Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic Maxim Raya Jean-Pierre Hubaux June 2010, WEIS’10 David C. Parkes.

Slides:



Advertisements
Similar presentations
Introduction to Game Theory
Advertisements

Performance Evaluation Sponsored Search Markets Giovanni Neglia INRIA – EPI Maestro 4 February 2013.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 3.1.Dynamic Games of Complete but Imperfect Information Lecture
Ankit Mehta 1. Brief history of online advertising May 1978: First Marketing Spam form DEC Marketing representative. 1994: First banner ad by AT&T on.
Integrity of the Web Content: The Case of Online Advertising Nevena Vratonjic Julien Freudiger Jean-Pierre Hubaux August 2010, Usenix CollSec’10.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Chapter 14 Infinite Horizon 1.Markov Games 2.Markov Solutions 3.Infinite Horizon Repeated Games 4.Trigger Strategy Solutions 5.Investing in Strategic Capital.
Game Theory 1. Game Theory and Mechanism Design Game theory to analyze strategic behavior: Given a strategic environment (a “game”), and an assumption.
Game Theory: Inside Oligopoly
On the Economics of P2P Systems Speaker Coby Fernandess.
Benjamin Johnson Carnegie Mellon University Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information TRUST.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Sponsored Search Presenter: Lory Al Moakar. Outline Motivation Problem Definition VCG solution GSP(Generalized Second Price) GSP vs. VCG Is GSP incentive.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Chapter 4 New Venture Strategy Copyright¸ 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted.
Internet Economics: the use of Shapley value for ISP settlement Richard T.B. Ma Columbia University Dah-ming Chiu, John C.S. Lui The Chinese University.
A Crash Course in Game Theory Werner Raub Workshop on Social Theory, Trust, Social Networks, and Social Capital II National Chengchi University – NCCU.
Gabriel Tsang Supervisor: Jian Yang.  Initial Problem  Related Work  Approach  Outcome  Conclusion  Future Work 2.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
M ARY L OU R OBERTS April 2009 WHAT I’VE LEARNED ABOUT SOCIAL MEDIA MARKETING SPRING 2009.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
The Inconvenient Truth about Web Certificates Nevena Vratonjic Julien Freudiger Vincent Bindschaedler Jean-Pierre Hubaux June 2011, WEIS’11.
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
2013 SFPMA ® South Florida Property Management Association
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Revocation Games in Ephemeral Networks Maxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux CCS 2008.
Drive brand awareness. YouTube Promoted Videos YouTube Promoted Videos. Leveraging Your Video Assets.
ISPs and Ad Networks Against Botnet Ad Fraud Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim Raya and Jean-Pierre Hubaux 1 November 2010, GameSec’10.
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
Strategic Marketing For The Web Professional Web Services Internet Growth Amount of Information Technology Improvements Customer Relationship Management.
M A N A G E M E N T M A N A G E M E N T 1 st E D I T I O N 1 st E D I T I O N Gulati | Mayo | Nohria Gulati | Mayo | Nohria Chapter 10 Chapter 10 PERFORMANCE.
On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks Maxim …...…. Raya Reza …….…. Shokri Jean-Pierre..Hubaux LCA1, EPFL, Switzerland The.
Pricing in Non-cooperative Dynamic Games Lillian Ratliff, Sam Coogan, Daniel Calderone 20 August 2012.
1 Chapter 11 Oligopoly. 2 Define market structures Number of sellers Product differentiation Barrier to entry.
Electronic CommerceNonhlanhla Shongwe  Introduction  Mission statement  Product  Business model  SWOT Analysis  Conclusion.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Security Games in Online Advertising: Can Ads Help Secure the Web? JP Hubaux Joint work with N. Vratonjic, M. Raya, and D. Parkes.
Dynamic Games & The Extensive Form
Chapter 1. What is “Markets and Strategies”?
Privacy and User Generated Content Lauren Gelman Center for Internet and Society Stanford Law School cyberlaw.stanford.edu.
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
KRUGMAN'S MICROECONOMICS for AP* Game Theory Margaret Ray and David Anderson Micro: Econ: Module.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
How to Analyse Social Network? : Part 2 Game Theory Thank you for all referred contexts and figures.
Xinyu Xing, Wei Meng, Dan Doozan, Georgia Institute of Technology Alex C. Snoeren, UC San Diego Nick Feamster, and Wenke Lee, Georgia Institute of Technology.
PROPRIETARY AND CONFIDENTIAL INFORMATION OF ADVERTISING.COM, INC. 1 ONLINE MARKETING SOLUTIONS FOR.
Non-Cooperative Behavior in Wireless Networks Márk Félegyházi (EPFL) PhD. public defense July 9, 2007.
Repeated Game Modeling of Multicast Overlays Mike Afergan (MIT CSAIL/Akamai) Rahul Sami (University of Michigan) April 25, 2006.
Business Models How do information systems change the structure and operation of the enterprise Copyright © 2016 Curt Hill.
Econ 545, Spring 2016 Industrial Organization Dynamic Games.
NSU Website Structure By: Debbie Jones, NSU Webmaster 1 NSU Web Services Publication - Author: NSU Webmaster Norfolk State University.
KENYA REVENUE AUTHORITY BUSINESS INTELLIGENCE OFFICE PRESENTATION INVESTIGATION & ENFORCEMENT DEPARTMENT SYMON YATICH 29 TH - 31 ST AUGUST 2012.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
 GEETHA P.  Originally coined by Tim O’Reilly Publishing Media  Second generation of services available on www.  Lets people collaborate and share.
The Social Network Platform
Advertising Agencies and Interactive Media
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Latest Updates on BlackHawk Mines Music : Privacy Policy
1 NSU Website Structure By: Debbie Lyn Jones, Information Technology Manager I / Norfolk State University Webmaster NSU Webmaster Publication – Created.
Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.
Business-to-Business E-Commerce
Li Yang, Carson Woods (University of Tennessee at Chattanooga
11b – Game Theory This web quiz may appear as two pages on tablets and laptops. I recommend that you view it as one page by clicking on the open book icon.
Presentation transcript:

Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic Maxim Raya Jean-Pierre Hubaux June 2010, WEIS’10 David C. Parkes

Internet Economy Online Advertising: The main Internet business model Revenue in 2009 in the US is $22.4 billion Sponsors free services and applications What happens if one meddles with it? 2

Access Network (ISP) Online Advertising System 3 Ad Network User (U) Ad Servers (AS) Websites (WS) Embedding ads Web page Ads Advertiser Placing ads

Role of ISPs Traditional role: Provide Internet access to end users Forward the communication in compliance with Network Neutrality Policy New requirements Data retention legislations Increase costs and require investing into new technologies How will ISPs obtain a return on investment? 4

Recently Reported Cases Growing number of ISPs injecting own content into web pages [1][2] Third party ad companies partnering with ISPs e.g., Adzilla, Phorm, NebuAd 5 [1] C. Reis et al. Detecting In-flight Page Changes with Web Tripwires, NSDI [2] B. April, F. Hacquebord and R. Link, A Cybercrime Hub, August [3] C. Kreibich and N. Weaver, US internet providers hijacking users' search queries, August 2011.

ISPs in Online Advertising Business Non-cooperative ISP – diverts part of online ad revenue by performing attacks on online advertising E.g., injecting ads into the content of web pages on-the-fly Cooperative ISP – collects and provides information about users’ online behavior with the goal of improving ad targeting Generates revenue by charging for users’ profiles 6

Problem Statement Study the effect of strategic ISPs on the Web Model the behavior of ISPs and economic incentives in online advertising systems Analyze mutually dependent actions of ISPs and Ad Servers (AS) 7

Related Work Online advertising fraud The best strategy for ad networks is to fight click fraud [1] Incentives to increase the security of the Web Users’ choice: Investment in security or insurance mechanisms [2] Our model introduces a new strategic player – the ISP 8 [1] B. Mungamuru, S. Weis, H. Garcia-Molina, Should Ad Networks Bother Fighting Click Fraud? (Yes, they should.), Stanford Technical Report, July [2] J. Grossklags, N. Christin, J. Chuang, Secure or insure?: a game-theoretic analysis of information security games, WWW 2008.

