Network Security An Economics Perspective IS250 Spring 2010 John Chuang.

Slides:



Advertisements
Similar presentations
A Local Mean Field Analysis of Security Investments in Networks Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) NetEcon 2008.
Advertisements

N-Player Games. A symmetric N-person game. 1)All players have same strategy sets 2)If you switch two players strategies, you switch their payoffs and.
CPS Bayesian games and their use in auctions Vincent Conitzer
3. Basic Topics in Game Theory. Strategic Behavior in Business and Econ Outline 3.1 What is a Game ? The elements of a Game The Rules of the.
Stackelberg -leader/follower game 2 firms choose quantities sequentially (1) chooses its output; then (2) chooses it output; then the market clears This.
1 Decision Making and Utility Introduction –The expected value criterion may not be appropriate if the decision is a one-time opportunity with substantial.
Chapter 6 Game Theory © 2006 Thomson Learning/South-Western.
Choices Involving Risk
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Project Management Risk Management. Outline 1.Introduction 2.Definition of Risk 3.Tolerance of Risk 4.Definition of Risk Management 5.Certainty, Risk,
Chapter Thirty-Three Law and Economics. Effects of Laws u Property right assignments affect –asset, income and wealth distributions; v e.g. nationalized.
Benjamin Johnson Carnegie Mellon University Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information TRUST.
Chapter 6 © 2006 Thomson Learning/South-Western Game Theory.
Econ 2610: Principles of Microeconomics Yogesh Uppal
Competitive Cyber-Insurance and Network Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand EECS, UC-BerkeleyWEIS 2009 Presentation.
CHAPTER 14 Utility Axioms Paradoxes & Implications.
Competitive Cyber-Insurance and Network Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand EECS, UC-BerkeleyTRUST 2009 Presentation.
Prospect Theory, Framing and Behavioral Traps Yuval Shahar M.D., Ph.D. Judgment and Decision Making in Information Systems.
Decision making and economics. Economic theories Economic theories provide normative standards Expected value Expected utility Specialized branches like.

An Introduction to Game Theory Part II: Mixed and Correlated Strategies Bernhard Nebel.
Yale lectures 5 and 6 Nash Equilibrium – no individual can do strictly better by deviating – self enforcing in agreements Investment game – all invest.
Uncertainty and Consumer Behavior
An introduction to game theory Today: The fundamentals of game theory, including Nash equilibrium.
An introduction to game theory Today: The fundamentals of game theory, including Nash equilibrium.
An introduction to game theory Today: The fundamentals of game theory, including Nash equilibrium.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
MICROECONOMICS: Theory & Applications By Edgar K. Browning & Mark A. Zupan John Wiley & Sons, Inc. 11 th Edition, Copyright 2012 PowerPoint prepared by.
Chapter 16 Uncertainty We must believe in luck. For how else can we explain the success of those we don’t like? Jean Cocteau.
Review of Related Literature Different decision-making: – Budget decisions of managers – Irrationality of continuing the risk of losing a prospect – Decision-making.
1 Quality, Upgrades and (the Loss of ) Market Power in a Dynamic Monopoly Market James J. Anton Gary Biglaiser Duke University University of North Carolina.
Game Theory, Strategic Decision Making, and Behavioral Economics 11 Game Theory, Strategic Decision Making, and Behavioral Economics All men can see the.
Decision making Making decisions Optimal decisions Violations of rationality.
Thinking and Decision Making
Decision Making choice… maximizing utility framing effects
Decision Making Under Uncertainty and Risk 1 By Isuru Manawadu B.Sc in Accounting Sp. (USJP), ACA, AFM
McGraw-Hill/Irwin Copyright  2008 by The McGraw-Hill Companies, Inc. All rights reserved. GAME THEORY, STRATEGIC DECISION MAKING, AND BEHAVIORAL ECONOMICS.
Portfolio Management Unit – 1 Session No.4 Topic: Investment Objectives Unit – 1 Session No.4 Topic: Investment Objectives.
Prospect Theory. 23A i 23B, reference point 23A) Your country is plagued with an outbreak of an exotic Asian disease, which may kill 600 people. You.
MIS An Economic Analysis of Software Market with Risk-Sharing Contract Byung Cho Kim Pei-Yu Chen Tridas Mukhopadhyay Tepper School of Business Carnegie.
RISK BENEFIT ANALYSIS Special Lectures University of Kuwait Richard Wilson Mallinckrodt Professor of Physics Harvard University January 13th, 14th and.
RISK BENEFIT ANALYSIS Special Lectures University of Kuwait Richard Wilson Mallinckrodt Professor of Physics Harvard University January 13th, 14th and.
Decision Making choice… maximizing utility framing effects.
How Could The Expected Utility Model Be So Wrong?
Reframe the problem or the solution
Voter Turnout. Overview Recap the “Paradox” of Voting Incentives and Voter Turnout Voter Mobilization.
Decision theory under uncertainty
Psychology 485 March 23,  Intro & Definitions Why learn about probabilities and risk?  What is learned? Expected Utility Prospect Theory Scalar.
© 2005 Pearson Education Canada Inc Chapter 17 Choice Making Under Uncertainty.
Mixed Strategies and Repeated Games
On rare events and the economics of small decisions Ido Erev, Technion Examples: Using safety devices, cheating in exams, selecting among websites, stopping.
Intermediate Microeconomics Game Theory and Oligopoly.
Prospect Theory - complement J.Skorkovský ESF-KPH.
Auctions serve the dual purpose of eliciting preferences and allocating resources between competing uses. A less fundamental but more practical reason.
On Investor Behavior Objective Define and discuss the concept of rational behavior.
1 Systems Analysis Methods Dr. Jerrell T. Stracener, SAE Fellow SMU EMIS 5300/7300 NTU SY-521-N NTU SY-521-N SMU EMIS 5300/7300 Utility Theory Applications.
By: Donté Howell Game Theory in Sports. What is Game Theory? It is a tool used to analyze strategic behavior and trying to maximize his/her payoff of.
Experiments and “Rational” Behavior, 5/1/07. Beauty Contest Game Each person choose a number from 0 to 100. We will average these numbers. The person.
Behavioral Finance Biases Feb 23 Behavioral Finance Economics 437.
Q 2.1 Nash Equilibrium Ben
Decisions Under Risk and Uncertainty
For modeling conflict and cooperation Schwartz/Teneketzis
Unit 4 SOCIAL INTERACTIONS.
DIS 280 Social Science Research Methodology: Problem Framing
Choices, Values and Frames
Chapter Thirty-Three Law and Economics.
Chapter 15 Decisions under Risk and Uncertainty
EASTERN MEDITERRANEAN UNIVERSITY DEPARTMENT OF INDUSTRIAL ENGINEERING IENG314 OPERATIONS RESEARCH II SAMIR SAMEER ABUYOUSSEF
Behavioral Finance Economics 437.
Prospect Theory.
Presentation transcript:

Network Security An Economics Perspective IS250 Spring 2010 John Chuang

2 Rational Decision-Making in Information Security  Step 1. One defender -Security investment as risk management -Cost benefit analysis; expected value -Risk attitudes and deviations from expected utility  Step 2. Many defenders -Interdependent security: Weakest link, best shot, and total effort  Step 3. Many forms of attacks and defenses -Weakest target -Protection versus insurance (public versus private goods) -Limited information

John Chuang3 How Secure is Secure?  Are we investing too little in security? Are we investing too much?  Security investment as risk management -In traditional engineering: -Risk = probability of accident * losses per accident -Can interpret risk as expected loss -Perform cost-benefit analysis of risk-mitigation alternatives -Example: highway safety regulation often uses $1 million per statistical death in analysis

John Chuang4 Cost Benefit Analysis  Scenario 1: -New technology promises to fix a vulnerability -Loss in event of security breach: L -Probability of breach: p -Cost of security mechanism: c -Q: should CSO invest in security mechanism?  Scenario 2: -Webpage asks you to type in your social security number -Value derived from completing this transaction: v -Probability of theft: p -Loss in event of identity theft: L -Q: should you enter the information? -A: invest if pL > c ; else do not invest -A: provide personal information if v > pL; else do not What assumptions are made here?

John Chuang5 Challenges  Difficulty in risk assessment -Especially for events with very low probability (p) and/or very high loss (L) -p *L may be off by orders of magnitude  Users may not (want to) maximize expected utility -Risk attitudes: risk neutral, risk averse, or risk seeking -Hyperbolic discounting -Small immediate payoff preferred over large payoff in the future -Framing and Prospect Theory

John Chuang6 Risk Attitude  Offer 1: -Choice 1: win $10 with certainty -Choice 2: 50% chance of winning $20  Offer 2: -Choice 1: win $1 million with certainty -Choice 2: 50% chance of winning $2 million

John Chuang7 Hyperbolic Discounting  Discounted utility, U =   t ·u t (x) where  is discount factor  Would you prefer $50 today; or $100 a year from today?  Would you prefer $50 five years from now, or $100 six years from now?  Humans prefer smaller payoffs immediately over larger payoffs in the future -Or: unwilling to make sacrifices now for payoffs down the road  Privacy: humans often give away personal information in exchange for small discounts or prizes

John Chuang8 Prospect Theory Kahneman and Tversky  Choice 1: win $500 with certainty  Choice 2: 50% chance of winning $1000  Choice 1: lose $500 with certainty  Choice 2: 50% chance of losing $ % 70%

John Chuang9 Asian Disease Experiment Kahneman and Tversky  Imagine that the U.S. is preparing for the outbreak of an unusual Asian disease, which is expected to kill 600 people.  Program A: 200 people will be saved  Program B: 33% chance all 600 people will be saved; 67% chance nobody will be saved  Program A: 400 people will die  Program B: 33% chance nobody will die; 67% chance all 600 people will die 72% 78%

John Chuang10 WTA-WTP Gap  WTA: Willingness to accept a proposal to sell good already owned  WTP: Willingness to pay for good not already owned  Privacy study: -“When 25 Cents is too much: An Experiment on Willingness- To-Sell and Willingness-To- Protect Personal Information” (Grossklags & Acquisti, 2007)  Finding: subjects willing to sell personal information for $1/$0.25, but not willing to spend $1/$0.25 to protect information -Information: quiz performance, body weight

