Advanced Search
MyIDEAS: Login to save this paper or follow this series

Attack, Defense and Contagion in Networks

Contents:

Author Info

  • S. Goyal
  • A. Vigier

Abstract

Connections between individuals facilitate the exchange of goods, resources and information and create benefits. These connections may be exploited by adversaries to spread their attacks as well. What is the optimal way to design and defend networks in the face of attacks We develop a model with a Designer and an Adversary. The Designer moves first and chooses a network and an allocation of defense resources across nodes. The Adversary then allocates attack resources on nodes and determines how successful attacks should navigate the network. Our main result is that, in a wide variety of circumstances, a star network with all defense resources allocated to the central hub node is optimal for the Designer. The Adversary targets undefended peripheral nodes; upon capture of these nodes the resources mount a concerted attack on the center.

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://www.econ.cam.ac.uk/research/repec/cam/pdf/cwpe1327.pdf
Download Restriction: no

Bibliographic Info

Paper provided by Faculty of Economics, University of Cambridge in its series Cambridge Working Papers in Economics with number 1327.

as in new window
Length:
Date of creation: 15 Aug 2013
Date of revision:
Handle: RePEc:cam:camdae:1327

Contact details of provider:
Web page: http://www.econ.cam.ac.uk/index.htm

Related research

Keywords: Networks; computer security; Tullock contests; connectivity;

This paper has been announced in the following NEP Reports:

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Heski Bar-Isaac & Mariagiovanna Baccara, 2006. "How to Organize Crime," Working Papers 06-07, New York University, Leonard N. Stern School of Business, Department of Economics.
  2. Matthew O. Jackson & Asher Wolinsky, 1995. "A Strategic Model of Social and Economic Networks," Discussion Papers 1098R, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
  3. Roberto Serrano & Roland Pongou, 2009. "A Dynamic Theory Of Fidelity Networks With An Application To The Spread Of Hiv/Aids," Working Papers wp2009_0909, CEMFI.
  4. Skaperdas, Stergios, 1996. "Contest Success Functions," Economic Theory, Springer, vol. 7(2), pages 283-90, February.
  5. Sanjeev Goyal, 2007. "Introduction to Connections: An Introduction to the Economics of Networks
    [Connections: An Introduction to the Economics of Networks]
    ," Introductory Chapters, Princeton University Press.
  6. Konrad, Kai A., 2009. "Strategy and Dynamics in Contests," OUP Catalogue, Oxford University Press, number 9780199549603, September.
  7. Venkatesh Bala & Sanjeev Goyal, 2000. "A Noncooperative Model of Network Formation," Econometrica, Econometric Society, vol. 68(5), pages 1181-1230, September.
  8. Vega-Redondo,Fernando, 2007. "Complex Social Networks," Cambridge Books, Cambridge University Press, number 9780521857406, April.
  9. Kremer, Michael, 1996. "Integrating Behavioral Choice into Epidemiological Models of AIDS," The Quarterly Journal of Economics, MIT Press, vol. 111(2), pages 549-73, May.
  10. Dan Kovenock J. & Brian Roberson, 2010. "Conflicts with Multiple Battlefields," CESifo Working Paper Series 3165, CESifo Group Munich.
  11. Michael Kremer, 1996. "Integrating Behavioral Choice into Epidemiological Models of the AIDS Epidemic," NBER Working Papers 5428, National Bureau of Economic Research, Inc.
  12. Sergiu Hart, 2006. "Discrete Colonel Blotto and General Lotto Games," Discussion Paper Series dp434, The Center for the Study of Rationality, Hebrew University, Jerusalem.
  13. Powell, Robert, 2009. "Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack," Games and Economic Behavior, Elsevier, vol. 67(2), pages 611-615, November.
  14. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
  15. Luis Garicano, 2000. "Hierarchies and the Organization of Knowledge in Production," Journal of Political Economy, University of Chicago Press, vol. 108(5), pages 874-904, October.
  16. Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
  17. Geoffard, Pierre-Yves & Philipson, Tomas, 1997. "Disease Eradication: Private versus Public Vaccination," American Economic Review, American Economic Association, vol. 87(1), pages 222-30, March.
  18. Vega-Redondo,Fernando, 2007. "Complex Social Networks," Cambridge Books, Cambridge University Press, number 9780521674096, April.
Full references (including those not matched with items on IDEAS)

Citations

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:cam:camdae:1327. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Howard Cobb).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.