Behavioral and Computational Aspects of Network Security Games
Ashish Hota - Purdue University
Feb 15, 2017Size: 81.3MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractIn this talk, we will leverage the framework of game theory to understand the effects of decentralized decision-making on the robustness and security of large-scale networked systems.
In the first part of this talk, we will consider a setting where each node in the network is an independent decision maker who wants to protect itself, and the probability of attack on a node is a function of the security investment by the node and its immediate neighbors in the network. Accordingly, the security investment of a node depends on its position in the network and its perception of attack probability. We will investigate the impact of certain empirically established behavioral biases, that affect how users perceive probabilities of risky outcomes, on the security investment decisions of the nodes. We will further characterize the structures of networks that maximize and minimize the expected fraction of nodes that are successfully attacked at the Nash equilibrium of the game, respectively.
In the second part of the talk, we will consider a setting where each decision maker is responsible for defending multiple nodes in the network, and strategic attacker(s) launch multi-stage attacks that spread through the network. We will show that the problem of computing the best response for a defender can be formulated as a convex optimization problem. We will then illustrate the application of this framework in problems that arise in networked cyber-physical systems.
About the SpeakerAshish R. Hota is currently a Ph.D. candidate in the School of Electrical and Computer Engineering at Purdue University. He received B.Tech and M.Tech degrees in Electrical Engineering from Indian Institute of Technology (IIT) Kharagpur in 2012. His research interests are in the areas of game theory, network economics, behavioral decision theory, security of networked systems and queueing games.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.