Network Security and Contagion

We develop a theoretical model of security investments in a network of interconnected agents. Network connections introduce the possibility of cascading failures due to an exogenous or endogenous attack depending on the profile of security investments by the agents. We provide a tractable decomposition of individual payoffs into an own effect and an externality, which also enables us to characterize individual investment incentives recursively (by considering the network with one agent removed at a time). Using this decomposition, we provide characterization of equilibrium and socially optimal investment levels as a function of the structure of the network, highlighting the role of a new set of network centrality measures in shaping the levels of equilibrium and optimal investments. When the attack location is endogenized (by assuming that the attacker chooses a probability distribution over the location of the attack in order to maximize damage), similar forces still operate, but now because greater investment by an agent shifts the attack to other parts of the network, the equilibrium may involve too much investment relative to the social optimum.

[1]  A. Tahbaz-Salehi,et al.  Systemic Risk and Stability in Financial Networks , 2013 .

[2]  Nizar Allouch,et al.  On the Private Provision of Public Goods on Networks , 2012, J. Econ. Theory.

[3]  Sanjeev Goyal,et al.  A Noncooperative Model of Network Formation , 2000 .

[4]  Andrea Galeotti,et al.  Strategic immunization and group structure , 2013 .

[5]  Bruce A. Reed,et al.  The Size of the Giant Component of a Random Graph with a Given Degree Sequence , 1998, Combinatorics, Probability and Computing.

[6]  Mariagiovanna Baccara,et al.  How to Organize Crime , 2006 .

[7]  Heski Bar-Isaac,et al.  How to Organize Crime , 2006 .

[8]  M. Newman,et al.  Random graphs with arbitrary degree distributions and their applications. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  J. Goodman Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .

[10]  Alex Bavelas,et al.  Communication Patterns in Task‐Oriented Groups , 1950 .

[11]  S. Goyal,et al.  Robust Networks , 2009 .

[12]  K. D. Jaegher,et al.  Strategic Network Disruption and Defense , 2016 .

[13]  Dan Kovenock,et al.  The Optimal Defense of Networks of Targets , 2018 .

[14]  Robert R. Moeller,et al.  Network Security , 1993, Inf. Secur. J. A Glob. Perspect..

[15]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[16]  M. Jackson,et al.  A Strategic Model of Social and Economic Networks , 1996 .

[17]  Sanders Jl,et al.  Quantitative guidelines for communicable disease control programs. , 1971 .

[18]  Antoni Calvó-Armengol,et al.  Centre De Referència En Economia Analítica Barcelona Economics Working Paper Series Working Paper Nº 178 Who's Who in Networks. Wanted: the Key Player Who's Who in Networks. Wanted: the Key Player Barcelona Economics Wp Nº 178 , 2022 .

[19]  S. Sethi,et al.  Quantitative guidelines for communicable disease control program: a complete synthesis. , 1974, Biometrics.

[20]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[21]  S. Goldman,et al.  Cost Optimization in the SIS Model of Infectious Disease with Treatment , 2002 .

[22]  Rachel Kranton,et al.  Risk-Sharing Networks , 2005 .

[23]  Yves Zenou,et al.  Peer Effects and Social Networks in Education , 2008, SSRN Electronic Journal.

[24]  S. Goyal,et al.  Attack, Defence, and Contagion in Networks , 2014 .

[25]  Fernando Vega-Redondo,et al.  Complex Social Networks: Searching in Social Networks , 2007 .

[26]  Robert E. Tarjan,et al.  Dividing a Graph into Triconnected Components , 1973, SIAM J. Comput..

[27]  P. Geoffard,et al.  Disease Eradication: Private versus Public Vaccination , 1997 .

[28]  R. Kranton,et al.  Strategic Interaction and Networks , 2010 .

[29]  D. de Meza,et al.  The Social Efficiency of Private Decisions to Enforce Property Rights , 1992, Journal of Political Economy.

[30]  F. Chung,et al.  Connected Components in Random Graphs with Given Expected Degree Sequences , 2002 .

[31]  Éva Tardos,et al.  Network games , 2004, STOC '04.

[32]  Bruce A. Reed,et al.  A Critical Point for Random Graphs with a Given Degree Sequence , 1995, Random Struct. Algorithms.

[33]  Alan R. Simon,et al.  Network security , 1994 .

[34]  B. Golub,et al.  How Homophily Affects the Speed of Learning and Best Response Dynamics , 2012 .

[35]  Yann Bramoullé,et al.  Public goods in networks , 2007, J. Econ. Theory.

[36]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[37]  M. Intriligator,et al.  Externalities and compulsary vaccinations , 1991 .