Outline I. Strategic behavior of ISPs II. Game-theoretic Model III. Analysis and Results 9

Nominal Mode 10 User (U) Ad Servers (AS) Websites (WS) Advertisers (AV) Ad Network Placing ads Embedding ads ISP Web page ISP: Abstain (A) – forwards users’ communication AS: Abstain (A) – serves online ads upon users’ requests Ads

Cooperative Mode 11 User (U) Ad Servers (AS) Websites (WS) Advertisers (AV) Placing adsEmbedding ads ISP Web page ISP: Cooperate (C) – shares the collected users’ profiles to help AS improve ad targeting AS: Cooperate (C) – shares a part of its revenue with the ISP Ads Improved ad targeting Users’ profiles Ad Network

Advertisers (AV) Ad Servers (AS) Non-Cooperative Mode 12 User (U) Ad Servers (AS) Websites (WS) Advertisers (AV) Placing adsEmbedding ads ISP Web page ISP: Divert (D) – diverts a fraction of the ad revenue from the AS AS: Abstain (A) – serves online ads upon users’ requests Ads Users’ profiles Improved ad targeting Secure (S) – secures the website Ad Network

Non-Cooperative Mode 13 User (U) Ad Servers (AS) Websites (WS) Advertisers (AV) Placing adsEmbedding ads ISP Web page ISP: Divert (D) – diverts a fraction of the ad revenue from the AS AS: Secure (S) – secures the website Ads Ad Network

Game-theoretic Model Behavior of ISPs: Abstain (A) – forwards users’ communication Cooperate (C) – shares the collected users’ private info to help improve ad targeting Divert (D) – diverts a fraction of ad revenue from the AS Behavior of Ad Servers (AS): Abstain (A) – serves online ads upon users’ requests Cooperate (C) – shares a part of its revenue with the ISP Secure (S) – secures a website to prevent loss of ad revenue 14

The Game Dynamic, finite multi-stage game G={P,S A,U} Set of players: P={ISP, AS} Multi-stage game: Single stage game played for n stages Total payoffs over n stages= Σ(payoffs at each stage) Complete and perfect information Game is modeled for a single website Identify Subgame Perfect Nash Equilibrium (SPNE) 15

Single Stage Game 16 Nominal Mode Coop Mode Non-coop Mode Nominal Mode Non-coop Mode a – AS’s total payoff in the nominal mode c 1, c 2 – ISP’s and AS’s total payoff in the coop mode m – Fraction of clicks ISP diverts ε – Cost of diverting clicks b – ISP’s per fraction revenue when diverting clicks C ss – One-time cost of securing a website If a website is not secured Payoffs = (U ISP,U AS )

Single Stage Game (cont’d) 17 Nominal Mode Coop Mode Nominal Mode a – AS’s total payoff in the nominal mode c 1, c 2 – ISP’s and AS’s total payoff in the coop mode m – Fraction of clicks ISP diverts b – ISP’s per fraction revenue when diverting clicks ε – Cost of diverting clicks C ss – One-time cost of securing a website If a website is secured Payoffs = (U ISP,U AS )

Outline I. Strategic behavior of ISPs II. Game-theoretic Model III. Analysis and Results 18

Solving the Game 19 Example: n=1 Case 1: ma≥C ss, c 2 >a outcome: (C,C) Case 2: ma≥ C ss, c 2 ≤a Case 3: ma< C ss, c 2 ≤ a Case 4: ma a, c 1 ≥mb-ε Case 5: ma a, c 1 <mb-ε outcome: (A,A),(C,A) outcome: (D,A) outcome: (C,C) outcome: (D,A) Payoffs = (U ISP,U AS )

Evaluations on a Real Data Set Top 1000 most popular websites in June 2009 based on the data of page views [Compete.com] Parameters: Fraction of revenue diverted by non-cooperative ISP (m) Fraction of shared revenue when cooperating (l) Improvement of ad targeting (β 2 /β 1 ) Assumption: C ss – the cost of deploying a X.509 certificate and HTTPS at the web server 20

Non-cooperative Scenario 21 Outcomes of the multi-stage game for the top 1000 websites Secured websites (secure if ma>C ss )

Effect of the Parameters Fraction of shared revenue when cooperating (l) 22 Secured websitesCooperation achieved Non-cooperative Cooperative Non-cooperative Cooperative

Effect of the Parameters (cont’d) 23 Improvement of ad targeting (β 2 /β 1 ) Secured websitesCooperation achieved Non-cooperative Cooperative Non-cooperative Cooperative

Conclusion Novel problem of ISPs becoming strategic participants in the online advertising business Studied the behavior and interactions of the ISPs and ad networks Applied game-theoretic model to the real data Effect on the Web is positive in both cases: Cooperative ISPs: - users receive better targeted ads - ISPs and ad networks earn more Non-cooperative ISPs: - improved Web security - the most important websites secured first 24