John Chuang11 Rational Decision-Making in Information Security  Step 1. One defender -Security investment as risk management -Cost benefit analysis; expected value -Risk attitudes and deviations from expected utility  Step 2. Many defenders -Interdependent security: Weakest link, best shot, and total effort  Step 3. Many forms of attacks and defenses -Weakest target -Protection versus insurance (public versus private goods) -Limited information

John Chuang12 Interdependent Security  Common adage: “A system is only as secure as its weakest link” -Security of entire system depends on that of individual components -Security of individual players depends on security decisions of other players best shot total effort weakest link attacker defenders

John Chuang13 Interdependent Security  Utility function of player i: U i = M − p·L (1 − H(e i, e −i )) − b·e i -where M is initial endowment, b is cost of protection, e i is protection level chosen by player i, and H is protection function  Different protection functions for different attack/defense scenarios: -Weakest link: H(e i, e −i )= min(e i, e −i ) -Best shot: H(e i, e −i )= max(e i, e −i ) -Total effort: H(e i, e −i )= Sum(e i )  Varian, 2002: Security becomes a public good -Well known result: free-riding, leading to suboptimal provisioning of the public good

John Chuang14 Rational Decision-Making in Information Security  Step 1. One defender -Security investment as risk management -Cost benefit analysis; expected value -Risk attitudes and deviations from expected utility  Step 2. Many defenders -Interdependent security: Weakest link, best shot, and total effort  Step 3. Many forms of attacks and defenses -Weakest target -Protection versus insurance (public versus private goods) -Limited information

John Chuang15 Protection vs. Insurance  Individual players may invest in protection to reduce the probability of loss (p) -Examples: firewall, anti-virus software, patching  Individual players may invest in insurance to reduce the magnitude of loss (L) -Examples: data backup (self-insurance), cyber-insurance (market insurance)

John Chuang16 Protection vs. Insurance  Protection only: U i = M − p·L (1 − H(e i, e −i )) − b·e i  Insurance only: U i = M − p·L (1 − s i ) − c·s i  Both available: U i = M − p·L (1 − H(e i, e −i ))·(1 − s i ) − b·e i − c·s i  where M is initial endowment, b is cost of protection, c is cost of insurance, e i and s i are the protection and insurance levels chosen by player i, and H is protection function  Q: How should player allocate budget between e i (protection) and s i (insurance)?  Note: protection is a public good, whereas insurance is a private good

John Chuang17 Results  Total effort: -Depending on b, c, and p·L, Nash Equilibria can be to secure (full protection), to insure (full insurance), or to ignore (passivity)  Best shot: -No protection equilibrium, unless players can coordinate  Weakest link: -Depending on b, c, and p·L, Nash Equilibria can be to secure (multiple protection equilibria, all unstable), to insure (full insurance), or to ignore (passivity) -As N increases, protection equilibria collapse to either full insurance or passivity.  Weakest target: -Pure NE does not exist; mixed NE exists. -As N increases, full insurance becomes less likely -Security level in NE may be higher than in social optimum, due to effect of strategic uncertainty

John Chuang18 In the Lab Setting…  Three players choose protection and insurance levels -Payoffs based on weakest link game  Player A experimented throughout  Player B quickly learns and settles into individually rational strategy (full insurance no protection); reinforced by compromise at around round 65  Player C largely settles into individually rational strategy after round 50

John Chuang19 Weakest Target  Attacker compromises player(s) with minimum protection level; all other players unharmed -H(e i, e −i ) = 0 if e i = min(e i, e −i ); 1 otherwise attacker defenders

John Chuang20 Weakest Target with Mitigation  Attacker compromises player(s) with minimum protection level; all other players unharmed -H(e i, e −i ) = 0 if e i = min(e i, e −i ); 1 otherwise  WT with mitigation: -H(e i, e −i ) = 1 - e i if e i = min(e i, e −i ); 1 otherwise attacker defenders

John Chuang21 Results  Total effort: -Depending on b, c, and p·L, Nash Equilibria can be to secure (full protection), to insure (full insurance), or to ignore (passivity)  Best shot: -No protection equilibrium, unless players can coordinate  Weakest link: -Depending on b, c, and p·L, Nash Equilibria can be to secure (multiple protection equilibria, all unstable), to insure (full insurance), or to ignore (passivity) -As N increases, protection equilibria collapse to either full insurance or passivity.  Weakest target: -Pure NE does not exist; mixed NE exists. -As N increases, full insurance becomes less likely -Security level in NE may be higher than in social optimum, due to effect of strategic uncertainty

John Chuang22 Summary  Network security is as much about economic incentives as it is about technological mechanisms  It is challenging for individuals to make the right decisions regarding security  Solutions may include economic instruments for coordination, risk pooling; policy instruments for assignment of liability; and design principles that nudge individuals toward secure choices

John Chuang23 To Explore Further  economics/  Workshops on Economics and Information Security (WEIS)