Security Diffusion Games

Security games model the confrontation between a defender protecting a set of targets and an attacker who tries to capture them. A variant of these games assumes security interdependence between targets, facilitating contagion of an attack. So far, only stochastic spread of an attack has been considered. In this work, we introduce a version of security games, where the attacker strategically drives the entire spread of attack and where interconnections between nodes affect their susceptibility to be captured. We find that the strategies effective in the settings without contagion or with stochastic contagion are no longer feasible when spread of attack is strategic. While in the former settings it was possible to efficiently find optimal strategies of the attacker, doing so in the latter setting turns out to be an NP-complete problem for an arbitrary network. However, for some simpler network structures, such as cliques, stars, and trees, we show that it is possible to efficiently find optimal strategies of both players. For arbitrary networks, we study and compare the efficiency of various heuristic strategies. As opposed to previous works with no or stochastic contagion, we find that centrality-based defense is often effective when spread of attack is strategic, particularly for centrality measures based on the Shapley value.

[1]  R. Ceballo,et al.  The Neighborhood Club: a supportive intervention group for children exposed to urban violence. , 2000, The American journal of orthopsychiatry.

[2]  Flávio L Pinheiro,et al.  Optimal diversification strategies in the networks of related products and of related research areas , 2017, Nature Communications.

[3]  Tomasz P. Michalak,et al.  On the Construction of Covert Networks , 2017, AAMAS.

[4]  Sarah J. S. Wilner,et al.  Networked Narratives: Understanding Word-of-Mouth Marketing in Online Communities , 2009 .

[5]  Alsaleh Saad,et al.  How Terrorist Groups Use Social Networking Media to Attract and Recruit New Members , 2018, 2018 International Conference on Innovations in Information Technology (IIT).

[6]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[7]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[8]  M. A. Beauchamp AN IMPROVED INDEX OF CENTRALITY. , 1965, Behavioral science.

[9]  Viliam Lisý,et al.  Computing Optimal Policies for Attack Graphs with Action Failures and Costs , 2014, STAIRS.

[10]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[11]  M. Macy,et al.  Complex Contagions and the Weakness of Long Ties1 , 2007, American Journal of Sociology.

[12]  Bo An,et al.  An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..

[13]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[14]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[15]  Damon Centola An Experimental Study of Homophily in the Adoption of Health Behavior , 2011, Science.

[16]  Oskar Skibski,et al.  Axiomatic Characterization of Game-Theoretic Centrality , 2018, J. Artif. Intell. Res..

[17]  M. E. Shaw Group Structure and the Behavior of Individuals in Small Groups , 1954 .

[18]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[19]  Marcin Waniek,et al.  Strategic distribution of seeds to support diffusion in complex networks , 2018, PloS one.

[20]  Damon Centola,et al.  The Spread of Behavior in an Online Social Network Experiment , 2010, Science.

[21]  S. Skaperdas Contest success functions , 1996 .

[22]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[23]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[24]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[25]  D. Fudenberg,et al.  Customer Poaching and Brand Switching , 2000 .

[26]  G. Tullock Efficient Rent Seeking , 2001 .

[27]  S. Goyal,et al.  Interaction, protection and epidemics , 2015 .

[28]  Thomas W. Valente,et al.  Opinion Leadership and Social Contagion in New Product Diffusion , 2011, Mark. Sci..

[29]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[30]  Paulo Shakarian,et al.  A Scalable Framework for Modeling Competitive Diffusion in Social Networks , 2010, 2010 IEEE Second International Conference on Social Computing.

[31]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[32]  Thomas Hegghammer,et al.  Terrorist Recruitment and Radicalization in Saudi Arabia , 2006 .

[33]  Dimitrios Buhalis,et al.  Destination Marketing through User Personalised Content (UPC) , 2010, ENTER.

[34]  Tansu Alpcan,et al.  Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.

[35]  Nicolas Christin,et al.  Uncertainty in Interdependent Security Games , 2010, GameSec.

[36]  H. Stackelberg,et al.  Marktform und Gleichgewicht , 1935 .

[37]  Nicole E. Allen,et al.  Centrality measures to identify key stakeholders in Family Violence Councils , 2015 .

[38]  A. Barabasi,et al.  Halting viruses in scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[39]  E. R. Leukfeldt,et al.  Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks , 2016 .

[40]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[41]  Jarosław Jankowski,et al.  Balancing Speed and Coverage by Sequential Seeding in Complex Networks , 2016, Scientific Reports.

[42]  Talal Rahwan,et al.  Efficient algorithms for game-theoretic betweenness centrality , 2016, Artif. Intell..

[43]  Lance Spitzner,et al.  Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[44]  Talal Rahwan,et al.  Hiding individuals and communities in a social network , 2016, Nature Human Behaviour.

[45]  S. Goyal,et al.  Attack, Defence, and Contagion in Networks , 2014 .

[46]  Federico Etro,et al.  Stackelberg Competition with Endogenous Entry , 2008 .

[47]  Tansu Alpcan,et al.  Network Security , 2010 .

[48]  Michael P. Wellman,et al.  Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm , 1998, ICML.

[49]  Yevgeniy Vorobeychik,et al.  Multidefender Security Games , 2015, IEEE Intelligent Systems.

[50]  Kathleen M. Quardokus,et al.  Department-level change: Using social network analysis to map the hidden structure of academic departments , 2013 .

[51]  Damon Centola Damon Centola Behavior An Experimental Study of Homophily in the Adoption of Health , 2011 .

[52]  D. North Competing Technologies , Increasing Returns , and Lock-In by Historical Events , 1994 .

[53]  Asuman E. Ozdaglar,et al.  Network Security and Contagion , 2013, PERV.

[54]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[55]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[56]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[57]  Moez Draief,et al.  Contagion and observability in security domains , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[58]  Konstantin Avrachenkov,et al.  Cooperative Game Theory Approaches for Network Partitioning , 2017, COCOON.

[59]  W. Zachary,et al.  An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.

[60]  Mark S. Hamm Terrorist Recruitment in American Correctional Institutions: An Exploratory Study of Non-Traditional Faith Groups Final Report , 2007 .

[61]  X. Freixas,et al.  Contagion and efficiency in gross and net interbank payment systems , 1998 .

[62]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[63]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[64]  Gerardo Iñiguez,et al.  Complex contagion process in spreading of online innovation , 2014, Journal of The Royal Society Interface.

[65]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[66]  S. Goyal,et al.  How do you defend a network , 2017 .

[67]  Andrew W. Moore,et al.  Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..

[68]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[69]  Tomasz P. Michalak,et al.  Efficient Computation of Semivalues for Game-Theoretic Network Centrality , 2015, AAAI.

[70]  S. Bikhchandani,et al.  You have printed the following article : A Theory of Fads , Fashion , Custom , and Cultural Change as Informational Cascades , 2007 .

[71]  Nicholas R. Jennings,et al.  Efficient Computation of the Shapley Value for Game-Theoretic Network Centrality , 2014, J. Artif. Intell. Res..

[72]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[73]  Jon M. Kleinberg,et al.  How to schedule a cascade in an arbitrary graph , 2012, EC '12.

[74]  J. Anthonisse The rush in a directed graph , 1971 .

[75]  Ajith Abraham,et al.  Models of Influence in Online Social Networks , 2014, Int. J. Intell. Syst..

[76]  Bronwyn H Hall,et al.  Adoption of New Technology , 2003 .

[77]  Yongmin Chen,et al.  Dynamic Pricing: When to Entice Brand Switching and When to Reward Consumer Loyalty , 2010 .