• Keine Ergebnisse gefunden

Strategic investment in protection in networked systems

N/A
N/A
Protected

Academic year: 2022

Aktie "Strategic investment in protection in networked systems"

Copied!
25
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Strategic Investment in Protection in Networked Systems

Matt V. Leduc (IIASA, Stanford) and Ruslan Momot (INSEAD)

Forthcoming in Network Science

Presented at 11thInternational Conference on Web and Internet Economics,

WINE 2015, Amsterdam, TheNetherlands, December 2015,

(2)

E XAMPLES OF N ETWORKED S YSTEMS IN WHICH I NDIVIDUAL I NCENTIVES M ATTER

2014 2012

2010 2008

2006 2004

Measles outbreak in US 2014-2015

“While I think it’s a good idea to take the vaccine, I think that’s a personal decision for individuals”

Senator Rand Paul of Kentucky

“There is absolutely no reason to get the shot. I said, ‘I’d rather you miss an entire semester than you get the shot.’ “

Mother of a 16-year-old student

(3)

E XAMPLES OF N ETWORKED S YSTEMS IN WHICH I NDIVIDUAL I NCENTIVES M ATTER

2014 2012

2010 2008

2006 2004

Measles outbreak in US 2014-2015

“While I think it’s a good idea to take the vaccine, I think that’s a personal decision for individuals”

Senator Rand Paul of Kentucky

“There is absolutely no reason to get the shot. I said, ‘I’d rather you miss an entire semester than you get the shot.’ “

Mother of a 16-year-old student

Paris Attacks, Nov 2015

“The European Union will step up checks on its citizens traveling abroad, tighten gun control and collect more data on airline passengers”

“David Cameron is to respond to the escalation in terror attacks around the world by making provisions for 1,900 extra security and intelligence staff and doubling funds for aviation

security.”

(4)

R ESEARCH

Infected

Q UESTION

Healthy

2

1

intrinsic failure

cascade of failures

2 ways to fail:

(5)

R ESEARCH Q UESTION

intrinsic failure

cascade of failures

2 ways to fail:

What are the strategic incentives of agents to invest in costly protection?

How does the network structure influence these decisions?

Agents can invest in costly protection

2

1

Infected Healthy

2

1

(6)

Network Games

Galeotti et al., 2010

Jackson and Yariv, 2007

Kearns, 2007

Jackson and Zenou, 2014

Cascade Risk in Networks

Lelarge, Bolot, 2008, 2009

Galeotti, Rogers, 2013

Dziubinski, Goyal, 2014

Goyal, Vigier, 2014

Blume et al., 2011

Contribute to the literature on strategic investments in protection in complex interconnected systems.

Interdependent Security (IDS)

Heal and Kunreuther, 2005

Heal et al., 2006

Johnson et al., 2011

L ITERATURE

(7)

M ODEL O VERVIEW

agents can fail: intrinsically (ext) cascade of failures

p Hd : {0,1}d [0,1]

probabilities:

1

1 1

cascading failure function:

vector of binary variables(friend failed/didn’t fail) ->

agent’s probability to fail

This model leads to BNE - hard to work with it. Can only prove existence of eq.

Network - nodes (agents) and edges (interconnections)

Network - nodes (agents) and edges (interconnections)

- neighborhood of agent i Ni(g)

Ni(g)

di(g) = |Ni(g)| - degree of agent i i

(8)

M EAN -F IELD M ODEL

Ni(g) i

?

?

?

Agent i knows his own degree and:

1 3 n

fn

2

doesn’t know full network structure but knows the degree distribution it is drawn from {f1,f2, . . .}

Pr[an agent has degree d] = fd

(9)

M EAN -F IELD M ODEL

Ni(g) i

?

?

