Effects of Degree Distributions on Network Security Investments and Internalization of Externalities

نویسنده

  • Richard J. La
چکیده

We study the following three questions: (1) How do the node degrees in a network affect security investments when nodes are strategic and have different security investment choices? (2) How can we provide an incentive to selfish nodes to increase their security investments in order to improve the overall security and reduce the social cost? (3) How much inefficiency does the selfish nature of nodes cause? Making use of a population game model based on the well-known Chung-Lu random graph model, we first examine how the degree distribution of nodes influences their security investments at Nash equilibria (NEs) and overall network security measured by risk exposure from a neighbor. Here, the risk exposure quantifies the average risk or threat posed by a neighbor. We demonstrate several structural properties exhibited by both the NEs of population games and social optima that minimize the overall social cost. We show that, under some mild assumption, as the degrees of neighbors become (stochastically) larger, somewhat surprisingly, the risk exposure decreases at both NEs and social optima even though the security investments by a node of a fixed degree diminish. Secondly, we illustrate the relation between the NEs of population games and social optima. This relation offers a possible means of internalizing the externalities so as to enhance overall network security and reduce the social cost. Finally, we derive an upper bound on the price of anarchy, which is an affine function of the average degree of nodes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Internalization of Externalities in Interdependent Security: Large Network Cases

With increasing connectivity among comprising agents or (sub-)systems in large, complex systems, there is a growing interest in understanding interdependent security and dealing with inefficiency in security investments. Making use of a population game model and the well-known Chung-Lu random graph model, we study how one could encourage selfish agents to invest more in security by internalizin...

متن کامل

Analysis of Electricity Generation’s Externalities on Sectorial Output Growth and Welfare in Iran

Environmental problems are one of the most challenging issues for the entire world and each country. In economic studies, environmental issues are analyzed as negative externalities. In this article, the negative externalities of electricity production on the output growth of different sectors and household’s welfare in Iran’s economy have been studied through price system using Computable Gene...

متن کامل

Economic Aspects of Controlling Capital Investments in Cyberspace Security for Critical Infrastructure Assets

A model is developed which demonstrates that control systems for investments in information security have a positive net economic impact on an organization. This positive effect is an increasing function of the degree of asymmetric information (related to moral hazard and adverse selection) between Chief Security Officers and Chief Financial Officers within an organization. The role of external...

متن کامل

Managing Interdependent Information Security Risks: A Study of Cyberinsurance, Managed Security Service and Risk Pooling

The interdependency of information security risks poses a significant challenge for firms to manage security. Firms may overor under-invest in security because security investments generate network externalities. In this paper, we explore how firms can use three risk management approaches, third-party cyberinsurance, managed security service (MSS) and risk pooling arrangement (RPA), to address ...

متن کامل

Strategic investment in protection in networked systems

We study the incentives that agents have to invest in costly protection against cascading failures in networked systems. Applications include vaccination, computer security, and airport security. Agents are connected through a network and can fail either intrinsically or as a result of the failure of a subset of their neighbors. We characterize the equilibrium based on an agent’s failure probab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015