Skip to main content
Log in

A Network Game with Attackers and a Defender

  • Published:
Algorithmica Aims and scope Submit manuscript

Abstract

Consider an information network with threats called attackers; each attacker uses a probability distribution to choose a node of the network to damage. Opponent to the attackers is a protector entity called defender; the defender scans and cleans from attacks some part of the network (in particular, a link), which it chooses independently using its own probability distribution. Each attacker wishes to maximize the probability of escaping its cleaning by the defender; towards a conflicting objective, the defender aims at maximizing the expected number of attackers it catches.

We model this network security scenario as a non-cooperative strategic game on graphs. We are interested in its associated Nash equilibria, where no network entity can unilaterally increase its local objective. We obtain the following results:

  1. We obtain an algebraic characterization of (mixed) Nash equilibria.

  2. No (non-trivial) instance of the graph-theoretic game has a pure Nash equilibrium. This is an immediate consequence of some covering properties we prove for the supports of the players in all (mixed) Nash equilibria.

  3. We coin a natural subclass of mixed Nash equilibria, which we call Matching Nash equilibria, for this graph-theoretic game. Matching Nash equilibria are defined by enriching the necessary covering properties we proved with some additional conditions involving other structural parameters of graphs, such as Independent Sets.

    1. We derive a characterization of graphs admitting Matching Nash equilibria. All such graphs have an Expanding Independent Set. The characterization enables a non-deterministic, polynomial time algorithm to compute a Matching Nash equilibrium for any such graph.

    2. Bipartite graphs are shown to satisfy the characterization. So, using a polynomial time algorithm to compute a Maximum Matching for a bipartite graph, we obtain, as our main result, a deterministic, polynomial time algorithm to compute a Matching Nash equilibrium for any instance of the game with a bipartite graph.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Alon, N., Karp, R.M., Peleg, D., West, D.: A graph-theoretic game and its application to the k-server problem. SIAM J. Comput. 24(1), 78–100 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  2. Aspnes, J., Chang, K., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares problem. In: Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 43–52 (January 2005)

  3. Asratian, A.S., Denley, T.M.J., Häggkvist, R.: Bipartite Graphs and Their Applications. Cambridge Tracts in Mathematics, vol. 131. Cambridge University Press, Cambridge (1998)

    MATH  Google Scholar 

  4. Bonifaci, V., Di Iorio, U., Laura, L.: On the complexity of uniformly mixed Nash equilibria and related regular subgraph problems. In: Liskiewicz, M. (ed.) Proceedings of the 15th International Symposium on Fundamentals of Computation Theory. Lecture Notes in Computer Science, vol. 3623, pp. 197–208. Springer, New York (2005)

    Chapter  Google Scholar 

  5. Bonifaci, V., Di Iorio, U., Laura, L.: New results on the complexity of uniformly mixed Nash equilibria. In: Deng, X. (ed.) Proceedings of the First International Workshop on Internet and Network Economics. Lecture Notes in Computer Science, vol. 3828, pp. 1023–1032. Springer, New York (2005)

    Chapter  Google Scholar 

  6. Cheswick, E.R., Bellovin, S.M.: Firewalls and Internet Security. Addison-Wesley, Reading (1994)

    MATH  Google Scholar 

  7. Egerváry, E.: On combinatorial properties of matrices. Mat. Fiz. Lapok 38, 16–28 (1931) (in Hungarian with German summary)

    MATH  Google Scholar 

  8. Feder, T., Motwani, R.: Clique compressions, graph partitions and speeding-up algorithms. J. Comput. Syst. Sci. 51(2), 261–272 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  9. Franklin, M., Alto, P., Galil, Z., Yung, M.: Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. ACM 47(2), 225–243 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  10. Frobenius, G.: Über Zerlegbare Determinanten. In: Sitzungsber der Königlich, vol. XVIII, pp. 274–277. Preussischen Akademie der Wissenschaften (1917)

