Abstract—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to install anti-virus software or not on an individual basis while the viruses or worms start from a node chosen uniformly at random and spread along paths consisting of insecure nodes. They showed the surprising result that a pure Nash Equilibrium always exists when all nodes have identical installation costs and identical infection costs. In this paper we present a substantial generalization of the model of [2] that allows for arbitrary security and infection costs, and arbitrary distributions for the starting point of the attack. More significantly, our model...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
Consider a network vulnerable to viral infection, where the security software can guar-antee safety ...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
The spread of epidemics and malware is commonly modeled by diffusion processes on networks. Protecti...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
Consider a network vulnerable to viral infection, where the security software can guar-antee safety ...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
The spread of epidemics and malware is commonly modeled by diffusion processes on networks. Protecti...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...