Download presentation
Presentation is loading. Please wait.
Published byChester Blair Modified over 6 years ago
1
Learning about Protecting Distributed Infrastructure from Behavioral Economists
Saurabh Bagchi ECE & CS, Purdue University Joint work with: ECE: Shreyas Sundaram, Mustafa Abdallah Economics: Tim Cason, Daniel Woods Supported by NSF SaTC grant CNS ( )
2
Security is Only Too Human
Security of large-scale systems (such as the power grid, industrial plants, and communication and computer networks) depend critically on human decisions A few thousand papers on optimal decision making for protecting interconnected systems But relies on classical economic models of perfectly rational and optimal behavior for human decision-makers But behavioral economics shows humans are only partly rational and thus, consistently deviate from the above-mentioned classical models. 3: Or assumes some algorithm makes all the decisions. However, large-scale security decisions almost always involve humans.
3
Behavioral Weighting Function
Human perceptions of rewards and losses can differ substantially from their true values These perceptions can have a significant impact on the investments made to protect the systems that the individuals are managing. Humans overweight low attack probabilities and underweight large attack probabilities. Example: Prelec [1998] weighting function: π€ π₯ = exp β β ln (π₯) Ξ± where parameter Ξ± β 0,1 . When Ξ± = 1 this is rational behavior. The smaller is Ξ±, the greater is the degree of bias. Cross over happens at 1/e = 0.37
4
Whatβs Nobel Got to Do With It?
Daniel Kahneman (2002 Economics Nobel Laureate): Prospect theory as a model of decision making under risk, as a counterpoint to expected utility theory Richard Thaler (2017 Economics Nobel Laureate): βI discovered the presence of human life in a place not far, far away, where my fellow economists thought it did not exist: the economy.β 2015 film The Big Short,Β in which Richard Thaler and Selena Gomez explain synthetic CDOs He has been aware that he was considered heretical flying in the face of well-accepted economic theory. But it is now considered niche mainstream.
5
Our Research Direction
Game-theoretic framework involving attack graph models of large-scale interdependent systems and multiple defenders Each human defender misperceives the probabilities of successful attack in the attack graph We characterize impacts of such misperceptions on the security investments made by each defender Attacker A π’ π π’ π Defender 2 The cost of a defender π· π is: πΆ π x β π’ π β π π πΏ π max πβ β π π’ π , π’ π βπ π(π π,π (x)) Defender 1 πΏ π The defender Dk will invest to minimize his cost. Summed over all his crown jewels. π π,π Defender 3
6
Initial Observations Both games (vertex based and path based) have Convex cost function given a convex decreasing probability function Both games have a Pure Nash Equilibrium (PNE) state In each game, we can compute the best response by solving a convex optimization problem They have different investment decisions than standard security game which maximizes expected utility A rational player can benefit from a biased player Both players rational Player 2 biased 0.696 2 3 2.081 2 3 1.278 0.4254 2.719 L2 = 200 L2 = 200 1.516 1 1 1.974 5 6 0.4254 5 6 4 19.2 4 7.5924 L1 = 200 1.516 8.576 Overall Loss = L1 = 200 Overall Loss =
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.