Optimal Network Topologies for Mitigating Security and Epidemic Risks

被引:0
|
作者
Hota, Ashish R. [1 ]
Sundaram, Shreyas [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
GAMES; MODEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider networked environments under security and epidemic risks, where the probability of successful attack or infection at each vertex depends on the actions or states of its neighbors. In such settings, we consider the problem of designing an optimal network topology with a given number of vertices and edges in order to minimize the expected fraction of attacked or infected vertices. We show that such problems can be cast as minimizing the sum of a concave function of the vertex degrees, and generalize existing results on network design to obtain insights about the optimal network topologies. We first consider a class of interdependent security games where each vertex represents a user that invests in security to protect herself. The probability of successful attack at any given vertex is a function of the security investments in the neighborhood of that vertex. We introduce the notion of behavioral risk-attitudes, where each user perceives the security risks in a skewed manner (as prescribed by established models from the behavioral economics literature). We characterize an upper bound on the expected number of vertices that are successfully attacked under the Nash equilibrium security investments in such settings, and identify the network topologies that minimize this bound. We then consider the N-intertwined approximation of SIS epidemic dynamics, and characterize graphs that minimize (bounds on) the fraction of infected vertices in steady state.
引用
收藏
页码:1129 / 1136
页数:8
相关论文
共 50 条
  • [1] Optimal Investment in Prevention and Recovery for Mitigating Epidemic Risks
    Huang, C. Derrick
    Baghersad, Milad
    Behara, Ravi S.
    Zobel, Christopher W.
    [J]. RISK ANALYSIS, 2022, 42 (01) : 206 - 220
  • [2] Information security risks management framework - A step towards mitigating security risks in university network
    Joshi, Chanchala
    Singh, Umesh Kumar
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 128 - 137
  • [3] Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System
    Li, Zhangtan
    Cheng, Liang
    Zhang, Yang
    Feng, Dengguo
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 123 - 134
  • [4] Mitigating the Security Risks of Unified Communications
    Almeida, Fernando
    Cruz, Jose
    Oliveira, Jose
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 303 - 307
  • [5] Mitigating Cyber-Security Risks using MILS
    Liguori, Angelo
    Benedetto, Francesco
    Liguori, Marco
    [J]. 2017 40TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2017, : 1 - 7
  • [6] Differential Security Game in Heterogeneous Device-to-Device Offloading Network Under Epidemic Risks
    Zhang, Letian
    Xu, Jie
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (03): : 1852 - 1861
  • [7] Identifying and mitigating security risks for secure and robust NGI networks
    Lever, Kirsty E.
    Kifayat, Kashif
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2020, 59
  • [8] Mitigating risks of digitalization through managed industrial security services
    Jansen, Christoph
    Jeschke, Sabina
    [J]. AI & SOCIETY, 2018, 33 (02) : 163 - 173
  • [9] On optimal traffic grooming in elemental network topologies
    Dutta, R
    Huang, S
    Rouskas, GN
    [J]. OPTICOMM 2003: OPTICAL NETWORKING AND COMMUNICATIONS, 2003, 5285 : 13 - 24
  • [10] Optimal topologies for maximizing network transmission capacity
    Chen, Zhenhao
    Wu, Jiajing
    Rong, Zhihai
    Tse, Chi K.
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 495 : 191 - 201