Interdependent Security Games on Networks Under Behavioral Probability Weighting

被引:52
作者
Hota, Ashish R. [1 ]
Sundaram, Shreyas [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2018年 / 5卷 / 01期
关键词
Behavioral decision theory; game theory; network security; socio-cyber-physical systems; PROSPECT-THEORY; STRATEGIC INTERACTION; USERS;
D O I
10.1109/TCNS.2016.2600484
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a class of interdependent security games on networks where each node chooses a personal level of security investment. The attack probability experienced by a node is a function of her own investment and the investment by her neighbors in the network. Most of the existing work in these settings considers players who are risk neutral. In contrast, studies in behavioral decision theory have shown that individuals often deviate from risk-neutral behavior while making decisions under uncertainty. In particular, the true probabilities associated with uncertain outcomes are often transformed into perceived probabilities in a highly nonlinear fashion by the users, which then influence their decisions. In this paper, we investigate the effects of such behavioral probability weightings by the nodes on their optimal investment strategies and the resulting security risk profiles that arise at the Nash equilibria of interdependent network security games. We characterize graph topologies that achieve the largest and smallest worst case average attack probabilities at Nash equilibria in Total Effort games, and equilibrium investments in Weakest Link and Best Shot games.
引用
收藏
页码:262 / 273
页数:12
相关论文
共 36 条
[1]   Security of interdependent and identical networked control systems [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Sastry, S. Shankar .
AUTOMATICA, 2013, 49 (01) :186-192
[2]  
[Anonymous], 2011, Advances in behavioral economics
[3]   A parametric analysis of prospect theory's functionals for the general population [J].
Booij, Adam S. ;
van Praag, Bernard M. S. ;
van de Kuilen, Gijs .
THEORY AND DECISION, 2010, 68 (1-2) :115-148
[4]   Strategic Interaction and Networks [J].
Bramoulle, Yann ;
Kranton, Rachel ;
D'Amours, Martin .
AMERICAN ECONOMIC REVIEW, 2014, 104 (03) :898-930
[5]  
Cerdeiro D., 2015, WORKING PAPER
[6]  
Christin N, 2012, LECT NOTES COMPUT SC, V7035, P16
[7]  
Christin N, 2011, LECT NOTES COMPUT SC, V7037, P4, DOI 10.1007/978-3-642-25280-8_2
[8]   Network Games [J].
Galeotti, Andrea ;
Goyal, Sanjeev ;
Jackson, Matthew O. ;
Vega-Redondo, Fernando ;
Yariv, Leeat .
REVIEW OF ECONOMIC STUDIES, 2010, 77 (01) :218-244
[9]   Heuristics and Biases: Implications for Security Design [J].
Garg, Vaibhav ;
Camp, Jean .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2013, 32 (01) :73-79
[10]   On the Convergence of Piecewise Linear Strategic Interaction Dynamics on Networks [J].
Gharesifard, Bahman ;
Touri, Behrouz ;
Basar, Tamer ;
Shamma, Jeff .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (06) :1682-1687