Abstract
Motivated attackers cannot always be blocked or deterred. In the physical-world security context, examples include suicide bombers and sexual predators. In computer networks, zero-day exploits unpredictably threaten the information economy and end users. In this paper, we study the conflicting incentives of individuals to act in the light of such threats. More specifically, in the weakest target game an attacker will always be able to compromise the agent (or agents) with the lowest protection level, but will leave all others unscathed. We find the game to exhibit a number of complex phenomena. It does not admit pure Nash equilibria, and when players are heterogeneous in some cases the game does not even admit mixed-strategy equilibria. Most outcomes from the weakest-target game are far from ideal. In fact, payoffs for most players in any Nash equilibrium are far worse than in the game's social optimum. However, under the rule of a social planner, average security investments are extremely low. The game thus leads to a conflict between pure economic interests, and common social norms that imply that higher levels of security are always desirable.
| Original language | English |
|---|---|
| Title of host publication | Game Theory for Networks - Second International ICST Conference, GAMENETS 2011, Revised Selected Papers |
| Pages | 444-458 |
| Number of pages | 15 |
| DOIs | |
| State | Published - 2012 |
| Externally published | Yes |
| Event | 2nd International ICST Conference on Game Theory in Networks, GAMENETS 2011 - Shanghai, China Duration: 16 Apr 2011 → 18 Apr 2011 |
Publication series
| Name | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering |
|---|---|
| Volume | 75 LNICST |
| ISSN (Print) | 1867-8211 |
Conference
| Conference | 2nd International ICST Conference on Game Theory in Networks, GAMENETS 2011 |
|---|---|
| Country/Territory | China |
| City | Shanghai |
| Period | 16/04/11 → 18/04/11 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 3 Good Health and Well-being
Keywords
- Economics
- Game Theory
- Heterogeneity
- Security
Fingerprint
Dive into the research topics of 'Nash equilibria for weakest target security games with heterogeneous agents'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver