Nash equilibria for weakest target security games with heterogeneous agents

Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

5 Zitate (Scopus)

Abstract

Motivated attackers cannot always be blocked or deterred. In the physical-world security context, examples include suicide bombers and sexual predators. In computer networks, zero-day exploits unpredictably threaten the information economy and end users. In this paper, we study the conflicting incentives of individuals to act in the light of such threats. More specifically, in the weakest target game an attacker will always be able to compromise the agent (or agents) with the lowest protection level, but will leave all others unscathed. We find the game to exhibit a number of complex phenomena. It does not admit pure Nash equilibria, and when players are heterogeneous in some cases the game does not even admit mixed-strategy equilibria. Most outcomes from the weakest-target game are far from ideal. In fact, payoffs for most players in any Nash equilibrium are far worse than in the game's social optimum. However, under the rule of a social planner, average security investments are extremely low. The game thus leads to a conflict between pure economic interests, and common social norms that imply that higher levels of security are always desirable.

OriginalspracheEnglisch
TitelGame Theory for Networks - Second International ICST Conference, GAMENETS 2011, Revised Selected Papers
Seiten444-458
Seitenumfang15
DOIs
PublikationsstatusVeröffentlicht - 2012
Extern publiziertJa
Veranstaltung2nd International ICST Conference on Game Theory in Networks, GAMENETS 2011 - Shanghai, China
Dauer: 16 Apr. 201118 Apr. 2011

Publikationsreihe

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Band75 LNICST
ISSN (Print)1867-8211

Konferenz

Konferenz2nd International ICST Conference on Game Theory in Networks, GAMENETS 2011
Land/GebietChina
OrtShanghai
Zeitraum16/04/1118/04/11

Fingerprint

Untersuchen Sie die Forschungsthemen von „Nash equilibria for weakest target security games with heterogeneous agents“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren