The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of.

Slides:



Advertisements
Similar presentations
The role of compatibility in the diffusion of technologies in social networks Mohammad Mahdian Yahoo! Research Joint work with N. Immorlica, J. Kleinberg,
Advertisements

Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman TexPoint fonts used in EMF. Read the TexPoint manual.
1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Price Of Anarchy: Routing
Totally Unimodular Matrices
Bilinear Games: Polynomial Time Algorithms for Rank Based Subclasses Ruta Mehta Indian Institute of Technology, Bombay Joint work with Jugal Garg and Albert.
Mixed Strategies CMPT 882 Computational Game Theory Simon Fraser University Spring 2010 Instructor: Oliver Schulte.
Nash Equilibria In Graphical Games On Trees Edith Elkind Leslie Ann Goldberg Paul Goldberg.
Nash equilibria in Electricity Markets: A comparison of different approaches Seminar in Electric Power Networks, 12/5/12 Magdalena Klemun Master Student,
A survey of some results on the Firefighter Problem Kah Loon Ng DIMACS Wow! I need reinforcements!
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
1 Sealed Bid Multi-object Auctions with Necessary Bundles and its Application to Spectrum Auctions ver. 1.0 University of Tokyo 東京大学 松井知己 Tomomi Matsui.
1 Best-Reply Mechanisms Noam Nisan, Michael Schapira and Aviv Zohar.
An Introduction to Game Theory Part II: Mixed and Correlated Strategies Bernhard Nebel.
Computational Game Theory
The price of anarchy of finite congestion games Kapelushnik Lior Based on the articles: “ The price of anarchy of finite congestion games ” by Christodoulou.
1 On the price of anarchy and stability of correlated equilibria of linear congestion games By George Christodoulou Elias Koutsoupias Presented by Efrat.
1 Computing Nash Equilibrium Presenter: Yishay Mansour.
An Introduction to Game Theory Part III: Strictly Competitive Games Bernhard Nebel.
On the Price of Stability for Designing Undirected Networks with Fair Cost Allocations M.Sc. Thesis Defense Svetlana Olonetsky.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Potential games, Congestion games Computational game theory Spring 2010 Adapting slides by Michal Feldman TexPoint fonts used in EMF. Read the TexPoint.
Nash Equilibria in Competitive Societies Eyal Rozenberg Roy Fox.
Pure Nash Equilibria: Complete Characterization of Hard and Easy Graphical Games Albert Xin Jiang U. of British Columbia MohammadAli Safari Sharif U. of.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2004 Lecture 5 Wednesday, 10/6/04 Graph Algorithms: Part 2.
Near-Optimal Network Design With Selfish Agents Elliot Anshelevich, Anirban Dasgupta, Éva Tardos, Tom Wexler STOC’03, June 9–11, 2003, San Diego, California,
The Maximum Independent Set Problem Sarah Bleiler DIMACS REU 2005 Advisor: Dr. Vadim Lozin, RUTCOR.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman.
1 Issues on the border of economics and computation נושאים בגבול כלכלה וחישוב Congestion Games, Potential Games and Price of Anarchy Liad Blumrosen ©
1 On the Windfall of Friendship: Inoculation Strategies on Social Networks Dominic Meier Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer.
One Hundred Bounds on the Price of Anarchy Marios Mavronicolas Department of Computer Science University of Cyprus Cyprus School on Algorithmic Game Theory.
1 COMMUNICATION NETWORKS AND COMPLEXITY COOPERATION AND ANTAGONISM IN SELFISH NETWORKS (ALGORITHMIC ISSUES) Paul G. Spirakis RACTI (Greece) August 2006.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy.
Approximation Algorithms
Game Theory: introduction and applications to computer networks Game Theory: introduction and applications to computer networks Lecture 2: two-person non.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Ásbjörn H Kristbjörnsson1 The complexity of Finding Nash Equilibria Ásbjörn H Kristbjörnsson Algorithms, Logic and Complexity.
Hedonic Clustering Games Moran Feldman Joint work with: Seffi Naor and Liane Lewin-Eytan.
Vasilis Syrgkanis Cornell University
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
NP-completeness NP-complete problems. Homework Vertex Cover Instance. A graph G and an integer k. Question. Is there a vertex cover of cardinality k?
Introduction to Graph Theory
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Satisfaction Games in Graphical Multi-resource Allocation
Non-additive Security Games
BIPARTITE GRAPHS AND ITS APPLICATIONS
Congestion games Computational game theory Fall 2010
Lectures on Network Flows
Application of network flow: Protecting coral reef ecosystems
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 2 Bayesian Games Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Vertex Covers, Matchings, and Independent Sets
Network Formation Games
Problem Solving 4.
Oliver Schulte Petra Berenbrink Simon Fraser University
Algorithms (2IL15) – Lecture 7
Computing a Nash Equilibrium of a Congestion Game: PLS-completeness
The Price of Routing Unsplittable Flow
Network Formation Games
Normal Form (Matrix) Games
Locality In Distributed Graph Algorithms
Presentation transcript:

