SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
Inoculation Strategies for
      Victims of Viruses and
      the Sum-of-Squares
      Partition Problem
James Aspnes, Kevin Chang,
 and Aleksandr Yampolskiy
     (Yale University)
        Copyright (C) 2005 by Aleksandr
                  Yampolskiy
Outline

Ø Motivation
n Our Model
n Nash Strategies
n Optimal Strategies
n Sum-of-Squares Partition Problem
n Conclusion
               Copyright (C) 2005 by Aleksandr
                         Yampolskiy
Question: Will you install anti-virus
software?


               Norton AntiVirus 2005 = $49.95




                Value of your data = $350.00
                Infection probability = 1/10
                Expected loss = $35.00
             Copyright (C) 2005 by Aleksandr
                       Yampolskiy
Answer: Probably not.


            Norton AntiVirus 2005 = $49.95




             Value of your data = $350.00
             Infection probability = 1/10
             Expected loss = $35.00
          Copyright (C) 2005 by Aleksandr
                    Yampolskiy
This selfish behavior…
n   …fails to achieve the social optimum.




                  Copyright (C) 2005 by Aleksandr
                            Yampolskiy
What if instead…
n   …a benevolent dictator decided which
    computers install an anti-virus?




                                                     Center node
                                                     must install
                                                     an anti-virus
                                                       or else!
                   Copyright (C) 2005 by Aleksandr
                             Yampolskiy
Outline

n Motivation
Ø Our Model
n Nash Strategies
n Optimal Strategies
n Sum-of-Squares Partition Problem
n Conclusion
               Copyright (C) 2005 by Aleksandr
                         Yampolskiy
Our Model
n The network is an undirected graph
  G = (V,E).
n Installing anti-virus software is a single
  round non-cooperative game.
n The players are the network nodes:
  V = {0,1,…,n-1}.


                  Copyright (C) 2005 by Aleksandr
                            Yampolskiy
Our Model : Strategies
n Each node has two actions: do nothing or
  inoculate itself.
n Strategy profile                 summarizes
  players’ choices.
n ai = probability that node i installs anti-
  virus software


                Copyright (C) 2005 by Aleksandr
                          Yampolskiy
Our Model : Attack Model
n After the nodes choose their strategies,
  the adversary picks a starting point for
  infection uniformly at random
n Node i gets infected if it has no anti-virus
  software installed and if any of its
  neighbors become infected.


                 Copyright (C) 2005 by Aleksandr
                           Yampolskiy
Our Model : Attack Model (cont.)
n   Example: Only node 3 installs anti-virus
    software. Adversary chooses to infect
    node 2.
                0                             1




                2                             3




                                4              5
                    Copyright (C) 2005 by Aleksandr
                              Yampolskiy
Our Model : Attack Graph


 0                1                                     0               1




 2                3                                     2               3




        4         5                                             4       5


network graph G       Copyright (C) 2005 by Aleksandr
                                Yampolskiy
                                                        attack graph Ga= G - Ia
Our Model : Individual Costs
n Anti-virus software costs C. Expected loss
  from virus is L.
n Cost of strategy    to node i:


n   Here, pi(a) = Pr[i is infected | i does not
    install an anti-virus]

                   Copyright (C) 2005 by Aleksandr
                             Yampolskiy
Our Model : Social Cost
n   Social cost of    is simply a sum of
    individual costs:




                  Copyright (C) 2005 by Aleksandr
                            Yampolskiy
Outline

n Motivation
n Our Model
Ø Nash Strategies
n Optimal Strategies
n Sum-of-Squares Partition Problem
n Conclusion
               Copyright (C) 2005 by Aleksandr
                         Yampolskiy
Nash Strategies
n   Def: Strategy profile      is in Nash
    equilibrium if no node can improve its
    payoff by switching to a different strategy:
      for i = 0,...,n-1 and any x 2 [0,1],




n   Fact: Nash strategies do not optimize total
    social cost (cf. Prisoner’s Dilemma)
                   Copyright (C) 2005 by Aleksandr
                             Yampolskiy
Nash Strategies (cont.)

