Abstract
We study a security game over a network played between a defender and k attackers. Every attacker chooses, probabilistically, a node of the network to damage. The defender chooses, probabilistically as well, a connected induced subgraph of the network of \(\lambda \) nodes to scan and clean. Each attacker wishes to maximize the probability of escaping her cleaning by the defender. On the other hand, the goal of the defender is to maximize the expected number of attackers that she catches. This game is a generalization of the model from the seminal paper of Mavronicolas et al. [11]. We are interested in Nash equilibria of this game, as well as in characterizing defense-optimal networks which allow for the best equilibrium defense ratio; this is the ratio of k over the expected number of attackers that the defender catches in equilibrium. We provide characterizations of the Nash equilibria of this game and defense-optimal networks. This allows us to show that the equilibria of the game coincide independently from the coordination or not of the attackers. In addition, we give an algorithm for computing Nash equilibria. Our algorithm requires exponential time in the worst case, but it is polynomial-time for \(\lambda \) constantly close to 1 or n. For the special case of tree-networks, we further refine our characterization which allows us to derive a polynomial-time algorithm for deciding whether a tree is defense-optimal and if this is the case it computes a defense-optimal Nash equilibrium. On the other hand, we prove that it is \(\mathtt {NP}\)-hard to find a best-defense strategy if the tree is not defense-optimal. We complement this negative result with a polynomial-time constant-approximation algorithm that computes solutions that are close to optimal ones for general graphs. Finally, we provide asymptotically (almost) tight bounds for the Price of Defense for any \(\lambda \); this is the worst equilibrium defense ratio over all graphs.
This work was supported by the NeST initiative of the EEE/CS School of the University of Liverpool and by the EPSRC grant EP/P02002X/1.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We use \(L_i \setminus L_j\) for some \(\lambda \)-subgraphs \(L_i, L_j\) to denote the set of vertices which are contained in \(L_i\) but not in \(L_j\).
References
Akrida, E.C., Deligkas, A., Melissourgos, T., Spirakis, P.G.: Connected subgraph defense games. CoRR abs/1906.02774 (2019). http://arxiv.org/abs/1906.02774
Alon, N., Karp, R.M., Peleg, D., West, D.B.: A graph-theoretic game and its application to the k-server problem. SIAM J. Comput. 24(1), 78–100 (1995)
An, B., Pita, J., Shieh, E., Tambe, M., Kiekintveld, C., Marecki, J.: Guards and protect: Next generation applications of security games. ACM SIGecom Exchanges 10(1), 31–34 (2011)
Aspnes, J., Chang, K.L., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares partition problem. J. Comput. Syst. Sci. 72(6), 1077–1093 (2006)
Attiya, H., Welch, J.: Distributed Computing: Fundamentals Simulations and Advanced Topics. Wiley, Hoboken (2004)
Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edn. Addison-Wesley Longman Publishing Co. Inc, Boston (2003)
Franklin, M.K., Galil, Z., Yung, M.: Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. ACM 47(2), 225–243 (2000)
Jain, M., Conitzer, V., Tambe, M.: Security scheduling for real-world networks. In: Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, pp. 215–222. International Foundation for Autonomous Agents and Multiagent Systems (2013)
Kearns, M.J., Ortiz, L.E.: Algorithms for interdependent security games. In: Advances in Neural Information Processing Systems 16 [Neural Information Processing Systems, NIPS], pp. 561–568 (2003)
Letchford, J., Conitzer, V.: Solving security games on graphs via marginal probabilities. In: Twenty-Seventh AAAI Conference on Artificial Intelligence (2013)
Mavronicolas, M., Michael, L., Papadopoulou, V., Philippou, A., Spirakis, P.: The price of defense. In: Královič, R., Urzyczyn, P. (eds.) MFCS 2006. LNCS, vol. 4162, pp. 717–728. Springer, Heidelberg (2006). https://doi.org/10.1007/11821069_62
Mavronicolas, M., Papadopoulou, V., Philippou, A., Spirakis, P.G.: A network game with attackers and a defender. Algorithmica 51(3), 315–341 (2008)
Mavronicolas, M., Papadopoulou, V.G., Persiano, G., Philippou, A., Spirakis, P.G.: The price of defense and fractional matchings. In: 8th International Conference Distributed Computing and Networking, ICDCN, pp. 115–126 (2006)
Mavronicolas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: A graph-theoretic network security game. In: Internet and Network Economics, First International Workshop, WINE, pp. 969–978 (2005)
Nash, J.F.: Equilibrium points in n-person games. Proc. Nat. Acad. Sci. U.S.A. 36(1), 48–49 (1950)
Nash, J.: Non-cooperative games. Ann. Math. 54(2), 286–295 (1951)
Spafford, E.H.: The internet worm: crisis and aftermath. Commun. ACM 32(6), 678–687 (1989)
Stallings, W.: Cryptography and network security - principles and practice, 3 edn. Prentice Hall, Upper Saddle River (2003)
Vaněk, O., Yin, Z., Jain, M., Bošanskỳ, B., Tambe, M., Pěchouček, M.: Game-theoretic resource allocation for malicious packet detection in computer networks. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, pp. 905–912. International Foundation for Autonomous Agents and Multiagent Systems (2012)
Xu, H.: The mysteries of security games: equilibrium computation becomes combinatorial algorithm design. In: Proceedings of the 2016 ACM Conference on Economics and Computation, EC 2016, pp. 497–514. ACM, New York (2016). https://doi.org/10.1145/2940716.2940796, http://doi.acm.org/10.1145/2940716.2940796
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Akrida, E.C., Deligkas, A., Melissourgos, T., Spirakis, P.G. (2019). Connected Subgraph Defense Games. In: Fotakis, D., Markakis, E. (eds) Algorithmic Game Theory. SAGT 2019. Lecture Notes in Computer Science(), vol 11801. Springer, Cham. https://doi.org/10.1007/978-3-030-30473-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-30473-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30472-0
Online ISBN: 978-3-030-30473-7
eBook Packages: Computer ScienceComputer Science (R0)