Computing Optimal Security Strategies for Interdependent Assets

We introduce a novel framework for computing optimal randomized security policies in networked domains which extends previous approaches in several ways. First, we extend previous linear programming techniques for Stackelberg security games to incorporate benefits and costs of arbitrary security configurations on individual assets. Second, we offer a principled model of failure cascades that allows us to capture both the direct and indirect value of assets, and extend this model to capture uncertainty about the structure of the interdependency network. Third, we extend the linear programming formulation to account for exogenous (random) failures in addition to targeted attacks. The goal of our work is two-fold. First, we aim to develop techniques for computing optimal security strategies in realistic settings involving interdependent security. To this end, we evaluate the value of our technical contributions in comparison with previous approaches, and show that our approach yields much better defense policies and scales to realistic graphs. Second, our computational framework enables us to attain theoretical insights about security on networks. As an example, we study how allowing security to be endogenous impacts the relative resilience of different network topologies.

[1]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[2]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[3]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[4]  Tansu Alpcan,et al.  Integrated security risk management for IT-intensive organizations , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[5]  Walter E. Beyeler,et al.  The topology of interbank payment flows , 2007 .

[6]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[7]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[8]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[9]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[10]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[11]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[12]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[13]  D. Watts,et al.  A generalized model of social and biological contagion. , 2005, Journal of theoretical biology.

[14]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[15]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[16]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.