1 On the Windfall of Friendship: Inoculation Strategies on Social Networks Dominic Meier Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer.

Slides:



Advertisements
Similar presentations
Best Response Dynamics in Multicast Cost Sharing
Advertisements

Social Networks 101 P ROF. J ASON H ARTLINE AND P ROF. N ICOLE I MMORLICA.
Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011.
1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Price Of Anarchy: Routing
Game Theory Assignment For all of these games, P1 chooses between the columns, and P2 chooses between the rows.
Congestion Games with Player- Specific Payoff Functions Igal Milchtaich, Department of Mathematics, The Hebrew University of Jerusalem, 1993 Presentation.
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
Course: Applications of Information Theory to Computer Science CSG195, Fall 2008 CCIS Department, Northeastern University Dimitrios Kanoulas.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Decentralized Dynamics for Finite Opinion Games Diodato Ferraioli, LAMSADE Paul Goldberg, University of Liverpool Carmine Ventre, Teesside University.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
Manipulation in Games Raphael Eidenbenz Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer Distributed Computing Group ISAAC 2007 Sendai, Japan December.
Mechanism Design without Money Lecture 4 1. Price of Anarchy simplest example G is given Route 1 unit from A to B, through AB,AXB OPT– route ½ on AB and.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
Strategic Network Formation and Group Formation Elliot Anshelevich Rensselaer Polytechnic Institute (RPI)
On the Topologies Formed by Selfish Peers Thomas Moscibroda Stefan Schmid Roger Wattenhofer IPTPS 2006 Santa Barbara, California, USA.
Speed Dating despite Jammers Dominik Meier Yvonne-Anne Pignolet Stefan Schmid Roger Wattenhofer.
Distributed Computing Group On the Impact of Malicious Players in Distributed Systems Stefan Schmid DYNAMO’07: 1st Workshop on Dynamic Networks (Salerno,
Economics of P2P Computing Stefan Schmid Distributed Computing Group.
Taming Dynamic and Selfish Peers “Peer-to-Peer Systems and Applications” Dagstuhl Seminar March 26th-29th, 2006 Stefan Schmid Distributed Computing Group.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
The Price Of Stability for Network Design with Fair Cost Allocation Elliot Anshelevich, Anirban Dasgupta, Jon Kleinberg, Eva Tardos, Tom Wexler, Tim Roughgarden.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
Dynamic Network Security Deployment under Partial Information George Theodorakopoulos (EPFL) John S. Baras (UMD) Jean-Yves Le Boudec (EPFL) September 24,
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Minimum.
On Thieves and Terrorists in Peer-to-Peer Systems Stefan Schmid Distributed Computing Group.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Potential games, Congestion games Computational game theory Spring 2010 Adapting slides by Michal Feldman TexPoint fonts used in EMF. Read the TexPoint.
Nash Equilibria in Competitive Societies Eyal Rozenberg Roy Fox.
1 Caching Game Dec. 9, 2003 Byung-Gon Chun, Marco Barreno.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Elliot Anshelevich Department of Computer Science Interests: Design and analysis of algorithms, especially for large decentralized networks. Strategic.
Second case study: Network Creation Games (a.k.a. Local Connection Games)
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman.
Homogeneous Interference Game in Wireless Networks Joseph (Seffi) Naor, Technion Danny Raz, Technion Gabriel Scalosub, University of Toronto.
1 Issues on the border of economics and computation נושאים בגבול כלכלה וחישוב Congestion Games, Potential Games and Price of Anarchy Liad Blumrosen ©
1 Network Creation Game A. Fabrikant, A. Luthra, E. Maneva, C. H. Papadimitriou, and S. Shenker, PODC 2003 (Part of the Slides are taken from Alex Fabrikant’s.
What If Some Peers Are More Equal than Others? Stefan Schmid joint work with: Thomas Locher, Yvonne Anne Oswald, Dominic Meier, Patrick Moor, David Mysicka,
The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy.
On a Network Creation Game PoA Seminar Presenting: Oren Gilon Based on an article by Fabrikant et al 1.
Trust Propagation using Cellular Automata for UbiComp 28 th May 2004 —————— Dr. David Llewellyn-Jones, Prof. Madjid Merabti, Dr. Qi Shi, Dr. Bob Askwith.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Connections between Learning Theory, Game Theory, and Optimization Maria Florina (Nina) Balcan Lecture 14, October 7 th 2010.
1 Tight Bounds for Delay-Sensitive Aggregation Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer Distributed Computing Group LEA.
1 Intrinsic Robustness of the Price of Anarchy Tim Roughgarden Stanford University.
Network Congestion Games
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Graph Theory Trees. WHAT YOU WILL LEARN Trees, spanning trees, and minimum-cost spanning trees.
Vasilis Syrgkanis Cornell University
Game Theoretic Model of Censorship Resistance Andrei Serjantov University of Cambridge Computer Laboratory.
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Second case study: Network Creation Games (a.k.a. Local Connection Games)
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Satisfaction Games in Graphical Multi-resource Allocation
Network Creation Game A. Fabrikant, A. Luthra, E. Maneva,
NETWORKING.
Presented By Aaron Roth
4-4 Graph Theory Trees.
Network Formation Games
Presentation transcript:

1 On the Windfall of Friendship: Inoculation Strategies on Social Networks Dominic Meier Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer

