A Network Game with Attackers and a Defender
2007, Algorithmica
Abstract
Consider an information network with threats called attackers; each attacker uses a probability distribution to choose a node of the network to damage. Opponent to the attackers is a protector entity called defender; the defender scans and cleans from attacks some part of the network (in particular, a link), which it chooses independently using its own probability distribution. Each attacker wishes to maximize the probability of escaping its cleaning by the defender; towards a conflicting objective, the defender aims at maximizing the expected number of attackers it catches. We model this network security scenario as a non-cooperative strategic game on graphs. We are interested in its associated Nash equilibria, where no network entity can unilaterally increase its local objective. We obtain the following results: • We obtain an algebraic characterization of (mixed) Nash equilibria. • No (non-trivial) instance of the graph-theoretic game has a pure Nash equilibrium. This is an immediate consequence of some covering properties we prove for the supports of the players in all (mixed) Nash equilibria. • We coin a natural subclass of mixed Nash equilibria, which we call Matching Nash equilibria, for this graph-theoretic game. Matching Nash equilibria are defined by enriching the necessary covering properties we proved with some additional conditions involving other structural parameters of graphs, such as Independent Sets.-We derive a characterization of graphs admitting Matching Nash equilibria. All such graphs have an Expanding Independent Set. The characterization enables a non-deterministic, polynomial time algorithm to compute a Matching Nash equilibrium for any such graph.-Bipartite graphs are shown to satisfy the characterization. So, using a polynomial time algorithm to compute a Maximum Matching for a bipartite graph, we obtain, as our main result, a deterministic, polynomial time algorithm to compute a Matching Nash equilibrium for any instance of the game with a bipartite graph.
References (27)
- N. Alon, R. M. Karp, D. Peleg and D. West, "A Graph-Theoretic Game and its Applica- tion to the k-Server Problem", SIAM Journal on Computing, Vol. 24, No. 1, pp. 78-100, February 1995.
- J. Aspnes, K. Chang and A. Yampolskiy, "Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Problem", Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 43-52, January 2005.
- A. S. Asratian, T. M. J. Denley and R. Häggkvist, Bipartite Graphs and Their Applications, Cambridge Tracts in Mathematics 131, Cambridge University Press, 1998.
- V. Bonifaci, U. Di Iorio and L. Laura, "On the Complexity of Uniformly Mixed Nash Equilibria and Related Regular Subgraph Problems", Proceedings of the 15th International Symposium on Fundamentals of Computation Theory, M. Liskiewicz and R. Reischuk eds., pp. 197-208, Vol. 3623, Lecture Notes in Computer Science, Springer-Verlag, August 2005.
- V. Bonifaci, U. Di Iorio and L. Laura, "New Results on the Complexity of Uniformly Mixed Nash Equilibria", Proceedings of the First International Workshop on Internet and Network Economics, X. Deng and Y. Ye eds., pp. 1023-1032, Vol. 3828, Lecture Notes in Computer Science, Springer-Verlag, December 2005.
- E. R. Cheswick and S. M. Bellovin, Firewalls and Internet Security, Addison-Wesley, 1994.
- E. Egerváry, "On Combinatorial Properties of Matrices" (in Hungarian with German sum- mary), Matematikai és Fizikai Lapok, Vol. 38, pp. 16-28, 1931.
- T. Feder and R. Motwani. "Clique Compressions, Graph Partitions and Speeding-up Algo- rithms", Journal of Computer and System Sciences, Vol. 51, No. 2, pp. 261-272, October 1995.
- M. Franklin, P. Alto, Z. Galil and M. Yung, "Eavesdropping Games: a Graph-Theoretic Approach to Privacy in Distributed Systems", Journal of the ACM, Vol. 47, No. 2, pp. 225-243, March 2000.
- G. Frobenius, " Über Zerlegbare Determinanten", Sitzungsber der Königlich, Preussis-chen Akademie der Wissenschaften, Vol. XVIII, pp. 274-277, 1917.
- M. Gelastou, M. Mavronicolas, V. Papadopoulou, A. Philippou and P. Spirakis, "The Power of the Defender", CD-ROM Proceedings of the 2nd International Workshop on Incentive-Based Computing, in conjunction with the 26th IEEE International Conference on Distributed Computing, July 2006.
- P. Hall, "On Representation of Subsets", Journal of the London Mathematical Society, Second Series, Vol. 10, pp. 26-30, 1935.
- M. Kearns and L. Ortiz, "Algorithms for Interdependent Security Games", Advances in Neural Information Processing Systems, Vol. 16, S. Thrun, L. Saul and B. Schölkopf eds., The MIT Press, 2004.
- D. König, "Graphen und Matrizen", Matematikai és Fizikai Lapok, Vol. 38, pp. 116-119, 1931.
- D. König, Theorie der Endlichen und Unendlichen Graphen, Akademische Verlagsge- sellschaft, 1936.
- T. Markham and C. Payne, "Security at the Network Edge: A Distributed Firewall Ar- chitecture", Proceedings of the 2nd DARPA Information Survivability Conference and Ex- position, Vol. 1, pp. 279-286, June 2001.
- M. Mavronicolas, V. Papadopoulou, A. Philippou and P. Spirakis, "A Graph-Theoretic Network Security Game", Proceedings of the 1st International Workshop on Internet and Network Economics, X. Deng and Y. Ye eds., pp. 969-978, Vol. 3828, Lecture Notes in Computer Science, Springer-Verlag, December 2005.
- M. Mavronicolas, L. Michael, V. Papadopoulou, A. Philippou and P. Spirakis, "The Price of Defense", Proceedings of the 31st International Symposium on Mathematical Foundations of Computer Science, R. Královič and P. Urzyczyn eds., pp. 717-728, Vol. 4162, Lecture Notes in Computer Science, Springer-Verlag, August/September 2006.
- M. Mavronicolas, V. Papadopoulou, G. Persiano, A. Philippou and P. Spirakis, "The Price of Defense and Fractional Matchings", Proceedings of the 8th International Conference on Distributed Computing and Networking, December 2006, to appear.
- M. Mavronicolas and P. Spirakis, Algorithmic Game Theory, Springer-Verlag, 2006, to appear.
- J. F. Nash, "Equilibrium Points in N-Person Games", Proceedings of the National Acanemy of Sciences of the United States of America, pp. 48-49, Vol. 36, 1950.
- J. F. Nash, "Non-Cooperative Games", Annals of Mathematics, Vol. 54, No. 2, pp. 286-295, 1951.
- J. von Neumann, "Zur Theorie der Gesellschaftsspiele", Mathematische Annalen, Vol. 100, pp. 295-320, 1928.
- M. Osborne and A. Rubinstein, A Course in Game Theory, The MIT Press, 1994.
- E. H. Spafford, "The Internet Worm: Crisis and Aftermath", Communications of the ACM, Vol. 32, No. 6, pp. 678-687, June 1989.
- W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, Third edition, 2003.
- D. B. West, Introduction to Graph Theory, Prentice Hall, Second edition, 2001.