  11. Gelastou, M., Mavronicolas, M., Papadopoulou, V., Philippou, A., Spirakis, P.: The power of the defender. In: CD-ROM Proceedings of the 2nd International Workshop on Incentive-Based Computing, in conjunction with the 26th IEEE International Conference on Distributed Computing, July 2006

  12. Hall, P.: On representation of subsets. J. Lond. Math. Soc. Ser. 2 10, 26–30 (1935)

    Article  MATH  Google Scholar 

  13. Kearns, M., Ortiz, L.: Algorithms for interdependent security games. In: Thrun, S., Saul, L. (eds.) Advances in Neural Information Processing Systems, vol. 16. MIT Press, Cambridge (2004)

    Google Scholar 

  14. König, D.: Graphen und Matrizen. Mat. Fiz. Lapok 38, 116–119 (1931)

    MATH  Google Scholar 

  15. König, D.: Theorie der Endlichen und Unendlichen Graphen. Akademische Verlagsgesellschaft (1936)

  16. Markham, T., Payne, C.: Security at the network edge: a distributed firewall architecture. In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition, vol. 1, pp. 279–286 (June 2001)

  17. Mavronicolas, M., Papadopoulou, V., Philippou, A., Spirakis, P.: A graph-theoretic network security game. In: Deng, X. (ed.) Proceedings of the 1st International Workshop on Internet and Network Economics. Lecture Notes in Computer Science, vol. 3828, pp. 969–978. Springer, New York (2005)

    Google Scholar 

  18. Mavronicolas, M., Michael, L., Papadopoulou, V. Philippou, A., Spirakis, P.: The price of defense. In: Královič, R. (ed.) Proceedings of the 31st International Symposium on Mathematical Foundations of Computer Science. Lecture Notes in Computer Science, vol. 4162, pp. 717–728. Springer, New York (2006)

    Google Scholar 

  19. Mavronicolas, M., Papadopoulou, V., Persiano, G., Philippou, A., Spirakis, P.: The price of defense and fractional matchings. In: Chaudhuri, R.S., Das, S.R., Paul, H.S., Tirthapura, S. (eds.) Proceedings of the 8th International Conference on Distributed Computing and Networking. Lecture Notes in Computer Science, vol. 4308, pp. 115–126. Springer, New York (2006)

    Chapter  Google Scholar 

  20. Mavronicolas, M., Spirakis, P.: Algorithmic Game Theory. Springer, New York (2007, to appear)

  21. Nash, J.F.: Equilibrium points in N-person games. Proc. Natl. Acad. Sci. USA 36, 48–49 (1950)

    Article  MathSciNet  MATH  Google Scholar 

  22. Nash, J.F.: Non-cooperative games. Ann. Math. 54(2), 286–295 (1951)

    Article  MathSciNet  Google Scholar 

  23. Osborne, M., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)

    Google Scholar 

  24. Spafford, E.H.: The Internet worm: crisis and aftermath. Commun. ACM 32(6), 678–687 (1989)

    Article  Google Scholar 

  25. Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  26. von Neumann, J.: Zur Theorie der Gesellschaftsspiele. Math. Ann. 100, 295–320 (1928)

    Article  MathSciNet  MATH  Google Scholar 

  27. West, D.B.: Introduction to Graph Theory, 2nd edn. Prentice-Hall, Englewood Cliffs (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vicky Papadopoulou.

Additional information

A preliminary version of this work appeared in the Proceedings of the 16th Annual International Symposium on Algorithms and Computation, X. Deng and D. Du, eds., Lecture Notes in Computer Science, vol. 3827, pp. 288–297, Springer, December 2005. This work has been partially supported by the IST Program of the European Union under contract 001907 ( \(\mathsf{DELIS}\) ), and by research funds at University of Cyprus.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mavronicolas, M., Papadopoulou, V., Philippou, A. et al. A Network Game with Attackers and a Defender. Algorithmica 51, 315–341 (2008). https://doi.org/10.1007/s00453-007-9109-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00453-007-9109-3

Keywords

Navigation