?

doesn’t know each friend’s degree

Agent i knows his own degree and:

but knows edge-perspective degree distribution

1 3 n

fn

2

doesn’t know full network structure but knows the degree distribution it is drawn from {f1,f2, . . .}

Pr[an agent has degree d] = fd

Pr[a friend has degree d] = fd {f1,f2, . . .}

(10)

M EAN -F IELD M ODEL

Ni(g) i

doesn’t know each friend’s degree

Agent i knows his own degree and:

doesn’t know each friend’s failure probability

but

but

knows edge-perspective degree distribution

conjectures that each friend fails with the same probability (bounded rationality)

1 3 n

fn

2

doesn’t know full network structure but knows the degree distribution it is drawn from {f1,f2, . . .}

Pr[an agent has degree d] = fd

Pr[a friend has degree d] = fd {f1,f2, . . .}

Pr[a friend fails] = α α

α

α

(11)

T OTAL P ROBABILITY TO F AIL

agent’s cascading failure probability: qd : [0,1] [0,1]

qd (α) > qd(α), d > d

more connections - higher risk

example: malware or virus spread qd(α) = 1 (1 rα)d

virus is transmitted with r probability

Total probability to fail: βd = p + (1 p)qd i

α

α

α

Model of accumulative risk:

α

α

α

(12)

D ECISIONS

invest in protection don’t invest in protection

ai = 0 ai = 1

U(ai = 1,α) = V · B(p,qd(α),ai = 1) C

vs

U(ai = 0,α) = V · B(p, qd(α),ai = 0) cost of protection

effective probability to fail

μ : N+ [0,1]

mean-field strategy

for each degree-type specifies probability to invest in protection α i

α

α α

α

α

(13)

M EAN -F IELD E QUILIBRIUM

(α ,μ = {μ1, μ2, . . .}) We are searching for:

Fixed point argument:

- mean-field local probabilities to fail

- set of strategies for each degree-type

must be induced by the mean-field strategies that are BR to

α μ α

α

α

α

{μ1(α),μ2(α), . . .}

d 1

f(d) · B(p,qd 1(α),μd(α))

given best-response

in strategies

probability to fail for a random friend

consistency

Th: there exists a mean-field equilibrium

(14)

W HAT D OES P ROTECTION D O ?

insulates against total risk games of total protection

B(p,qd(α), a) = p + (1 p)qd(α) · (1 ka)

2014 2012

2010 2008

2006 2004

Examples:

- computer antivirus software

- vaccination agains measles

(15)

W HAT D OES P ROTECTION D O ?

insulates against intrinsic risk only insulates against total risk

games of total protection games of self protection

B(p,qd(α), a) = p + (1 p)qd(α) · (1 ka) B(p,qd(α),a) = p · (1 ka) + (1 p · (1 ka))qd(α)

2014 2012

2010 2008

2006 2004

Examples:

- computer antivirus software

- vaccination agains measles

Examples:

- investing in airport security

- investing in national security within EU

(16)

E QUILIBRIUM : T OTAL P ROTECTION

submodular game (strategic substitutes)

dU degrees

not invest invest

Th: equilibrium is unique and only sufficiently connected agents invest in protection (upper-threshold strategy).

(17)

E QUILIBRIUM : T OTAL P ROTECTION

submodular game (strategic substitutes)

>

low connected agent dL dH high connected agent

intrinsic risk

=

intrinsic risk

cascading failure risk

>

cascading failure risk

dU degrees

not invest invest

Th: equilibrium is unique and only sufficiently connected agents invest in protection (upper-threshold strategy).

(18)

E QUILIBRIUM : T OTAL P ROTECTION

submodular game (strategic substitutes)

>

low connected agent dL dH high connected agent

intrinsic risk

=

intrinsic risk

cascading failure risk

>

cascading failure risk

Total Protection

incentive to invest in total protection

>

incentive to invest in total protection

dU degrees

not invest invest

Th: equilibrium is unique and only sufficiently connected agents invest in protection (upper-threshold strategy).

