Attack, Defense and Contagion in Networks
Connections between individuals facilitate the exchange of goods, resources and information and create benefits. These connections may be exploited by adversaries to spread their attacks as well. What is the optimal way to design and defend networks in the face of attacks We develop a model with a Designer and an Adversary. The Designer moves first and chooses a network and an allocation of defense resources across nodes. The Adversary then allocates attack resources on nodes and determines how successful attacks should navigate the network. Our main result is that, in a wide variety of circumstances, a star network with all defense resources allocated to the central hub node is optimal for the Designer. The Adversary targets undefended peripheral nodes; upon capture of these nodes the resources mount a concerted attack on the center.
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Matthew O. Jackson & Asher Wolinsky, 1994.
"A Strategic Model of Social and Economic Networks,"
1098, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
321307000000000158, UCLA Department of Economics.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, 08.
- Skaperdas, Stergios, 1996.
"Contest Success Functions,"
Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-90, February.
- Antonio Cabrales & Piero Gottardo & Fernando Vega-Redondo, 2013.
"Risk-Sharing and Contagion in Networks,"
Economics Working Papers
ECO2013/01, European University Institute.
- Antonio Cabrales & Piero Gottardi & Fernando Vega-Redondo, 2014. "Risk-Sharing and Contagion in Networks," CESifo Working Paper Series 4715, CESifo Group Munich.
- Vega-Redondo, Fernando & Gottardi, Piero & Cabrales, Antonio, 2013. "Risk-sharing and contagion in networks," UC3M Working papers. Economics we1301, Universidad Carlos III de Madrid. Departamento de Economía.
- Piero Gottardi & Fernando Vega-Redondo & Antonio Cabrales, 2014. "Risk Sharing and Contagion in Networks," 2014 Meeting Papers 278, Society for Economic Dynamics.
- Antonio Cabrales & Piero Gottardi & Fernando Vega-Redondo, 2014. "Risk-sharing and contagion in networks," Working Papers 2014-18, FEDEA.
- Vega-Redondo,Fernando, 2007. "Complex Social Networks," Cambridge Books, Cambridge University Press, number 9780521674096, November.
- Roland Pongou & Roberto Serrano, 2009.
"A Dynamic Theory of Fidelity Networks with an Application to the Spread of HIV/AIDS,"
2009-2, Brown University, Department of Economics.
- Roland Pongou & Roberto Serrano, 2009. "A dynamic theory of fidelity networks with an application to the spread of HIV/AIDS," Working Papers 2009-03, Instituto Madrileño de Estudios Avanzados (IMDEA) Ciencias Sociales.
- Roberto Serrano & Roland Pongou, 2009. "A Dynamic Theory Of Fidelity Networks With An Application To The Spread Of Hiv/Aids," Working Papers wp2009_0909, CEMFI.
- Michael Kremer, 1996. "Integrating Behavioral Choice into Epidemiological Models of AIDS," The Quarterly Journal of Economics, Oxford University Press, vol. 111(2), pages 549-573.
- Venkatesh Bala & Sanjeev Goyal, 2000. "A Noncooperative Model of Network Formation," Econometrica, Econometric Society, vol. 68(5), pages 1181-1230, September.
- Luis Garicano, 2000. "Hierarchies and the Organization of Knowledge in Production," Journal of Political Economy, University of Chicago Press, vol. 108(5), pages 874-904, October.
- Heski Bar-Isaac & Mariagiovanna Baccara, 2006. "How to Organize Crime," Working Papers 06-07, New York University, Leonard N. Stern School of Business, Department of Economics.
- Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
- Sanjeev Goyal, 2007.
"Introduction to Connections: An Introduction to the Economics of Networks
[Connections: An Introduction to the Economics of Networks]," Introductory Chapters, Princeton University Press.
- Sergiu Hart, 2008.
"Discrete Colonel Blotto and General Lotto games,"
International Journal of Game Theory,
Springer;Game Theory Society, vol. 36(3), pages 441-460, March.
- Sergiu Hart, 2006. "Discrete Colonel Blotto and General Lotto Games," Levine's Bibliography 321307000000000532, UCLA Department of Economics.
- Sergiu Hart, 2006. "Discrete Colonel Blotto and General Lotto Games," Discussion Paper Series dp434, The Federmann Center for the Study of Rationality, the Hebrew University, Jerusalem.
- Powell, Robert, 2009. "Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack," Games and Economic Behavior, Elsevier, vol. 67(2), pages 611-615, November.
- Michael Kremer, 1996. "Integrating Behavioral Choice into Epidemiological Models of the AIDS Epidemic," NBER Working Papers 5428, National Bureau of Economic Research, Inc.
- Vega-Redondo,Fernando, 2007. "Complex Social Networks," Cambridge Books, Cambridge University Press, number 9780521857406, November.
- N. Lesca, 2010. "Introduction," Post-Print halshs-00640602, HAL.
- Geoffard, Pierre-Yves & Philipson, Tomas, 1997. "Disease Eradication: Private versus Public Vaccination," American Economic Review, American Economic Association, vol. 87(1), pages 222-30, March.
- Dan Kovenock & Brian Roberson, 2010.
"Conflicts with Multiple Battlefields,"
Purdue University Economics Working Papers
1246, Purdue University, Department of Economics.
- Konrad, Kai A., 2009. "Strategy and Dynamics in Contests," OUP Catalogue, Oxford University Press, number 9780199549603, December.
When requesting a correction, please mention this item's handle: RePEc:cam:camdae:1327. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Jake Dyer)
If references are entirely missing, you can add them using this form.