (Hit(  )) = : the hitting probability of  m s (v) = : expected # of vps choosing  m s (e) = m s (u)+m s (v) Neigh G (X) =

WINE, Dec Expected Individual Costs vertex players vp i : (1) edge player ep: (2)

WINE, Dec Previous Work for the Edge Model No instance of the model contains a pure NE (ISAAC 05) A graph-theoretic characterization of mixed NE (ISAAC 05)

WINE, Dec Summary of Results Polynomial time computable mixed NE on various graph instances: regular graphs, graphs with, polynomial time computable, r-regular factors graphs with perfect matchings. Define the Social Cost of the game to be the expected number of attackers catch by the protector The Price of Anarchy in any mixed NE is upper and lower bounded by a linear function of the number of vertices of the graph. Consider the generalized variation of the problem considered, the Path model The existence problem of a pure NE is NP-complete

WINE, Dec Significance The first work (with an exception of ACY04) to model network security problems as strategic game and study its associated Nash equilibria. One of the few works highlighting a fruitful interaction between Game Theory and Graph Theory. Our results contribute towards answering the general question of Papadimitriou about the complexity of Nash equilibria for our special game. We believe Matching Nash equilibria (and/or extensions of them) will find further applications in other network games.

WINE, Dec Pure and Mixed Nash Equilibria Theorem 1. [ISAAC05] If G contains more than one edges, then  (G) has no pure Nash Equilibrium. Theorem 2. [ISAAC05] (characterization of mixed NE) A mixed configuration s is a Nash equilibrium for any  (G) if and only if: 1.D s (ep) is an edge cover of G and 2.D s (vp) is a vertex cover of the graph obtained by D s (ep). 3.(a) P(Hit(v)) = P s (Hit(u)) = min v P s (Hit(v)), 8 u,v 2 D s (vp), (b)  e 2 D s (ep) P s (ep,e) = 1 4.(a) m s (e 1 )=m s (e 2 )=max e m s (e), 8 e 1, e 2 2 D s (ep) and (b)  v 2 V(Ds(ep)) m s (v)=.

WINE, Dec Background Definition 1. A graph G is polynomially computable r-factor graph if its vertices can be partitioned, in polynomial time, into a sequence G r 1, , G r k of k r-regular vertex disjoint subgraphs, for an integer k, 1·k· n, G r ' = {Gr 1    Gr k } the graph obtained by the sequence. A two-factor graph is can be recognized and decomposed into a sequence C 1, , C k, 1· k · n, in polynomial time (via Tutte's reduction).

WINE, Dec Polynomial time NE : Regular Graphs Theorem 1. For any  (G) for which G is an r-regular graph, a mixed NE can be computed in constant time O(1). Proof. Construct profile s r on  (G) :  8 v 2 V, P s (Hit(v)) = | ENeigh(v) | / m  8 v2 V and vp i, IC i ( s r -i, [v] ) = 1- r/m Also, 8 e 2 E, m(v) = ¢(1/n). Thus, 8 e 2 E, IC ep ( s r -ep,[e] ) = 2¢ /n  s r is a NE. 

WINE, Dec Polynomial time NE : r-factor Graphs Corollary 1. For any  (G), such that G is a polynomial time computable r- factor graph, a mixed NE can be computed in polynomial time O(T(G)), where O(T(G)) is the time needed for the computation of G r ´ from G. 

WINE, Dec Polynomial time NE : Graphs with Perfect Matchings Theorem 2. For any  (G) for which G has a perfect matching, a mixed NE can be computed in polynomial time, O(n 1/2 ¢m). Proof. Compute a perfect matching of G, M using time O(n 1/2 ¢m). Construct the following profile s f on  (G): 8 v 2 V, P s (Hit(v)) = 1/ |M|  8 v2 V and vp i, IC i ( s r -i, [v] ) = 1- 1/|M| = 1- 2/n Also, 8 e 2 E, m(v) = ¢(1/n). Thus, 8 e 2 E, IC ep ( s r -ep,[e] ) = 2¢ /n  s f is a NE. 

WINE, Dec Polynomial time NE : Trees Algorithm Trees(  (T)) Input:  (T) Output: a NE on  (T) 1.Initialization: VC:=;, EC:=;, r:=1, T r := T. 2.Repeat until T r ==; a)Find the leaves of the tree T r, leaves(T r ) and add leaves(T r ) in VC. b)For each v 2 leaves(T r ), add (v,parent Tr (v) in EC c)Update tree: T r = T r \ leaves(T r ) \ parents(leaves(T r )) 3.Set s t : and apply the uniform distribution on support of each player.

WINE, Dec Analysis of the Tree Algorithm Lemma 1. Set VC, computed by Algorithm Trees(  (G), is an independent set of T. Lemma 2. Set EC is an edge cover of T and VC is a vertex cover of the graph obtained by EC. Lemma 3. For all v2 Ds(vp), ms(v)= /|D s (vp)|. Also, for all v' not in D s (vp), m s (v')=0. Lemma 4. Each vertex of IS is incident to exactly one edge of EC.

WINE, Dec Analysis of the Algorithm (Cont.) By Lemmas 2 and 4, we get, Lemma 5.  Thus, Theorem 3. For any  (T), where T is a tree graph, algorithm Trees(  (T)) computes a mixed NE in polynomial time O(n). 

WINE, Dec Price of Anarchy Lemma 7. For any  (G) and an associated mixed NE s *, the social cost SC (  (G),s * ) is upper and lower bounded as follows: These bounds are tight.  Thus, we can show, Theorem 4. The Price of Anarchy r(  ) for the Edge model is 

WINE, Dec Path Model If we let the protector to be able to select a single path of G instead of an edge, called the path player (pp)  The Path Model Theorem. For any graph G,  (G) has a pure NE if and only if G contains a hamiltonian path. Proof. Assume in contrary:  (G) contains a pure NE s but G is not hamiltonian. There exists a set of nodes U of G not contained in pp´s action, s pp.  for all players vp i, i 2 N vp, it holds s i 2 U  Path player gains nothing, while he could gain more.  s is NOT a pure NE of  (G), contradiction. 

WINE, Dec Path Model Corollary. The existence problem of pure NE for the Path model is NP-complete.

WINE, Dec Current and Future Work Develop other structured Polynomial time NE for specific graph families, exploiting their special properties Existence and Complexity of Matching equilibria for general graphs Generalizations of the Edge model

WINE, Dec Thank you for your Attention !