International audienceThis paper studies a game of attack and interception in a network, where a single attacker chooses a target and a path, and each node chooses a level of protection. We show that the Nash equilibrium of the game exists and is unique. We characterize equilibrium attack paths and attack distributions as a function of the underlying network and target values. We show that adding a link or increasing the value of a target may harm the attacker - a comparative statics effect which is reminiscent of Braess’s paradox in transportation economics. Finally, we contrast the Nash equilibrium with the equilibrium of a variant of the model: one where all nodes cooperate in interception
Consider a network vulnerable to viral infection, where the security software can guar-antee safety ...
We survey a research line recently initiated by Mavronicolas et al. [14, 15, 16], concerning a strat...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
International audienceThis paper studies a game of attack and interception in a network, where a sin...
Consider an information network with threats called attackers; each attacker uses a probability dist...
Consider a distributed information network with harmful procedures called attackers (e.g., viruses);...
A digital security breach, by which confidential information is leaked, does not only affect the age...
International audienceA digital security breach, by which confidential information is leaked, does n...
We develop a strategic model of network interdiction in a non-cooperative game of flow. An adversary...
Infrastructure networks are a key feature of an economy. Their functionality depends on the connecti...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
International audienceThis paper considers network protection games against different types of attac...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Strategic network formation arises in settings where agents receive some benefit from their connecte...
Consider a network vulnerable to viral infection, where the security software can guar-antee safety ...
We survey a research line recently initiated by Mavronicolas et al. [14, 15, 16], concerning a strat...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
International audienceThis paper studies a game of attack and interception in a network, where a sin...
Consider an information network with threats called attackers; each attacker uses a probability dist...
Consider a distributed information network with harmful procedures called attackers (e.g., viruses);...
A digital security breach, by which confidential information is leaked, does not only affect the age...
International audienceA digital security breach, by which confidential information is leaked, does n...
We develop a strategic model of network interdiction in a non-cooperative game of flow. An adversary...
Infrastructure networks are a key feature of an economy. Their functionality depends on the connecti...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
International audienceThis paper considers network protection games against different types of attac...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Strategic network formation arises in settings where agents receive some benefit from their connecte...
Consider a network vulnerable to viral infection, where the security software can guar-antee safety ...
We survey a research line recently initiated by Mavronicolas et al. [14, 15, 16], concerning a strat...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...