Skip to main content

Connected Subgraph Defense Games

  • Conference paper
  • First Online:
Algorithmic Game Theory (SAGT 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11801))

Included in the following conference series:

Abstract

We study a security game over a network played between a defender and k attackers. Every attacker chooses, probabilistically, a node of the network to damage. The defender chooses, probabilistically as well, a connected induced subgraph of the network of \(\lambda \) nodes to scan and clean. Each attacker wishes to maximize the probability of escaping her cleaning by the defender. On the other hand, the goal of the defender is to maximize the expected number of attackers that she catches. This game is a generalization of the model from the seminal paper of Mavronicolas et al. [11]. We are interested in Nash equilibria of this game, as well as in characterizing defense-optimal networks which allow for the best equilibrium defense ratio; this is the ratio of k over the expected number of attackers that the defender catches in equilibrium. We provide characterizations of the Nash equilibria of this game and defense-optimal networks. This allows us to show that the equilibria of the game coincide independently from the coordination or not of the attackers. In addition, we give an algorithm for computing Nash equilibria. Our algorithm requires exponential time in the worst case, but it is polynomial-time for \(\lambda \) constantly close to 1 or n. For the special case of tree-networks, we further refine our characterization which allows us to derive a polynomial-time algorithm for deciding whether a tree is defense-optimal and if this is the case it computes a defense-optimal Nash equilibrium. On the other hand, we prove that it is \(\mathtt {NP}\)-hard to find a best-defense strategy if the tree is not defense-optimal. We complement this negative result with a polynomial-time constant-approximation algorithm that computes solutions that are close to optimal ones for general graphs. Finally, we provide asymptotically (almost) tight bounds for the Price of Defense for any \(\lambda \); this is the worst equilibrium defense ratio over all graphs.

This work was supported by the NeST initiative of the EEE/CS School of the University of Liverpool and by the EPSRC grant EP/P02002X/1.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We use \(L_i \setminus L_j\) for some \(\lambda \)-subgraphs \(L_i, L_j\) to denote the set of vertices which are contained in \(L_i\) but not in \(L_j\).

References

  1. Akrida, E.C., Deligkas, A., Melissourgos, T., Spirakis, P.G.: Connected subgraph defense games. CoRR abs/1906.02774 (2019). http://arxiv.org/abs/1906.02774

    Chapter  Google Scholar 

  2. Alon, N., Karp, R.M., Peleg, D., West, D.B.: A graph-theoretic game and its application to the k-server problem. SIAM J. Comput. 24(1), 78–100 (1995)

    Article  MathSciNet  Google Scholar 

  3. An, B., Pita, J., Shieh, E., Tambe, M., Kiekintveld, C., Marecki, J.: Guards and protect: Next generation applications of security games. ACM SIGecom Exchanges 10(1), 31–34 (2011)

    Article  Google Scholar 

  4. Aspnes, J., Chang, K.L., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares partition problem. J. Comput. Syst. Sci. 72(6), 1077–1093 (2006)

    Article  MathSciNet  Google Scholar 

  5. Attiya, H., Welch, J.: Distributed Computing: Fundamentals Simulations and Advanced Topics. Wiley, Hoboken (2004)

    Book  Google Scholar 

  6. Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edn. Addison-Wesley Longman Publishing Co. Inc, Boston (2003)

    MATH  Google Scholar 

  7. Franklin, M.K., Galil, Z., Yung, M.: Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. ACM 47(2), 225–243 (2000)

    Article  MathSciNet  Google Scholar 

  8. Jain, M., Conitzer, V., Tambe, M.: Security scheduling for real-world networks. In: Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, pp. 215–222. International Foundation for Autonomous Agents and Multiagent Systems (2013)

    Google Scholar 

  9. Kearns, M.J., Ortiz, L.E.: Algorithms for interdependent security games. In: Advances in Neural Information Processing Systems 16 [Neural Information Processing Systems, NIPS], pp. 561–568 (2003)

    Google Scholar 

  10. Letchford, J., Conitzer, V.: Solving security games on graphs via marginal probabilities. In: Twenty-Seventh AAAI Conference on Artificial Intelligence (2013)

    Google Scholar 

  11. Mavronicolas, M., Michael, L., Papadopoulou, V., Philippou, A., Spirakis, P.: The price of defense. In: Královič, R., Urzyczyn, P. (eds.) MFCS 2006. LNCS, vol. 4162, pp. 717–728. Springer, Heidelberg (2006). https://doi.org/10.1007/11821069_62

    Chapter  MATH  Google Scholar 

  12. Mavronicolas, M., Papadopoulou, V., Philippou, A., Spirakis, P.G.: A network game with attackers and a defender. Algorithmica 51(3), 315–341 (2008)

    Article  MathSciNet  Google Scholar 

  13. Mavronicolas, M., Papadopoulou, V.G., Persiano, G., Philippou, A., Spirakis, P.G.: The price of defense and fractional matchings. In: 8th International Conference Distributed Computing and Networking, ICDCN, pp. 115–126 (2006)

    Google Scholar 

  14. Mavronicolas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: A graph-theoretic network security game. In: Internet and Network Economics, First International Workshop, WINE, pp. 969–978 (2005)

    Google Scholar 

  15. Nash, J.F.: Equilibrium points in n-person games. Proc. Nat. Acad. Sci. U.S.A. 36(1), 48–49 (1950)

    Article  MathSciNet  Google Scholar 

  16. Nash, J.: Non-cooperative games. Ann. Math. 54(2), 286–295 (1951)

    Article  MathSciNet  Google Scholar 

  17. Spafford, E.H.: The internet worm: crisis and aftermath. Commun. ACM 32(6), 678–687 (1989)

    Article  Google Scholar 

  18. Stallings, W.: Cryptography and network security - principles and practice, 3 edn. Prentice Hall, Upper Saddle River (2003)

    Google Scholar 

  19. Vaněk, O., Yin, Z., Jain, M., Bošanskỳ, B., Tambe, M., Pěchouček, M.: Game-theoretic resource allocation for malicious packet detection in computer networks. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, pp. 905–912. International Foundation for Autonomous Agents and Multiagent Systems (2012)

    Google Scholar 

  20. Xu, H.: The mysteries of security games: equilibrium computation becomes combinatorial algorithm design. In: Proceedings of the 2016 ACM Conference on Economics and Computation, EC 2016, pp. 497–514. ACM, New York (2016). https://doi.org/10.1145/2940716.2940796, http://doi.acm.org/10.1145/2940716.2940796

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Themistoklis Melissourgos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Akrida, E.C., Deligkas, A., Melissourgos, T., Spirakis, P.G. (2019). Connected Subgraph Defense Games. In: Fotakis, D., Markakis, E. (eds) Algorithmic Game Theory. SAGT 2019. Lecture Notes in Computer Science(), vol 11801. Springer, Cham. https://doi.org/10.1007/978-3-030-30473-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30473-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30472-0

  • Online ISBN: 978-3-030-30473-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics