security investment (failures) in five economic environments: a...

44
1 Security investment (failures) in five economic environments: A comparison of homogeneous and heterogeneous user agents Jens Grossklags Nicolas Christin John Chuang Presented By Qi Xie

Upload: others

Post on 13-Apr-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

1

Security investment (failures) in five economic environments: A comparison of homogeneous and heterogeneous user agents

Jens Grossklags Nicolas Christin John Chuang

Presented By Qi Xie

Page 2: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

2

Outline

IntroductionThree security gamesNash with homogeneous and heterogeneous agentsSocial optima with homogeneous agentsConclusion & Discussion

Page 3: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

3

Outline

IntroductionThree security gamesNash with homogeneous and heterogeneous agentsSocial optima with homogeneous agentsConclusion & Discussion

Page 4: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

4

Introduction

Security gameA game-theoretic model

Two key componentsSelf-protectionSelf-insurance

Page 5: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

5

Assumptions

All entities in the network share a single purely public protection outputA single individual decides on protection efforts for each entity

Page 6: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

6

Generic utility function

Page 7: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

7

Generic utility function

Page 8: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

8

Generic utility function

Page 9: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

9

Generic utility function

Page 10: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

10

Generic utility function

Page 11: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

11

Generic utility function

Page 12: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

12

Generic utility function

Page 13: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

13

Generic utility function

Page 14: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

14

Generic utility function

Page 15: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

15

Generic utility function

Page 16: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

16

Outline

IntroductionThree security gamesNash with homogeneous and heterogeneous agentsSocial optima with homogeneous agentsConclusion & Discussion

Page 17: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

17

Three canonical security games

Total effort security gameWeakest-link security gameBest shot security gameWeakest target security game (without mitigation)Weakest target security game (with mitigation)

Page 18: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

18

Total effort security game

The overall protection levelNormalized sum of contributions

1( , )

1(1 )(1 )

i i ii

i i i i i k i i i ik

H e e eN

U M p L s e b e c sN

− =

= − − − − −

Page 19: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

19

Total effort security game

Example:In the BitTorrent p2p service, an attacker wants to slow down transfer of a given piece of information.

Page 20: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

20

Weakest-link security game

The overall protection levelThe minimum contribution offered over all entities

( , ) min( , )(1 )(1 min( , ))

i i i i

i i i i i i i i i i i

H e e e eU M p L s e e b e c s

− −

== − − − − −

Page 21: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

21

Weakest-link security game

Example:A two-way communication, where the security of the communication is determined by the least secure communication parties.

Page 22: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

22

Best shot security game

The overall protection levelMaximum contribution offered over all entities

( , ) max( , )(1 )(1 max( , ))

i i i i

i i i i i i i i i i i

H e e e eU M p L s e e b e c s

− −

== − − − − −

Page 23: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

23

Best shot security game

Example:A piece of information will remain available as long as a single node serving that piece of information can remain unharmed.

Page 24: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

24

Summary of three security games

Practical scenarios may involve social composition functions combining two or more of these gamesExample: Protecting a communication flow between two hosts

Page 25: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

25

Outline

IntroductionThree security gamesNash with homogeneous and heterogeneous agentsSocial optima with homogeneous agentsConclusion & Discussion

Page 26: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

26

Homogeneous agents VS Heterogeneous agents

Homogeneous agents Share the same values for cost of protection and self-insuranceIndividual faces the same threats with identical consequence if compromised

Heterogeneous agentsProtection and self-insurance costs per unit are NOT necessary identicalThe threats individual faces are NOT necessary the same If compromised, consequences are NOT necessary identical

Page 27: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

27

Homogeneous agents VS Heterogeneous agents (cont.)

Recall the generic function

(1 ) ( , )i i i i i i i i i i iU M p L s H e e b e c s−= − − − −

Simplified generic function with homogeneous agents

(1 ) ( , )i i i i i iU M pL s H e e be cs−= − − − −

Page 28: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

28

Nash Equilibrium analysis Total effort

Homogeneous agentsFull protection eq: (ei, si) = (1, 0) if (pL>bN && c>b+pL(N-1)/N)Full self-insurance eq: (ei, si) = (0, 1) if ((pL>bN && c<=b+pL(N-1)/N) || c<pL<bN)Passive eq : (ei, si) = (0, 0) if (pL<bN && pL<c)

Page 29: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

29

Nash Equilibrium analysis Total effort

Heterogeneous agentsCondition to select a protection-only strategy

1 11 1

i ij

j i i i

c bNeN N p L≠

−> −

− −∑

Page 30: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

30

Nash Equilibrium analysis Weakest-link

Homogeneous agentsMultiple protection eq. (ei, si) = (e0, 0) if (pL>b && (pL<c || (pL>=c && e0>(pL-c)/(pL-b)))Full self-insurance eq. (ei, si) = (0, 1) if (pL>c && (pL<b || (pL>=b && e0<(pL-c)/(pL-b)))Passive eq. (ei, si) = (0, 0) if (pL<b && pL<c)

Page 31: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

31

Nash Equilibrium analysis Weakest-link

Heterogeneous agentsFull protection eq. (ei, si) = (e0, 0) if (piLi>bi && (piLi<ci || (piLi>=ci && e0>maxi{(piLi-ci)/(piLi-bi)})))Multiple eq. without protection (above condition not hold)

Page 32: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

32

Nash Equilibrium analysis Best shot

Homogeneous agentsFull self-insurance eq. (ei, si) = (0, 1) if (b<c)

Should the condition be c<b && pL>c?

