A graph-theoretic network security game

Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multi-player game on a graph, with two kinds of players, a set of attackers and a protector player, representing the viruses and the system security software, respectively. We are interested in the associated Nash equilibria, where no network entity can unilaterally improve its local objective. We obtain the following results: for certain families of graphs, mixed Nash equilibria can be computed in polynomially time. These families include, among others, regular graphs, graphs with perfect matchings and trees. The corresponding price of anarchy for any mixed Nash equilibria of the game is upper and lower bounded by a linear function of the number of vertices of the graph. (We define the price of anarchy to reflect the utility of the protector). Finally, we introduce a generalised version of the game. We show that the existence problem of pure Nash equilibria here is NP complete.

[1]  W. T. Tutte A Short Proof of the Factor Theorem for Finite Graphs , 1954, Canadian Journal of Mathematics.

[2]  Paul G. Spirakis,et al.  The Price of Defense and Fractional Matchings , 2006, ICDCN.

[3]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[4]  Paul G. Spirakis,et al.  The Power of the Defender , 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06).

[5]  Andrew V. Goldberg,et al.  Maximum Skew-Symmetric Flows , 1995, ESA.

[6]  L. Lovász Matching Theory (North-Holland mathematics studies) , 1986 .

[7]  Silvio Micali,et al.  An O(v|v| c |E|) algoithm for finding maximum matching in general graphs , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).

[8]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[9]  D. West Introduction to Graph Theory , 1995 .

[10]  Christos H. Papadimitriou,et al.  Worst-case equilibria , 1999 .

[11]  Marios Mavronicolas,et al.  How Many Attackers Can Selfish Defenders Catch? , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[12]  James Aspnes,et al.  Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.

[13]  Paul G. Spirakis,et al.  A Network Game with Attackers and a Defender , 2008, Algorithmica.

[14]  Paul G. Spirakis,et al.  The Price of Defense , 2006, Algorithmica.

[15]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.