Analyzing the incentives in Community-based Security Systems

Apart from mechanisms to make crowd-sourcing secure, the reliability of a collaborative system is dependent on the economic incentives of its potential contributors. We study several factors related to the incentives in a community-based security system, including the expectation on the social influence and the contagion effect of generosity. We also investigate the effects of organizing community members differently in a complete, random and scale-free structure. Our simulation results show that, without considering any specific incentive schemes, it is not easy to encourage user contribution in a complete-graph community structure (global systems). On the other hand, a moderate level of cooperative behavior can be cultivated when the community members are organized in the random or scale-free structure (social networks).

[1]  J. Hirshleifer From weakest-link to best-shot: The voluntary provision of public goods , 1983 .

[2]  W. Hamilton,et al.  The Evolution of Cooperation , 1984 .

[3]  Christos H. Papadimitriou,et al.  Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.

[4]  Michihiro Kandori Social Norms and Community Enforcement , 1992 .

[5]  P. Kollock SOCIAL DILEMMAS: The Anatomy of Cooperation , 1998 .

[6]  Svein J. Knapskog,et al.  Re-evaluating the Wisdom of Crowds in Assessing Web Security , 2011, Financial Cryptography.

[7]  B. Huberman,et al.  The outbreak of cooperation , 1993 .

[8]  L. Jean Camp,et al.  Reliable Usable Signals to Prevent Masquerade Attacks , 2006, WEIS.

[9]  Sung-Bae Cho,et al.  The Impact of Payoff Function and Local Interaction on the N-Player Iterated Prisoner's Dilemma , 2000, Knowledge and Information Systems.

[10]  Mike Afergan,et al.  Repeated-Game Modeling of Multicast Overlays , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  Jens Pfau,et al.  Evolving Cooperation in the N-player Prisoner's Dilemma: A Social Network Model , 2009, ACAL.

[12]  H. Ohtsuki,et al.  A simple rule for the evolution of cooperation on graphs and social networks , 2006, Nature.

[13]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[14]  M. Nowak,et al.  Evolutionary games and spatial chaos , 1992, Nature.

[15]  G. Hardin,et al.  The Tragedy of the Commons , 1968, Green Planet Blues.

[16]  Hal R. Varian,et al.  System Reliability and Free Riding , 2004, Economics of Information Security.

[17]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[18]  F. C. Santos,et al.  Scale-free networks provide a unifying framework for the emergence of cooperation. , 2005, Physical review letters.

[19]  Albert-László Barabási,et al.  Scale-Free Networks: A Decade and Beyond , 2009, Science.

[20]  Tyler Moore,et al.  Evaluating the Wisdom of Crowds in Assessing Phishing Websites , 2008, Financial Cryptography.

[21]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[22]  Nicolas Christin,et al.  When Information Improves Information Security , 2010, Financial Cryptography.

[23]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.