Network Security and Contagion

We develop a theoretical model of security investments in a network of interconnected agents. Network connections introduce the possibility of cascading failures due to an exogenous or endogenous attack depending on the profile of security investments by the agents. The general presumption in the li...

Full description

Bibliographic Details
Main Authors: Acemoglu, Daron, Malekian, Azarakhsh, Ozdaglar, Asu
Format: Working Paper
Language:en_US
Published: Cambridge, MA: Department of Economics, Massachusetts Institute of Technology 2013
Subjects:
Online Access:http://hdl.handle.net/1721.1/79387
_version_ 1826200928993148928
author Acemoglu, Daron
Malekian, Azarakhsh
Ozdaglar, Asu
author_facet Acemoglu, Daron
Malekian, Azarakhsh
Ozdaglar, Asu
author_sort Acemoglu, Daron
collection MIT
description We develop a theoretical model of security investments in a network of interconnected agents. Network connections introduce the possibility of cascading failures due to an exogenous or endogenous attack depending on the profile of security investments by the agents. The general presumption in the literature, based on intuitive arguments or analysis of symmetric networks, is that because security investments create positive externalities on other agents, there will be underinvestment in security. We show that this reasoning is incomplete because of a first-order economic force: security investments are also strategic substitutes. In a general (non-symmetric) network, this implies that underinvestment by some agents will encourage overinvestment by others. We demonstrate by means of examples there can be overinvestment by some agents and also that aggregate probabilities of infection can be lower in equilibrium compared to the social optimum. We then provide sufficient conditions for underinvestment. This requires both sufficiently convex cost functions (convexity alone is not enough) and networks that are either symmetric or locally tree-like. We also characterize the impact of network structure on equilibrium and optimal investments. Finally, we show that when the attack location is endogenized (by assuming that the attacker chooses a probability distribution over the location of the attack in order to maximize damage), there is an additional incentive for overinvestment: greater investment by an agent shifts the attack to other parts of the network.
first_indexed 2024-09-23T11:43:37Z
format Working Paper
id mit-1721.1/79387
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T11:43:37Z
publishDate 2013
publisher Cambridge, MA: Department of Economics, Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/793872019-04-11T07:29:18Z Network Security and Contagion Acemoglu, Daron Malekian, Azarakhsh Ozdaglar, Asu cascades, contagion, network security, security investments, strategic substitutes, underinvestment. We develop a theoretical model of security investments in a network of interconnected agents. Network connections introduce the possibility of cascading failures due to an exogenous or endogenous attack depending on the profile of security investments by the agents. The general presumption in the literature, based on intuitive arguments or analysis of symmetric networks, is that because security investments create positive externalities on other agents, there will be underinvestment in security. We show that this reasoning is incomplete because of a first-order economic force: security investments are also strategic substitutes. In a general (non-symmetric) network, this implies that underinvestment by some agents will encourage overinvestment by others. We demonstrate by means of examples there can be overinvestment by some agents and also that aggregate probabilities of infection can be lower in equilibrium compared to the social optimum. We then provide sufficient conditions for underinvestment. This requires both sufficiently convex cost functions (convexity alone is not enough) and networks that are either symmetric or locally tree-like. We also characterize the impact of network structure on equilibrium and optimal investments. Finally, we show that when the attack location is endogenized (by assuming that the attacker chooses a probability distribution over the location of the attack in order to maximize damage), there is an additional incentive for overinvestment: greater investment by an agent shifts the attack to other parts of the network. We thank various numerous seminar and conference participants for useful suggestions. We gratefully acknowledge financial support from the Toulouse Network with Information Technology and Army Research Office. 2013-06-28T18:57:33Z 2013-06-28T18:57:33Z 2013-06-28 Working Paper http://hdl.handle.net/1721.1/79387 en_US Working paper, Massachusetts Institute of Technology, Dept. of Economics;13-14 application/pdf Cambridge, MA: Department of Economics, Massachusetts Institute of Technology
spellingShingle cascades, contagion, network security, security investments, strategic substitutes, underinvestment.
Acemoglu, Daron
Malekian, Azarakhsh
Ozdaglar, Asu
Network Security and Contagion
title Network Security and Contagion
title_full Network Security and Contagion
title_fullStr Network Security and Contagion
title_full_unstemmed Network Security and Contagion
title_short Network Security and Contagion
title_sort network security and contagion
topic cascades, contagion, network security, security investments, strategic substitutes, underinvestment.
url http://hdl.handle.net/1721.1/79387
work_keys_str_mv AT acemogludaron networksecurityandcontagion
AT malekianazarakhsh networksecurityandcontagion
AT ozdaglarasu networksecurityandcontagion