The Power of the Defender M. Gelastou  M. Mavronicolas  V. Papadopoulou  A. Philippou  P. Spirakis §  University of Cyprus, Cyprus § University of Patras and RACTI, Greece IBC’ 06, Lisbon, Portugal

2 Outline Introduction Model Previous Work and Motivation Results Conclusions Future work

3 General Motivation Network Security: a critical issue in networks –Large network size –Dynamic nature of current networks –Economic factors –Low performance of protected nodes Introduction

4  Realistic Assumption: a Partially Secure Network security provided to a limited part of the network Introduction

5 A Network Security Problem A partially secure network –Defender (firewall): protects the network –Attackers (viruses): damage the network (avoid the defender)  Attackers and defender have conflicting objectives  A strategic game with attacker players and a defender player Introduction

6 Research Approach Algorithmic Game Theory Graph Theory Introduction

7 Related Work [Mavronicolas, Papadopoulou, Philippou, Spirakis; ISAAC 2005] –Defender cleans a single edge: Edge model –Pure Nash equilibria: Non existence –Mixed Nash equilibria: characterization –Matching Nash equilibria: characterization and computation for bipartite graphs Introduction

8 Related Work (cont.) [Mavronicolas, Papadopoulou, Philippou, Spirakis; WINE 2005] –Matching Nash equilibria: computation for other classes of graphs [Mavronicolas, Michael, Papadopoulou, Philippou, Spirakis; MFCS 2006] –Price of Defense –Guarantees on Price of Defense for structured Nash equilibria Introduction

9 Less Related Work [Aspnes, Chang, Yampolskiy; SODA 2005] –A different security game –Connection to the Graph Partition problem Introduction

10 Graph Theory Background A graph G=(V,E) Vertex Cover Edge Cover Independent Set Matching Introduction

11 A Strategic Game For 1 ≤ k ≤ |E|, consider the strategic game – –v attackers or vertex players vp i, with strategy set S vp i =V –a defender or the tuple edge player tep, with strategy set S tep = E k (all sets of k edges) Model

12 Pure Strategies and Profiles  Pure Strategy for player i: a single strategy from its strategy set  Pure Profile: a collection of pure strategies for all players Model

13 Individual Profits Individual Profits in –Vertex player vp i : gains 1 if it is not caught by the tuple edge player, and 0 otherwise –Tuple edge player tep: gains the number of vertex players incident to its selected tuple Model

14 Game Example tep k =2 IP vp 1 = 0 IP vp 2 = 0 IP tep = 2 IP vp 3 = 1 vp 1 vp 2 vp 3 Model

15 Mixed Strategies and Profiles Mixed strategy s i for player i : a probability distribution over its strategy set Mixed profile s : a collection of mixed strategies for all players Support of player i: set of pure strategies receiving positive probability Expected Individual Profit IP i : expectation of Individual Profit of player i in profile s Model

16 Notation tuple t: a set of k edges V(t): vertices incident to the edges of tuple t E(S): distinct edges of the set of tuples S In a profile s, s tep (t): probability that tep chooses tuple t Model

17 Notation (cont.) In a profile s, Support s ( i ): the support of player i Support s (VP): the support of all vertex players Tuples s (  ) = { t :   V(t), t  Support s ( tep ) }: set of tuples of the support of the tuple edge player that contain vertex  Model

18 Notation (cont.) In a profile s, Hit(  ): the event that the tuple edge player chooses tuple that contains vertex  P s (Hit(  )) = VP s (  ): expected number of vertex players choosing vertex  VP s (t): expected number of vertex players on vertices of the tuple t Model

19 Profiles Uniform: uniform probability distribution on each player’s support Attacker Symmetric: all vertex players have the same distribution Model

20 Nash Equilibrium (NE) No player can unilaterally improve its Individual Profit by switching to another strategy. Model

21 Edge Model Edge Model [ MPPS´05 ] = Tuple model for k =1 In a Covering profile s [MPPS´05] : –Support s (ep) is an Edge Cover –Support s (VP) is a Vertex Cover of G(Support s (ep)) Previous Work and Motivation

22 Edge Model (cont.) [ MPPS´05 ]. An Independent Covering profile is a Uniform, Attacker Symmetric Covering profile such that: –Support s (VP) is Independent Set –Each vertex of Support s (VP) is incident to only one edge of Support s (ep) Previous Work and Motivation

23 Edge Model (cont.) Theorem [MPPS’05]. An Independent Covering profile is a Nash equilibrium. Previous Work and Motivation