Thm: There is a threshold t=Cn/L such that each
  node in a Nash equilibrium
  ¨ will install an anti-virus if it would otherwise end up in
    a component of expected size > t
  ¨ will not install an anti-virus if it would end up in a
    component of expected size < t.
  ¨ is indifferent between installing and not installing
    when the expected size = t.

                      Copyright (C) 2005 by Aleksandr
                                Yampolskiy
Nash Strategies (cont.)
n   Corollary: Let t = Cn/L. Then a pure
    strategy is a Nash equilibrium if and only
    if
    ¨ Every  component in Ga has size · t
    ¨ Inserting any secure node j and its edges into
      Ga yields a component of size ¸ t.



                   Copyright (C) 2005 by Aleksandr
                             Yampolskiy
Nash Strategies (cont.)
n   Example: Let C=0.5,L=1 so that t=Cn/L=2.5.
    Then            is not a Nash equilibrium.



       0         1                          0              1



       2         3                          2              3



            4    5                                     4   5
                     Copyright (C) 2005 by Aleksandr
      network graph G          Yampolskiy    attack graph Ga= G - Ia
Nash Strategies (cont.)
Thm: It is NP-hard to compute a pure Nash
  equilibrium with lowest (resp., highest) cost.
Proof sketch: By reduction to VERTEX COVER
  (resp., INDEPENDENT DOMINATING SET) .
  ¨   Set C, L so that t=Cn/L=1.5.
  ¨   In a Nash equilibrium, (a) every vulnerable node
      has all neighbors secure; (b) every secure node
      has an insecure neighbor

                    Copyright (C) 2005 by Aleksandr
                              Yampolskiy
Nash Strategies (cont.)
n If V’µ V is a minimal vertex cover, then
  installing software on its nodes satisfies
  (a) because V’ is a vertex cover and (b)
  because V’ is minimal.
n Conversely, if V’ are secure nodes in a
  Nash equilibrium, then V’ is a vertex cover
  by (a).

                Copyright (C) 2005 by Aleksandr
                          Yampolskiy
Nash Strategies (cont.)
n Nash Theorem guarantees our game has
  a mixed Nash equilibrium.
n But does it make sense talking about pure
  Nash equilibria?




               Copyright (C) 2005 by Aleksandr
                         Yampolskiy
Nash Strategies (cont.)
Yes, it does!

Thm: If at each step some node with
 suboptimal strategy switches its strategy,
 the system converges to a pure Nash
 equilibrium in · 2n steps.


                Copyright (C) 2005 by Aleksandr
                          Yampolskiy
Price of Anarchy [KP99]
n Price of anarchy measures how far away a
  Nash equilibrium can be from the social
  optimum
n Formally, it is the worst-case ratio between
  cost of Nash equilibrium and cost of social
  optimum
n For network G and costs C, L, we denote it:


                Copyright (C) 2005 by Aleksandr
                          Yampolskiy
Price of Anarchy (cont.)
Lower Bound: For a star graph K1,n,
  ρ(G, C, L) = n/2.
Upper Bound: For any graph G and any C, L,
  ρ(G, C, L)· n.


Thm: Price of anarchy in our game is
 ρ(G, C, L) = Θ(n).


                Copyright (C) 2005 by Aleksandr
                          Yampolskiy
Price of Anarchy (cont.)
Proof for lower bound:
Consider a star graph K1,n.
Let C=L(n-1)/n so that t=Cn/L=n-1.


                                  1
                      n-1                    2

                n-2                                 3
                                 0


                                 …
                  Copyright (C) 2005 by Aleksandr
                            G = K1,n
                            Yampolskiy
Price of Anarchy (cont.)
Then,                            is an optimum strategy with
  cost C+L(n-1)/n.



                  1                                                        1
          n-1              2                                       n-1         2

    n-2                           3                          n-2                   3
                  0                                                        0


                  …                                                        …
                           Copyright (C) 2005 by Aleksandr
                G = K1,n             Yampolskiy                          Ga*
Price of Anarchy (cont.)
And                 is worst-cost Nash with
  cost C+L(n-1)2/n.



                  1                                                1
          n-1              2                                 n-1         2

    n-2                           3                   n-2                    3
                  0                                                0


                  …                                                …
                           Copyright (C) 2005 by Aleksandr
                G = K1,n             Yampolskiy                    Ga*
Price of Anarchy (cont.)
n   Therefore,




n   Proof for upper bound uses similar ideas.
                    Copyright (C) 2005 by Aleksandr
                              Yampolskiy
Outline

n Motivation
n Our Model
n Nash Strategies
Ø Optimal Strategies
n Sum-of-Squares Partition Problem
n Conclusion
               Copyright (C) 2005 by Aleksandr
                         Yampolskiy
Optimal Strategies
n So, allowing users to selfishly choose
  whether or not to install anti-virus software
  may be very inefficient
n Instead, let’s have a benevolent dictator
  compute and impose a solution
  maximizing overall welfare


                 Copyright (C) 2005 by Aleksandr
                           Yampolskiy
Optimal Strategies (cont.)
n   We can show:
    Thm: Let t=Cn/L. If     is an optimum
    strategy, then every component in Ga has
    size · max(1, (t+1)/2).

n   Unfortunately,
    Thm: It is NP-hard to compute an optimal
    strategy.


                  Copyright (C) 2005 by Aleksandr
                            Yampolskiy
Optimum Strategies (cont.)
n   Naturally, we consider approximating the
    solution.


                                                   k1=2
     0          1                             0               1   secure
                                                                  nodes
     2          3                             2               3   Ia

                                                                  k2=2
           4    5                                         4   5

    network graph G                         attack graph Ga=G - Ia
                      Copyright (C) 2005 by Aleksandr
                                Yampolskiy
Optimum Strategies (cont.)
n   For pure strategy          , we have:




                                               we concentrate on
                                               this part
                  Copyright (C) 2005 by Aleksandr
                            Yampolskiy
Outline

n Motivation
n Our Model
n Nash Strategies
n Optimal Strategies
Ø Sum-of-Squares Partition Problem
n Conclusion
               Copyright (C) 2005 by Aleksandr
                         Yampolskiy
Sum-of-Squares Partition
n We guess that there are m=|Ia| secure
  nodes.
n Problem: By removing a set of at most
  m · n nodes, partition the graph into
  components H1, …, Hk such that ∑i |Hi|2 is
  minimum.


                Copyright (C) 2005 by Aleksandr
                          Yampolskiy
Sum-of-Squares Partition (cont.)
Thm: We can find a set of O(log2 n)¢m nodes whose
  removal partitions the graph into components
  H1,…,Hk such that ∑i |Hi|2 · O(1)¢OPT.
Proof sketch: We use the Leighton-Rao sparse cut
  algorithm [LR99]. The approach is similar to greedy
  log n approximation algorithm for set cover. We
  repeatedly remove the node cut that gives the best
  per-node benefit.

                   Copyright (C) 2005 by Aleksandr
                             Yampolskiy
Outline

n Motivation
n Our Model
n Nash Strategies
n Optimal Strategies
n Sum-of-Squares Partition Problem
Ø Conclusion
               Copyright (C) 2005 by Aleksandr
                         Yampolskiy
Conclusion
n   We proposed a simple game for modeling
    containment of viruses in a network.
n   Nash equilibria of our game have a simple
    characterization.
n   We showed that, in the worst case, they can be
    far off from the optimal solution.
n   However, a near-optimal deployment of anti-
    virus software can be computed by reduction to
    the sum-of-squares partition problem.

                   Copyright (C) 2005 by Aleksandr
                             Yampolskiy
Open Problems
n   Introduce a discount (or taxation) mechanism into the
    system.
n   Suppose nodes can lie about their level of security (or
    about who their neighbors are). How do we make truth-
    telling a dominant strategy?
n   Consider a “smart” adversary who targets the biggest
    graph component.
n   How do we evaluate what C and L are?
n   Is there an algorithm for the sum-of-squares partition
    problem with a better approximation ratio?

                       Copyright (C) 2005 by Aleksandr
                                 Yampolskiy
Acknowledgments
Joan Feigenbaum, Hong Jiang, and Yang
Richard Yang




              Copyright (C) 2005 by Aleksandr
                        Yampolskiy
Thank you!




