Skip to main content

Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity

  • Conference paper
Book cover Decision and Game Theory for Security (GameSec 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8252))

Included in the following conference series:

Abstract

Recently, network blocking game (NBG) models have been introduced and utilized to quantify the vulnerability of network topologies in adversarial environments. In NBG models, the payoff matrix of the game is only “implicitly” given. As a consequence, computing a Nash equilibrium in these games is expected to be harder than in more conventional models, where the payoff matrix is “explicitly” given.

In this paper, we first show that computing a Nash equilibrium of a NBG is in general NP-hard. Surprisingly, however, there are particular interesting cases for which the game can be solved in polynomial time. We revisit these cases in a framework where the network is to be operated under budget constraints, which previous models did not consider. We generalize previous blocking games by introducing a budget limit on the operator and consider two constraint formulations: the maximum and the expected cost constraints.

For practical applications, the greatest challenge posed by blocking games is their computational complexity. Therefore, we show that the maximum cost constraint leads to NP-hard problems, even for games that were shown to be efficiently solvable in the unconstrained case. On the other hand, we show that the expected cost constraint formulation leads to games that can be solved efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Holme, P., Kim, B., Yoon, C., Han, S.: Attack vulnerability of complex networks. Physical Review E 65(5), 056109 (2002)

    Google Scholar 

  2. Schneider, C., Moreira, A., Andrade Jr., J., Havlin, S., Herrmann, H.: Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences 108(10), 3838–3841 (2011)

    Article  Google Scholar 

  3. Grubesic, T., Matisziw, T., Murray, A., Snediker, D.: Comparative approaches for assessing network vulnerability. International Regional Science Review 31(1), 88–112 (2008)

    Article  Google Scholar 

  4. Estrada, E.: Network robustness to targeted attacks. the interplay of expansibility and degree distribution. Eur. Phys. Journal B 52(4), 563–574 (2006)

    Article  MATH  Google Scholar 

  5. Dall Asta, L., Barrat, A., Barthélemy, M., Vespignani, A.: Vulnerability of weighted networks. J. of Stat. Mech., 2006(4), P04006 (2006)

    Google Scholar 

  6. Gueye, A., Marbukh, V.: A game-theoretic framework for network security vulnerability assessment and mitigation. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 186–200. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Gueye, A., Walrand, J.C., Anantharam, V.: Design of network topology in an adversarial environment. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 1–20. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Gueye, A., Walrand, J.C., Anantharam, V.: A network topology design game: How to choose communication links in an adversarial environment? In: Proc. of 2nd Int. ICST Conf. on Game Theory for Networks (2011)

    Google Scholar 

  9. Laszka, A., Szeszlér, D., Buttyán, L.: Linear loss function for the network blocking game: An efficient model for measuring network robustness and link criticality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 152–170. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  10. Laszka, A., Szeszlér, D., Buttyán, L.: Game-theoretic robustness of many-to-one networks. In: Krishnamurthy, V., Zhao, Q., Huang, M., Wen, Y. (eds.) Gamenets 2012. LNICST, vol. 105, pp. 88–98. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Daskalakis, C., Goldberg, P., Papadimitriou, C.: The complexity of computing a Nash equilibrium. In: Proc. of 38th Annu. ACM Symp. on Theory of Computing, pp. 71–78 (2006)

    Google Scholar 

  12. Laszka, A., Gueye, A.: Quantifying All-to-One network topology robustness under budget constraints. In: Proc. of Workshop on Pricing and Incentives in Networks and Systems. ACM (June 2013)

    Google Scholar 

  13. Gueye, A.: A Game Theoretical Approach to Communication Security. PhD thesis, EECS Department, University of California, Berkeley (March 2011)

    Google Scholar 

  14. Cunningham, W.: Optimal attack and reinforcement of a network. Journal of the ACM 32(3), 549–561 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  15. Palmer, E.M.: On the spanning tree packing number of a graph: A survey. Discrete Mathematics 230(1), 13–21 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  16. Chung, F.: Laplacians and the Cheeger inequality for directed graphs. Annals of Combinatorics 9(1), 1–19 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  17. Mertens, S.: The easiest hard problem: Number partitioning. Comput. Complex. and Stat. Phys. 125(2), 125–139 (2006)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Laszka, A., Gueye, A. (2013). Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity. In: Das, S.K., Nita-Rotaru, C., Kantarcioglu, M. (eds) Decision and Game Theory for Security. GameSec 2013. Lecture Notes in Computer Science, vol 8252. Springer, Cham. https://doi.org/10.1007/978-3-319-02786-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02786-9_10

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02785-2

  • Online ISBN: 978-3-319-02786-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics