Network Vulnerability: A Designer-Disruptor Game∗

نویسنده

  • Hans Haller
چکیده

We focus on the crucial role of network architecture in the defence against targeted attacks. A two-stage strategic game between a network designer and a network disruptor is analyzed. Given a set of nodes, the designer builds a network by investing in costly links. In the second stage, the disruptor deletes (possibly in a costly way) some of the links or nodes to reduce the designer’s benefit from the network. General results deal with existence, uniqueness and comparative statics of Stackelberg (i.e., subgame perfect) equilibria. More specific issues are addressed under the assumption of a fixed budget for one or both players. JEL Classification: C72, D85

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity

Technological networks (e.g. telephone and sensor networks, Internet) have provided modern society with increased efficiency, but have also exposed us to the risks posed by their vulnerability to attacks. Mitigating these risks involves designing robust network topologies in situations where resources are economically constrained. In this paper, we consider the vulnerability of network topologi...

متن کامل

طراحی و اجرای یک سرویس Game GIS برای مدیریت بحران زمین‌لرزه مطالعه‌ی موردی: منطقه‌ی 10 تبریز

The term "Game GIS” implies to real spatially enabled games in which a special part of the world is virtually simulated, represented and managed. In fact, game GIS is an integrated system consists of video games and geographical information systems, aimed to simulate and representing spatially enabled environment. The achieved result of implementing a game GIS service can be exploite...

متن کامل

Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks

Complex networks have been an up-and-coming exciting field in the realm of interactions. With their widespread use appearing on the horizon it is ever more vital to be able to measure their vulnerability as a function of their topology. Precisely, discovering vulnerable links, disposed to attacks, can help in hardening these links and by that providing more secure and reliable network structure...

متن کامل

Cooperative network flow problem with pricing decisions and allocation of benefits: A game theory approach

Several real problems in telecommunication, transportation, and distribution industries can be well analyzed by network flow models. In revenue management, pricing plays a primary role which increases the profit generated from a limited supply of assets. Pricing decision directly affects the amount of service or product demand. Hence, in traditional maximum flow problem, we assume that the dema...

متن کامل

Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach

In this paper, we propose a quantification of the vulnerability of a communication network where links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between a network manager who chooses a spanning tree of the network as communication infrastructure and an attacker who is trying to disrupt the communication...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016