             Copyright (C) 2005 by Aleksandr
                       Yampolskiy

Contenu connexe

En vedette

Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelementAleksandr Yampolskiy
 
Class powerpoint
Class powerpointClass powerpoint
Class powerpointncoggan
 
Urbanization
UrbanizationUrbanization
Urbanizationncoggan
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysAleksandr Yampolskiy
 
Spreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemSpreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemAleksandr Yampolskiy
 
New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionAleksandr Yampolskiy
 
Causes of dropping_out
Causes of dropping_outCauses of dropping_out
Causes of dropping_outisaflo
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItAleksandr Yampolskiy
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 

En vedette (17)

Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelement
 
Class powerpoint
Class powerpointClass powerpoint
Class powerpoint
 
Urbanization
UrbanizationUrbanization
Urbanization
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
Search Engine Marketing
Search Engine MarketingSearch Engine Marketing
Search Engine Marketing
 
Spreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemSpreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape Problem
 
New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome Session
 
Causes of dropping_out
Causes of dropping_outCauses of dropping_out
Causes of dropping_out
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
 
WordPress Security
WordPress Security WordPress Security
WordPress Security
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
OWASP Much ado about randomness
OWASP Much ado about randomnessOWASP Much ado about randomness
OWASP Much ado about randomness
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 

Plus de Aleksandr Yampolskiy

"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter BellAleksandr Yampolskiy
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsAleksandr Yampolskiy
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingAleksandr Yampolskiy
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsAleksandr Yampolskiy
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Aleksandr Yampolskiy
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networksAleksandr Yampolskiy
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topologyAleksandr Yampolskiy
 

Plus de Aleksandr Yampolskiy (9)

"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter Bell
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networks
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topology
 
Business Case Studies
Business Case Studies Business Case Studies
Business Case Studies
 

Dernier

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Dernier (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Inoculation strategies for victims of viruses