Yvonne Anne EC 2008 Once upon a time every node follows protocol malicious nodes selfish/rational nodes (game theory meets computer science) History of behavioural network models still no explanation for behaviour of real networks now

Yvonne Anne EC 2008 “Traditional“ game theory: player p i selects strategy a i => strategy profile a actual cost for player p i : cost a (i,a) “Friendly“ game theory: consider cost of friends : F 2 [0,1] Friendship Factor perceived cost c p (i,a) = c a (i,a) + F ¢   c a (j,a) New model: care about your friends’ wellbeing neighbour pj  new equilibria (FNE) Windfall of Friendship WoF(F) = cost(a worstNE ) cost(a worstFNE ) ____________

4Yvonne Anne EC 2008 Case study: virus inoculation game [Aspnes et al., SODA 2005] social networks everywhere: facebook, co-authors, => many connections => fast virus distribution

5Yvonne Anne EC 2008 Virus inoculation game [Aspnes et al., SODA 2005] social networks everywhere: facebook, co-authors, => many connections => fast virus distribution

6Yvonne Anne EC 2008 Virus inoculation game [Aspnes et al., SODA 2005] social networks everywhere: facebook, co-authors, => many connections => fast virus distribution Solution: invest in protection but $$$ if all neighbours are protected no need for get protected as well.. invest if expected damage > cost

Yvonne Anne EC 2008 Virus Inoculation Game - Example

Yvonne Anne EC 2008 Virus Inoculation Game - Example

Yvonne Anne EC 2008 Virus Inoculation Game – Example

Yvonne Anne EC 2008 Virus Inoculation Game - Example

Yvonne Anne EC 2008 Virus Inoculation Game - Example

Yvonne Anne EC 2008 Virus Inoculation Game - Example

Yvonne Anne EC 2008 network of n devices owner of node decides whether to protect it or not inoculation cost: C infection cost: L virus infection at 1 arbitrary initial node virus propagation over paths of insecure devices Model [Aspnes et al., SODA 2005]

Yvonne Anne EC 2008 strategies of p i Actual cost [Aspnes et al., SODA 2005] a i = 0 : device is not protected a i = 1 : device is protected actual cost: (per node) C if a i = 1 c a (i,a) = L¢ k i /n if a i = 0 k i = size of attack component of p i social cost (network) cost(a) =  p i c a (i,a)

Yvonne Anne EC 2008 Previous results [Aspnes et al., SODA 2005] pure equilibria always exist attack components of size Cn/L PoA (price of anarchy) linear in n [Moscibroda et al., PODC 2006] Malicious nodes: lie about their strategies

Yvonne Anne EC 2008 Introducing friendship Windfall of Friendship WoF(F) = cost(a worstNE ) cost(a worstFNE ) ____________ F 2 [0,1] Friendship Factor perceived cost: (per node) c p (i,a) = c a (i,a) + F¢  p j neighbour c a (j,a) cost(a) =  p i c a (i,a)

Yvonne Anne EC 2008 General graphs Results attack components size depends on topology WoF(F) ≥ 1 WoF(F) ≤ PoA WoF(F) is not monotonically increasing in F computing worst/best FNE is NP -complete PoA ≤ n [Aspnes et al., SODA’05] Example

Yvonne Anne EC 2008 n = 13 C = 1 L = 4 WoF(F) is NOT monotonically increasing in F total cost = 4.69 social optimum

Yvonne Anne EC 2008 n = 13 C = 1 L = 4 WoF(F) is NOT monotonically increasing in F total cost = selfish setting PoA = 2.73

Yvonne Anne EC 2008 n = 13 C = 1 L = 4 F = 0.9 WoF(F) is NOT monotonically increasing in F total cost = friendly setting WoF(0.9) = 1.04

Yvonne Anne EC 2008 WoF(F) is NOT monotonically increasing in F total cost = 4.69 n = 13 C = 1 L = 4 F = 0.1 friendly setting WoF(0.1) = 2.73

Yvonne Anne EC 2008 General graphs Results WoF(F) ≥ 1 WoF(F) ≤ PoA WoF(F) is not monotonically increasing in F computing worst/best FNE is NP -complete Reduction from vertex cover and independent dominating set

Yvonne Anne EC 2008 Results complete graph a FNE always exists, fast convergence WoF(F) ≤ 4/3 (tight) star graph a FNE always exists, fast convergence sometimes the best FNE is the only FNE 1 FNE => WoF(F) can reach n more than 1 FNE => WoF(F) = O(1) Special graphs  

Yvonne Anne EC 2008 Results complete graph a FNE always exists, fast convergence WoF(F) ≤ 4/3 (tight) star graph a FNE always exists, fast convergence sometimes the best FNE is the only FNE 1 FNE => WoF(F) linear in n more than 1 FNE => WoF(F) = O(1) Special graphs  

Yvonne Anne EC 2008 Future directions... analyze more complex graphs and real social networks variations of virus game - more than 1 virus - more strategies - other propagation models analyze other games on networks generalize model - include k-hop neigbours - weighted graph: F i,j -...

Yvonne Anne EC 2008 There is nothing bad in being social, even for computer scientists and economists... Moral of the story

27Yvonne Anne EC 2008 The End! Thank you! Questions? Comments?