Skip to main content

Strategic Network Formation with Attack and Immunization

  • Conference paper
  • First Online:
Web and Internet Economics (WINE 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10123))

Included in the following conference series:

Abstract

Strategic network formation arises in settings where agents receive some benefit from their connectedness to other agents, but also incur costs for forming these links. We consider a new network formation game that incorporates an adversarial attack, as well as immunization or protection against the attack. An agent’s network benefit is the expected size of her connected component post-attack, and agents may also choose to immunize themselves from attack at some additional cost. Our framework can be viewed as a stylized model of settings where reachability rather than centrality is the primary interest (as in many technological networks such as the Internet), and vertices may be vulnerable to attacks (such as viruses), but may also reduce risk via potentially costly measures (such as an anti-virus software).

Our main theoretical contributions include a strong bound on the edge density at equilibrium. In particular, we show that under a very mild assumption on the adversary’s attack model, every equilibrium network contains at most only \(2n-4\) edges for \(n \ge 4\), where n denotes the number of agents and this upper bound is tight. We also show that social welfare does not significantly erode: every non-trivial equilibrium with respect to several adversarial attack models asymptotically has social welfare at least as that of any equilibrium in the original attack-free model.

We complement our sharp theoretical results by a behavioral experiment on our game with over 100 participants, where despite the complexity of the game, the resulting network was surprisingly close to equilibrium.

The full version of this paper with all the omitted details is available at https://arxiv.org/abs/1511.05196.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The spread of the initial attack to reachable non-immunized vertices is deterministic in our model, and the protection of immunized vertices is absolute. It is also natural to consider relaxations such as probabilistic attack spreading and imperfect immunization, as well as generalizations such as multiple initial attack vertices. However, as we shall see, even the basic model we study here exhibits substantial complexity. We refer the reader to the full version for a discussion on possible extensions/relaxations.

  2. 2.

    The index \(k'\) in the definition of \(\mathcal {T}\) satisfies \(k'\le k\) (see k in the definition of \(\mathcal {V}\)).

  3. 3.

    If a vertex is killed, the size of her connected component is defined to be 0.

  4. 4.

    Lenzner [17] introduced this equilibrium concept under the name greedy equilibrium.

  5. 5.

    Vertex v is k-critical in a connected network if the size of the largest connected component after removing v is k.

  6. 6.

    We represent immunized and vulnerable vertices as blue and red, respectively. Although we treat the networks as undirected (the benefits and risks are bilateral), we use directed edges in some figures to denote which player purchased the edge.

  7. 7.

    Kliemann [15] proved Theorem 1 with a different technique for a density bound of \(2n-1\) for all n.

  8. 8.

    We view this condition as the most interesting regime, since in natural circumstances we do not expect the edge or immunization costs to grow with the population size.

References

  1. Alpcan, T., Baar, T.: Network security: a decision and game-theoretic approach, 1st edn. Cambridge University Press, Cambridge (2010)

    Book  Google Scholar 

  2. Anderson, R.: Security engineering: a guide to building dependable distributed systems, 2nd edn. Wiley Publishing (2008)

    Google Scholar 

  3. Aspnes, J., Chang, K., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum of squares partition problem. J. Comput. Syst. Sci. 72(6), 1077–1093 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  4. Bala, V., Goyal, S.: A noncooperative model of network formation. Econometrica 68(5), 1181–1230 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  5. Bloch, F., Jackson, M.: Definitions of equilibrium in network formation games. Int. J. Game Theo. 34(3), 305–318 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  6. Blume, L., Easley, D., Kleinberg, J., Kleinberg, R., Tardos, É.: Network formation in the presence of contagious risk. In: EC, pp. 1–10 (2011)

    Google Scholar 

  7. Cerdeiro, D., Dziubinski, M., Goyal, S.: Contagion risk and network design. Working Paper (2014)

    Google Scholar 

  8. Cunningham, W.: Optimal attack and reinforcement of a network. J. ACM 32(3), 549–561 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  9. Fabrikant, A., Luthra, A., Maneva, E., Papadimitriou, C., Shenker, S.: On a network creation game. In: PODC, pp. 347–351 (2003)

    Google Scholar 

  10. Goyal, S.: Connections: an introduction to the economics of networks. Princeton University Press, Princeton (2007)

    Google Scholar 

  11. Goyal, S.: Conflicts and Networks. The Oxford Handbook on the Economics of Networks (2015)

    Google Scholar 

  12. Gueye, A., Walrand, J., Anantharam, V.: A network topology design game, how to choose communication links in an adversarial environment. In: GameNets (2011)

    Google Scholar 

  13. Ihde, S., Keßler, C., Neubert, S., Schumann, D., Lenzner, P., Friedrich, T.: Efficient best-response computation for strategic network formation under attack. CoRR abs/1610.01861 (2016)

    Google Scholar 

  14. Kearns, M., Ortiz, L.: Algorithms for interdependent security games. In: NIPS, pp. 561–568 (2003)

    Google Scholar 

  15. Kliemann, L.: The price of anarchy for network formation in an adversary model. Games 2(3), 302–332 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  16. Laszka, A., Szeszlér, D., Buttyán, L.: Linear loss function for the network blocking game: an efficient model for measuring network robustness and link criticality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 152–170. Springer Berlin Heidelberg, Berlin, Heidelberg (2012). doi:10.1007/978-3-642-34266-0_9

    Chapter  Google Scholar 

  17. Lenzner, P.: Greedy selfish network creation. In: Goldberg, P.W. (ed.) WINE 2012. LNCS, vol. 7695, pp. 142–155. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35311-6_11

    Chapter  Google Scholar 

  18. Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: HICSS, pp. 1–10 (2010)

    Google Scholar 

Download references

Acknowledgments

We thank Chandra Chekuri, Yang Li and Aaron Roth for useful suggestions. We also thank anonymous reviewers for detailed suggestions regarding some of the proofs. Sanjeev Khanna is supported in part by National Science Foundation grants CCF-1552909, CCF-1617851, and IIS-1447470.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shahin Jabbari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag GmbH Germany

About this paper

Cite this paper

Goyal, S., Jabbari, S., Kearns, M., Khanna, S., Morgenstern, J. (2016). Strategic Network Formation with Attack and Immunization. In: Cai, Y., Vetta, A. (eds) Web and Internet Economics. WINE 2016. Lecture Notes in Computer Science(), vol 10123. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54110-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-54110-4_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-54109-8

  • Online ISBN: 978-3-662-54110-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics