Elsevier

Performance Evaluation

Volume 74, April 2014, Pages 1-17
Performance Evaluation

Security adoption and influence of cyber-insurance markets in heterogeneous networks

https://doi.org/10.1016/j.peva.2013.10.003Get rights and content

Abstract

Hosts (or nodes) in the Internet often face epidemic risks such as virus and worm attack. Despite the awareness of these risks and the importance of network/system security, investment in security protection is still scare, and hence epidemic risk is still prevalent. Deciding whether to invest in security protection is an interdependent process: security investment decision made by one node can affect the security risk of others, and therefore affect their decisions also. The first contribution of this paper is to provide a fundamental understanding on how “network externality” with “node heterogeneity” may affect security adoption. Nodes make decisions on security investment by evaluating the epidemic risk and the expected loss. We characterize it as a Bayesian network game in which nodes only have the local information, e.g., the number of neighbors, and minimum common information, e.g., degree distribution of the network. Our second goal is to study a new form of risk management, called cyber-insurance. We investigate how the presence of a competitive insurance market can affect the security adoption and show that if the insurance provider can observe the protection level of nodes, the insurance market is a positive incentive for security adoption if the protection quality is not very high. We also find that cyber-insurance is more likely to be a good incentive for nodes with higher degree. Conversely, if the insurance provider cannot observe the protection level of nodes, we verify that partial insurance can be a non-negative incentive, improving node’s utility though not being an incentive.

Introduction

Network security is a major problem in communication networks. One of its most common manifestations is in form of virus, worms and botnet spreading, which we call the epidemic risk. In these epidemic risks, hosts (or nodes) which are infected become the sources of new infections, and adversaries can use these compromised nodes to generate new attacks. Epidemic risk is highly damaging, e.g., the Code Red worm  [1] has infected thousands of computers and induced huge financial loss. To counter this risk, there have been great efforts in both the research and industrial fronts to come up with techniques and tools (i.e., anti-virus software, intrusion detection systems, firewalls, etc.) to detect virus/worms. Despite the sophistication of these tools, only a small percentage of hosts adopt some form of security protection, making epidemic risk still prevalent. In this paper, instead of discussing the technology side of security, we discuss the security adoption in economic language. We argue that it may better explain the low adoption level of security products.

Note that a node’s decision of whether to adopt some security measures is not a simple individual and independent process, but rather, depends on the decisions of many other nodes in the network. Nodes which decide not to invest in security protection, also put other nodes at security risk. This network externality effect caused by the spreading of epidemic influences the degree of adoption of security measure. Our first contribution in this paper is to provide a theoretical understanding on how network externality effect with node heterogeneity may influence security adoption in a network of interconnected nodes (i.e., the Internet). The externality effect with heterogeneity has significant implication for a policy maker aiming to boost the security level in that by subsidizing early adopters, later adopters will naturally follow.

Modeling such decision and security problem requires the combination of epidemic theory and game theory. While extensive studies in the traditional literature have been dedicated to epidemic theory  [2], [3], few works have addressed the problems of strategic behavior of security investment. In a realistic situation, nodes which make decision in security investment usually do not have complete information about the network topology or knowledge of other nodes. As a result, it is difficult for them to accurately evaluate the epidemic risk and other nodes’ influence on itself. In this paper, we model the security investment as a Bayesian network game where nodes only have the local information of their degree and the minimum common information of network’s degree distribution. In contrast to graphical game  [4], in which complete topology is given and analysis is complicated, we show that using the Bayesian network game, one can elegantly tradeoff using partial topology information while making analysis tractable.

By using the Bayesian network game, we show how heterogeneous nodes, characterized by their degree, can estimate their epidemic risk and make decisions on security investment with incomplete information. We show that nodes with higher degree are more likely to be infected by epidemic, making the secure measure less effective for nodes with higher degree in terms of the reduction in infection probability. Moreover, nodes with higher degrees are more sensitive to externality, i.e., they are more likely to be affected by others’ decision. The final adoption fraction of nodes with different degrees depends on their relative loss from epidemic.

While protection measures may limit the spread of virus/worms, another way to manage the epidemic risk is to transfer the risk to a third-party, which is called cyber-insurance   [5]: nodes pay certain premium to insurance companies in return for compensation in the virus outbreaks. The two main challenges in cyber-insurance are: adverse selection and moral hazard   [5], [6]. The problem of adverse selection arises when the insurance provider cannot distinguish between high and low risk nodes. The combination of self-protection and insurance raises the problem of moral hazard, in which nodes covered by insurance may take fewer secure measures, or even falsify their loss. Moral hazard happens when the insurance provider cannot observe the protection level of nodes. In this paper, we address the moral hazard problem which is especially serious in cyber-insurance. We investigate the effect of cyber-insurance on security adoption under a competitive insurance market. Our second contribution is to show the conditions under which cyber-insurance is an incentive, with and without moral hazard. We find that cyber-insurance without moral hazard is an incentive for security adoption if the initial secure condition is bad and the quality of secure measure is not very high. Moreover, cyber-insurance is more likely to be an incentive for nodes with high degree. We verify that partial insurance coverage can be a non-negative incentive for secure adoption with moral hazard.

This paper is outlined as follows. In Section  2, we present the epidemic and security investment models. In Section  3, we show how heterogeneous nodes can determine their infection probability and decide on proper security investment. In Section  4, we investigate the effect of the insurance market, both with and without moral hazard, on security adoption. Validations and performance evaluations are presented in Section  5. Section  6 gives related work. Finally, in Section  7, we briefly summarize and discuss several ways in which our model could be improved.