Passive eq. (ei, si) = (0, 0) if (pL<b && pL<c)No protection eq.

Page 33: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

33

Nash Equilibrium analysis Best shot

Heterogeneous agentsPossible protection eq. (e, s) = (1, 0) (Only one player faces disproportional losses || her protection costs are small)Protection eq. are increasingly unlikely to happen as N grows

Page 34: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

34

Outline

IntroductionThree security gamesNash with homogeneous and heterogeneous agentsSocial optima with homogeneous agentsConclusion & Discussion

Page 35: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

35

Social optima with homogeneous agents

Total effort gameProtection (ei, si) = (1, 0) if (b<pL && b<c)Self-insurance (ei, si) = (0, 1) if (c<pL && c<b)Passive (ei, si) = (0, 0) if (c>pL && b>pL)

Nash eq. of total effort game Full protection eq: (ei, si) = (1, 0) (pL>bN && c>b+pL(N-1)/N)Full self-insurance eq: (ei, si) = (0, 1) ((pL>bN && c<=b+pL(N-1)/N)) || c<pL<bN)Passive eq : (ei, si) = (0, 0) (pL<bN && pL<c)

Page 36: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

36

Social optima with homogeneous agents

Total effort gameProtection (ei, si) = (1, 0) if (b<pL && b<c)Self-insurance (ei, si) = (0, 1) if (c<pL && c<b)Passive (ei, si) = (0, 0) if (c>pL && b>pL)

Nash eq. of total effort game Full protection eq: (ei, si) = (1, 0) if (pL>bN && c>b+pL(N-1)/N)Full self-insurance eq: (ei, si) = (0, 1) if ((pL>bN&& c<=b+pL(N-1)/N)) || c<pL<bN)Passive eq : (ei, si) = (0, 0) if (pL<bN && pL<c)

Page 37: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

37

Social optima with homogeneous agents

Weakest-link gameProtection (ei, si) = (1, 0) if (b<pL && b<c)Self-insurance (ei, si) = (0, 1) if (c<pL && c<b)Passive (ei, si) = (0, 0) if (c>pL && b>pL)

Nash eq. of weakest-link gameMultiple protection eq. (ei, si) = (e0, 0) if (pL>b && (pL<c || (pL>=c && e0>(pL-c)/(pL-b)))Full self-insurance eq. (ei, si) = (0, 1) if (pL>c && (pL<b || (pL>=b && e0<(pL-c)/(pL-b)))Passive eq. (ei, si) = (0, 0) if (pL<b && pL<c)

Page 38: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

38

Social optima with homogeneous agents

Weakest-link gameProtection (ei, si) = (1, 0) if (b<pL && b<c)Self-insurance (ei, si) = (0, 1) if (c<pL && c<b)Passive (ei, si) = (0, 0) if (c>pL && b>pL)

Nash eq. of weakest-link gameMultiple protection eq. (ei, si) = (e0, 0) if (pL>b && (pL<c || (pL>=c && e0 >(pL-c)/(pL-b)))Full self-insurance eq. (ei, si) = (0, 1) if (pL>c && (pL<b || (pL>=b && e0 <(pL-c)/(pL-b)))Passive eq. (ei, si) = (0, 0) if (pL<b && pL<c)

Page 39: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

39

Social optima with homogeneous agents

Best shot gameProtection (e, s) = (1, 0) if (b/c<N)Insurance (ei, si) = (0, 1) if (b/c>N)

Nash eq. of best shot gameFull self-insurance eq. (ei, si) = (0, 1) if (c<b && pL>c)Passive eq. (ei, si) = (0, 0) if (pL<b && pL<c)No protection eq.

Page 40: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

40

Social optima with homogeneous agents

Best shot gameProtection (e, s) = (1, 0) if (b/c<N)Insurance (ei, si) = (0, 1) if (b/c>N)

Nash eq. of best shot gameFull self-insurance eq. (ei, si) = (0, 1) if (c<b && pL>c)Passive eq. (ei, si) = (0, 0) if (pL<b && pL<c)No protection eq.

Page 41: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

41

Outline

IntroductionThree security gamesNash with homogeneous and heterogeneous agentsSocial optima with homogeneous agentsConclusion & Discussion

Page 42: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

42

Conclusions

Model security decision-making by homogeneous and heterogeneous agents in selection of five gamesFind Nash Equilibria for homogeneous and heterogeneous agents in selection of five gamesCompare the Nash and social optima for homogeneous agents

Page 43: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

43

Future research directions

Extend the analysis to more formally explain the impact of limited information on agents strategiesDevelop a set of laboratory experiments to conduct user studies and attempt to measure the differences between rational behavior and actual strategies played

Page 44: Security investment (failures) in five economic environments: A …klarson/teaching/F08-886/talks/... · 2008-11-18 · 1 Security investment (failures) in five economic environments:

44

Discussions

StrengthPlenty of examplesWell done proofs and computationsGood conclusion

WeaknessDoes not provide the simplified generic functionThe condition of the protection Nash eq. is incorrect for the Best shot game with homogeneous agents