24 Motivation Extend the Edge model  Tuple model Increased power to the defender Increased quality of the protection provided in the network Previous Work and Motivation

25 Summary Graph-theoretic characterization of Nash Equilibria Necessary conditions for Nash Equilibria  k-Covering profiles Independent k-Covering profiles –are Nash equilibria called k-Matching Nash equilibria Results

26 Summary (cont.) Characterization of graphs admitting k-Matching Nash equilibria Polynomial-time algorithm for computing a k-Matching Nash equilibrium The Individual Profit of the defender is multiplied by k compared to the Edge model Results

27 Pure Nash Equilibria Theorem 1. G admits a pure Nash equilibrium if and only if G has an Edge Cover of size k. IP vp 1 = 0 IP vp 2 = 0 IP vp 3 = 0 vp 1 vp 2 vp 3 tep k =3 IP tep = 3 Results

28 Pure Nash Equilibria (cont.) If |V(G)| ≥ 2k +1, then G admits no pure NE. If |V(G)| ≤ 2k, G does not necessarily admit a Nash equilibrium. k=2 Results

29 Characterization of Nash Equilibria Theorem 2. A profile s is a Nash Equilibrum if and only if: –For any vertex v  Support s (VP), P s (Hit(v)) = min v P s (Hit(v)) –For any tuple t  Support s (tep), VP s (t) = max t VP s (t) Results

30 Necessary Conditions for NE Definition 2. A k-Covering profile s of Π k (G) satisfies: –Support s (tep) is an Edge Cover –Support s (VP) is a Vertex Cover of G(Support s (tep)) Results

31 Necessary Conditions for NE Proposition 3. A Nash equilibrium is a k-Covering profile. Results

32 Independent k-Covering Profiles Definition 3. An Independent k-Covering profile is a Uniform, Attacker Symmetric Covering profile such that: –Support s (VP) is an Independent Set –Each vertex of Support s (VP) is incident to only one edge of E(Support s (tep)). –Each edge in E(Support s (tep)) belongs to an equal number of distinct tuples of Support s (tep). Results

33 k-Matching Nash Equilibria Theorem 3. An Independent k-Covering profile is a Nash Equilibrium. Call it a k-Matching Nash Equilibrium Results

34 The Power of the Defender Proposition 3. Computing a Matching Nash equilibrium s 1 for Π 1 (G) and computing a k-Matching Nash equilibrium s k of Π k (G) are polynomial time equivalent. Results

35 The Power of the Defender Theorem 4. Assume that G admits a Matching Nash Equilibrium s 1 for Π 1 (G). Then G admits a k-Matching Nash Equilibrium s k for Π k (G) with. Results

36 Characterization of k-Matching NE Definition 4. The graph G is a U-Expander graph if for each set U'µ U, |U'| · | Neigh G (U') Å (V \ U) |. Results

37 Characterization of k-Matching NE Theorem 5. A G admits a k-Matching Nash Equilibrium if and only if G contains an Independent Set IS such that G is a (V\IS )-E xpander graph. Results

38 Polynomial Time Algorithm A tuple INPUT : A game Π k ( G ), with an Independent set of G such that G is a V\IS-Expander graph. OUTPUT: A Nash equilibrium s k for Π k ( G ) 1. Compute a Matching Nash equilibrium s 1 for Π 1 (G) [MPPS, ISAAC 2005] 2. Compute a tuple set T 3. Construct a Uniform, Attacker Symmetric profile s k with: –Support s k (tep) = T Results

39 Computation of Tuple Set T 1.Label the edges of Support s 1 ( ep ) e 0, e 1,…, e E num 2.Do a)Construct a tuple t i of k edges such that b) T = T  { t i } while Results

40 Example Support s 1 (ep) = v1v1 v2v2 v3v3 v5v5 v4v4 v6v6 e0e0 e1e1 e2e2 Results

41 Example (cont) k=2  T = {,, } v1v1 v2v2 v3v3 v5v5 v4v4 v6v6 e0e0 e1e1 e2e2 Results

42 Polynomial Time Algorithm (cont.) Theorem 6. Algorithm A tuple computes a k-Matching Nash equilibrium in time O(k·n + T(G)) T(G): the time needed to compute a Matching Nash equilibrium for the Edge model.

43 Application Corollary 1. A bipartite graph G admits a k-Matching Nash equilibrium which can be computed in polynomial time. Results

44 Conclusions Characterized Pure and Mixed Nash Equilibria Polynomial-time algorithm for computing k -Matching Nash equilibria Increased protection of the network through the increased power of the defender Conclusions

45 Future Work Other families of structured Nash equilibria Path model: The defender protects a path of length k Future Work

46 Thank you !