Section snippets

Mathematical models

Let us first present the mathematical models on how nodes make decision on security investment. The model mainly derives from that of  [7], [8] with some modification. Our models include: (a) epidemic model: to characterize the spread of virus or malware in a network, (b) investment model: to characterize node’s decision in security investment, and (c) Bayesian network game: given the epidemic and investment models, how nodes make decision under the incomplete information setting. We summarize

Analysis for strategic security adoption

Let us show that how nodes make decisions on security investment and how to determine the final security protection level.

Analysis for the cyber-insurance market

In here, we consider cyber-insurance and analyze its impact on security adoption.

Simulation and numerical results

We present simulation and numerical results to investigate the influence of various parameters in this section.

Validating final infection probability: we consider a large graph with power-law degree distribution  [20]. We want to verify the accuracy of using the mean field on these power law graphs. We use the popular Generalized Linear Preference (GLP) method to generate power law graphs  [21]. Parameters were selected so that the power law exponent γ=3. We generate graphs with 10,000 nodes

Related work

Recently there has been growing research in the economics of information security  [22], [23]. Several models are proposed to study the strategic behavior of security investment. [15], [16] are the earliest work to consider strategic security investment and to find externality effect. [24] assumes that security investment is continuous and considers the cases when the security of one agent depends on others by the summation, weakest, best of the investment effort of all agents. They find the

Discussion

Modeling strategic behavior in security adoption helps us to understand what are the factors that could result in under investment. In this paper, we show, via a Bayesian network game formulation, how “network externality” with “node heterogeneity” can affect security adoption in a large communication network. We also investigate the effect of cyber-insurance on the protection level. We establish the conditions under which cyber-insurance is a positive incentive without moral hazard. Under the

Zichao Yang received his B.Sc. degree from the Shanghai Jiao Tong University in 2010. He received his M.Phil. degree from the Department of Computer Science and Engineering at The Chinese University of Hong Kong in 2012. His research interests lie in social network and game theory.

References (37)

  • D. Moore, C. Shannon, et al., Code-red: a case study on the spread and victims of an Internet worm, in: Proceedings of...
  • A. Barrat et al.

    Dynamical Processes on Complex Networks

    (2008)
  • M. Newman

    Networks: An Introduction

    (2010)
  • N. Nisan

    Algorithmic Game Theory

    (2007)
  • J. Kesan, R. Majuca, W. Yurcik, Cyberinsurance as a market-based solution to the problem of cybersecurity: a case...
  • B. Hillier

    The Economics of Asymmetric Information

    (1997)
  • M. Lelarge, J. Bolot, A local mean field analysis of security investments in networks, in: Proceedings of the 3rd...
  • M. Lelarge, J. Bolot, Network externalities and the deployment of security features and protocols in the Internet, in:...
  • J.M. Henderson et al.

    Microeconomic Theory: A Mathematical Approach, Vol. 1971

    (1958)
  • R. Böhme, G. Schwartz, Modeling cyber-insurance: towards a unifying framework, in: Proceedings of the Workshop on the...
  • N. Shetty et al.

    Competitive cyber-insurance and Internet security

  • D. Gottlieb, H. Moreira, Simultaneous adverse selection and moral hazard,...
  • S. Melnik et al.

    The unreasonable effectiveness of tree-based theory for networks with clustering

    Phys. Rev. E

    (2011)
  • D. Aldous et al.

    A survey of max-type recursive distributional equations

    Ann. Appl. Probab.

    (2005)
  • G. Heal, H. Kunreuther, The vaccination game, Center for Risk Management and Decision Process Working Paper,...
  • H. Kunreuther et al.

    Interdependent security

    J. Risk Uncertain.

    (2003)
  • D. Easley et al.

    Networks, Crowds, and Markets: Reasoning about A Highly Connected World

    (2010)
  • I. Ehrlich et al.

    Market insurance, self-insurance, and self-protection

    J. Polit. Econ.

    (1972)
  • Cited by (0)

    Zichao Yang received his B.Sc. degree from the Shanghai Jiao Tong University in 2010. He received his M.Phil. degree from the Department of Computer Science and Engineering at The Chinese University of Hong Kong in 2012. His research interests lie in social network and game theory.

    John C.S. Lui was born in Hong Kong and is currently a professor in the Department of Computer Science and Engineering at The Chinese University of Hong Kong. He received his Ph.D. in Computer Science from UCLA. His current research interests are in communication networks, network/system security (e.g., cloud security, mobile security, etc.), network economics, network sciences (e.g., online social networks, information spreading, etc.), cloud computing, large scale distributed systems and performance evaluation theory. John serves in the editorial board of IEEE/ACM Transactions on Networking, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, Journal of Performance Evaluation and International Journal of Network Security. John was the chairman of the CSE Department from 2005 to 2011. He received various departmental teaching awards and the CUHK Vice-Chancellor’s Exemplary Teaching Award. He is also a corecipient of the IFIP WG 7.3 Performance 2005 and IEEE/IFIP NOMS 2006 Best Student Paper Awards. He is an elected member of the IFIP WG 7.3, Fellow of ACM, Fellow of IEEE and Croucher Senior Research Fellow. His personal interests include films and general reading.

    An earlier conference version appeared in [37].

    View full text