Upgrade to Pro — share decks privately, control downloads, hide ads and more …

STAST-2012

profh
June 26, 2012

 STAST-2012

Presentation given at STAST 2012 conference in Cambridge, MA on June 29, 2012.

profh

June 26, 2012
Tweet

More Decks by profh

Other Decks in Research

Transcript

  1. Optimal Security Investments in Networks of Varying Size and Topology

    Alan Nochenson C.F. Larry Heimann Slides for a paper presented at: Socio-Technical Aspects of Security and Trust 2012 Harvard University, Cambridge, MA
  2. Previous research Kunreuther and Heal (2003) Model internal and external

    risks faced by a set of airlines sharing airport facilities
  3. Previous research Kunreuther and Heal (2003) Model internal and external

    risks faced by a set of airlines sharing airport facilities Heal and Kunreuther (2003) Revises previous model to account for heterogeneous populations
  4. Previous research Kunreuther and Heal (2003) Model internal and external

    risks faced by a set of airlines sharing airport facilities Heal and Kunreuther (2003) Revises previous model to account for heterogeneous populations Grossklags, et al. (2008) Expand by adding additional security games, such as weakest-link and total-effort games
  5. Previous research Kunreuther and Heal (2003) Model internal and external

    risks faced by a set of airlines sharing airport facilities Heal and Kunreuther (2003) Revises previous model to account for heterogeneous populations Grossklags, et al. (2008) Expand by adding additional security games, such as weakest-link and total-effort games Johnson, et al. (2010) Examine how infection probabilities can be reasonably estimated
  6. Previous research Kunreuther and Heal (2003) Model internal and external

    risks faced by a set of airlines sharing airport facilities Heal and Kunreuther (2003) Revises previous model to account for heterogeneous populations Grossklags, et al. (2008) Expand by adding additional security games, such as weakest-link and total-effort games Johnson, et al. (2010) Examine how infection probabilities can be reasonably estimated Heimann and Nochenson (2012) Introduces loss profiles to capture differing degrees of loss suffered upon failure
  7. The case for virus protection Alice A = worth of

    Alice’s computer C = cost of full protection p = probability of suffering loss
  8. Player value and network size Mancur Olson’s classic work on

    group behavior provides insight on people’s behavior in computer networks ... 1. Heterogeneous networks are more likely to be protected 2. Larger networks end up with less total protection