(19)

E QUILIBRIUM : S ELF P ROTECTION

supermodular game (strategic complements)

intrinsic risk

=

intrinsic risk

cascading failure risk

>

cascading failure risk

Self Protection

(20)

E QUILIBRIUM : S ELF P ROTECTION

supermodular game (strategic complements)

degrees invest not invest

Th: in equilibrium only low connected agents invest in protection (lower-threshold strategy).

dL

intrinsic risk

=

intrinsic risk

cascading failure risk

>

cascading failure risk

Self Protection

incentive to invest in self protection

<

incentive to invest in self protection

(21)

E QUILIBRIUM : S ELF P ROTECTION

supermodular game (strategic complements)

degrees invest not invest

Th: in equilibrium only low connected agents invest in protection (lower-threshold strategy).

dL

intrinsic risk

=

intrinsic risk

cascading failure risk

>

cascading failure risk

Self Protection

incentive to invest in self protection

<

incentive to invest in self protection

equilibrium effective failure probability B(p, qd(α ),μ (d))

equilibrium expected utility Ud(μ (d), α ) equilibrium expected utility Ud(μ (d), α )

equilibrium effective failure probability B(p,qd(α ), μ (d)) Proposition:

Proposition:

(22)

E QUILIBRIUM : S ELF P ROTECTION

supermodular game (strategic complements)

degrees invest not invest

Th: in equilibrium only low connected agents invest in protection (lower-threshold strategy).

dL

intrinsic risk

=

intrinsic risk

cascading failure risk

>

cascading failure risk

Self Protection

incentive to invest in self protection

<

incentive to invest in self protection

equilibrium effective failure probability B(p, qd(α ),μ (d))

equilibrium expected utility Ud(μ (d), α ) equilibrium expected utility Ud(μ (d), α )

equilibrium effective failure probability B(p,qd(α ), μ (d))

Proposition: under FOSD increase in incentives to invest in costly protection are lower.fd

Proposition:

Proposition:

(23)

G LOBAL & L OCAL E XTERNALITIES

U(ai = 1,α) = V · B(p, qd(α),ai = 1) C

cost of protection α i

α

α α

α

α

(24)

G LOBAL & L OCAL E XTERNALITIES

U(ai = 1,α) = V · B(p, qd(α),ai = 1) C

cost of protection α i

α

α α

α

α

U(ai = 1,α) = V · B(p, qd(α),ai = 1) C(Demand)

~ Total Demand

Th: The threshold characterization of equilibria is robust to the introduction of a global price feedback

Th: In a game of total protection with global price feedback, the mean-field equilibrium is unique if C is an increasing function.

(25)

C ONCLUSIONS

Incentives to protect depend on both the type of protection and network structure.

Market failure is more severe in case of self-protection (EU security, airport security) than in case of total protection (vaccination, malware)

Incentives of the agents are aligned with the system’s efficient outcome

We employ a mean-field equilibrium concept that places a reasonable cognitive burden on the agents.

Model is flexible and allows for:

-

comparative statics in the structure of the network

-

introduction of global externalities.

Referenzen

ÄHNLICHE DOKUMENTE

Fronting the PoC agenda meant that OCHA would have to serve the humanitarian NGOs, the UN agencies, and the Security Council. This included preparing the biannual briefings of the

on humanitarian grounds (as they relate to keeping international peace), but the intervention itself was carried out in such a way that many non-Western states saw it as action

When determining whether to take an action to enhance self-protection measures, a peacekeeping operation should consider several factors: whether it has any value-added in

We showed that equilibrium strategies are monotone in degree (i.e. in the number of neighbors an agent has on the network) and that this monotonicity is reversed depending on

Out of pre-tax wage income, persons of working age pay direct taxes and social insurance contributions, the latter consisting of contributions to the public PAYG social security

With regard to policy checking, adverse network manipulations (e. g., a malicious flow rule) can be prohibited by checking at real time if a network event (e. g., adding a new

Video processing software involves the detection of moving objects within image sequences (change detection), the steering of a camera to follow a designated object (template

By managing the forest in a sustainable way, forest owners reduce their own risk of economic losses; however, they also promote different ecosystem services such as biodiversity or