z-logo
open-access-imgOpen Access
How do you defend a network?
Author(s) -
Dziubiński Marcin,
Goyal Sanjeev
Publication year - 2017
Publication title -
theoretical economics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 4.404
H-Index - 32
eISSN - 1555-7561
pISSN - 1933-6837
DOI - 10.3982/te2088
Subject(s) - incentive , computer security , computer science , externality , key (lock) , business , microeconomics , economics
Modern economies rely heavily on their infrastructure networks. These networks face threats ranging from natural disasters to human attacks. As networks are pervasive, the investments needed to protect them are very large; this motivates the study of targeted defense. What are the “key” nodes to defend to maximize functionality of the network? What are the incentives of individual nodes to protect themselves in a networked environment and how do these incentives correspond to collective welfare? We first provide a characterization of optimal attack and defense in terms of two classical concepts in graph theory: separators and transversals . This characterization permits a systematic study of the intensity of conflict (the resources spent on attack and defense) and helps us identify a new class of networks— windmill graphs —that minimize conflict. We then study security choices by individual nodes. Our analysis identifies the externalities and shows that the welfare costs of decentralized defense in networks can be very large.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here