  • 1. Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Aspnes, Kevin Chang, and Aleksandr Yampolskiy (Yale University) Copyright (C) 2005 by Aleksandr Yampolskiy
  • 2. Outline Ø Motivation n Our Model n Nash Strategies n Optimal Strategies n Sum-of-Squares Partition Problem n Conclusion Copyright (C) 2005 by Aleksandr Yampolskiy
  • 3. Question: Will you install anti-virus software? Norton AntiVirus 2005 = $49.95 Value of your data = $350.00 Infection probability = 1/10 Expected loss = $35.00 Copyright (C) 2005 by Aleksandr Yampolskiy
  • 4. Answer: Probably not. Norton AntiVirus 2005 = $49.95 Value of your data = $350.00 Infection probability = 1/10 Expected loss = $35.00 Copyright (C) 2005 by Aleksandr Yampolskiy
  • 5. This selfish behavior… n …fails to achieve the social optimum. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 6. What if instead… n …a benevolent dictator decided which computers install an anti-virus? Center node must install an anti-virus or else! Copyright (C) 2005 by Aleksandr Yampolskiy
  • 7. Outline n Motivation Ø Our Model n Nash Strategies n Optimal Strategies n Sum-of-Squares Partition Problem n Conclusion Copyright (C) 2005 by Aleksandr Yampolskiy
  • 8. Our Model n The network is an undirected graph G = (V,E). n Installing anti-virus software is a single round non-cooperative game. n The players are the network nodes: V = {0,1,…,n-1}. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 9. Our Model : Strategies n Each node has two actions: do nothing or inoculate itself. n Strategy profile summarizes players’ choices. n ai = probability that node i installs anti- virus software Copyright (C) 2005 by Aleksandr Yampolskiy
  • 10. Our Model : Attack Model n After the nodes choose their strategies, the adversary picks a starting point for infection uniformly at random n Node i gets infected if it has no anti-virus software installed and if any of its neighbors become infected. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 11. Our Model : Attack Model (cont.) n Example: Only node 3 installs anti-virus software. Adversary chooses to infect node 2. 0 1 2 3 4 5 Copyright (C) 2005 by Aleksandr Yampolskiy
  • 12. Our Model : Attack Graph 0 1 0 1 2 3 2 3 4 5 4 5 network graph G Copyright (C) 2005 by Aleksandr Yampolskiy attack graph Ga= G - Ia
  • 13. Our Model : Individual Costs n Anti-virus software costs C. Expected loss from virus is L. n Cost of strategy to node i: n Here, pi(a) = Pr[i is infected | i does not install an anti-virus] Copyright (C) 2005 by Aleksandr Yampolskiy
  • 14. Our Model : Social Cost n Social cost of is simply a sum of individual costs: Copyright (C) 2005 by Aleksandr Yampolskiy
  • 15. Outline n Motivation n Our Model Ø Nash Strategies n Optimal Strategies n Sum-of-Squares Partition Problem n Conclusion Copyright (C) 2005 by Aleksandr Yampolskiy
  • 16. Nash Strategies n Def: Strategy profile is in Nash equilibrium if no node can improve its payoff by switching to a different strategy: for i = 0,...,n-1 and any x 2 [0,1], n Fact: Nash strategies do not optimize total social cost (cf. Prisoner’s Dilemma) Copyright (C) 2005 by Aleksandr Yampolskiy
  • 17. Nash Strategies (cont.) Thm: There is a threshold t=Cn/L such that each node in a Nash equilibrium ¨ will install an anti-virus if it would otherwise end up in a component of expected size > t ¨ will not install an anti-virus if it would end up in a component of expected size < t. ¨ is indifferent between installing and not installing when the expected size = t. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 18. Nash Strategies (cont.) n Corollary: Let t = Cn/L. Then a pure strategy is a Nash equilibrium if and only if ¨ Every component in Ga has size · t ¨ Inserting any secure node j and its edges into Ga yields a component of size ¸ t. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 19. Nash Strategies (cont.) n Example: Let C=0.5,L=1 so that t=Cn/L=2.5. Then is not a Nash equilibrium. 0 1 0 1 2 3 2 3 4 5 4 5 Copyright (C) 2005 by Aleksandr network graph G Yampolskiy attack graph Ga= G - Ia
  • 20. Nash Strategies (cont.) Thm: It is NP-hard to compute a pure Nash equilibrium with lowest (resp., highest) cost. Proof sketch: By reduction to VERTEX COVER (resp., INDEPENDENT DOMINATING SET) . ¨ Set C, L so that t=Cn/L=1.5. ¨ In a Nash equilibrium, (a) every vulnerable node has all neighbors secure; (b) every secure node has an insecure neighbor Copyright (C) 2005 by Aleksandr Yampolskiy
  • 21. Nash Strategies (cont.) n If V’µ V is a minimal vertex cover, then installing software on its nodes satisfies (a) because V’ is a vertex cover and (b) because V’ is minimal. n Conversely, if V’ are secure nodes in a Nash equilibrium, then V’ is a vertex cover by (a). Copyright (C) 2005 by Aleksandr Yampolskiy
  • 22. Nash Strategies (cont.) n Nash Theorem guarantees our game has a mixed Nash equilibrium. n But does it make sense talking about pure Nash equilibria? Copyright (C) 2005 by Aleksandr Yampolskiy
  • 23. Nash Strategies (cont.) Yes, it does! Thm: If at each step some node with suboptimal strategy switches its strategy, the system converges to a pure Nash equilibrium in · 2n steps. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 24. Price of Anarchy [KP99] n Price of anarchy measures how far away a Nash equilibrium can be from the social optimum n Formally, it is the worst-case ratio between cost of Nash equilibrium and cost of social optimum n For network G and costs C, L, we denote it: Copyright (C) 2005 by Aleksandr Yampolskiy
  • 25. Price of Anarchy (cont.) Lower Bound: For a star graph K1,n, ρ(G, C, L) = n/2. Upper Bound: For any graph G and any C, L, ρ(G, C, L)· n. Thm: Price of anarchy in our game is ρ(G, C, L) = Θ(n). Copyright (C) 2005 by Aleksandr Yampolskiy
  • 26. Price of Anarchy (cont.) Proof for lower bound: Consider a star graph K1,n. Let C=L(n-1)/n so that t=Cn/L=n-1. 1 n-1 2 n-2 3 0 … Copyright (C) 2005 by Aleksandr G = K1,n Yampolskiy
  • 27. Price of Anarchy (cont.) Then, is an optimum strategy with cost C+L(n-1)/n. 1 1 n-1 2 n-1 2 n-2 3 n-2 3 0 0 … … Copyright (C) 2005 by Aleksandr G = K1,n Yampolskiy Ga*
  • 28. Price of Anarchy (cont.) And is worst-cost Nash with cost C+L(n-1)2/n. 1 1 n-1 2 n-1 2 n-2 3 n-2 3 0 0 … … Copyright (C) 2005 by Aleksandr G = K1,n Yampolskiy Ga*
  • 29. Price of Anarchy (cont.) n Therefore, n Proof for upper bound uses similar ideas. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 30. Outline n Motivation n Our Model n Nash Strategies Ø Optimal Strategies n Sum-of-Squares Partition Problem n Conclusion Copyright (C) 2005 by Aleksandr Yampolskiy
  • 31. Optimal Strategies n So, allowing users to selfishly choose whether or not to install anti-virus software may be very inefficient n Instead, let’s have a benevolent dictator compute and impose a solution maximizing overall welfare Copyright (C) 2005 by Aleksandr Yampolskiy
  • 32. Optimal Strategies (cont.) n We can show: Thm: Let t=Cn/L. If is an optimum strategy, then every component in Ga has size · max(1, (t+1)/2). n Unfortunately, Thm: It is NP-hard to compute an optimal strategy. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 33. Optimum Strategies (cont.) n Naturally, we consider approximating the solution. k1=2 0 1 0 1 secure nodes 2 3 2 3 Ia k2=2 4 5 4 5 network graph G attack graph Ga=G - Ia Copyright (C) 2005 by Aleksandr Yampolskiy
  • 34. Optimum Strategies (cont.) n For pure strategy , we have: we concentrate on this part Copyright (C) 2005 by Aleksandr Yampolskiy
  • 35. Outline n Motivation n Our Model n Nash Strategies n Optimal Strategies Ø Sum-of-Squares Partition Problem n Conclusion Copyright (C) 2005 by Aleksandr Yampolskiy
  • 36. Sum-of-Squares Partition n We guess that there are m=|Ia| secure nodes. n Problem: By removing a set of at most m · n nodes, partition the graph into components H1, …, Hk such that ∑i |Hi|2 is minimum. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 37. Sum-of-Squares Partition (cont.) Thm: We can find a set of O(log2 n)¢m nodes whose removal partitions the graph into components H1,…,Hk such that ∑i |Hi|2 · O(1)¢OPT. Proof sketch: We use the Leighton-Rao sparse cut algorithm [LR99]. The approach is similar to greedy log n approximation algorithm for set cover. We repeatedly remove the node cut that gives the best per-node benefit. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 38. Outline n Motivation n Our Model n Nash Strategies n Optimal Strategies n Sum-of-Squares Partition Problem Ø Conclusion Copyright (C) 2005 by Aleksandr Yampolskiy
  • 39. Conclusion n We proposed a simple game for modeling containment of viruses in a network. n Nash equilibria of our game have a simple characterization. n We showed that, in the worst case, they can be far off from the optimal solution. n However, a near-optimal deployment of anti- virus software can be computed by reduction to the sum-of-squares partition problem. Copyright (C) 2005 by Aleksandr Yampolskiy
  • 40. Open Problems n Introduce a discount (or taxation) mechanism into the system. n Suppose nodes can lie about their level of security (or about who their neighbors are). How do we make truth- telling a dominant strategy? n Consider a “smart” adversary who targets the biggest graph component. n How do we evaluate what C and L are? n Is there an algorithm for the sum-of-squares partition problem with a better approximation ratio? Copyright (C) 2005 by Aleksandr Yampolskiy
  • 41. Acknowledgments Joan Feigenbaum, Hong Jiang, and Yang Richard Yang Copyright (C) 2005 by Aleksandr Yampolskiy
  • 42. Thank you! Copyright (C) 2005 by Aleksandr Yampolskiy