skip to main content
10.1145/1375457.1375463acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
research-article

Network externalities and the deployment of security features and protocols in the internet

Published: 02 June 2008 Publication History

Abstract

Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular economic reasons arising from the presence of network externalities. Indeed, like the Internet itself, the technologies to secure it exhibit network effects: their value to individual users changes as other users decide to adopt them or not. In particular, the benefits felt by early adopters of security solutions might fall significantly below the cost of adoption, making it difficult for those solutions to gain attraction and get deployed at a large scale.
Our goal in this paper is to model and quantify the impact of such externalities on the adoptability and deployment of security features and protocols in the Internet. We study a network of interconnected agents, which are subject to epidemic risks such as those caused by propagating viruses and worms, and which can decide whether or not to invest some amount to deploy security solutions. Agents experience negative externalities from other agents, as the risks faced by an agent depend not only on the choices of that agent (whether or not to invest in self-protection), but also on those of the other agents. Expectations about choices made by other agents then influence investments in self-protection, resulting in a possibly suboptimal outcome overall.
We present and solve an analytical model where the agents are connected according to a variety of network topologies. Borrowing ideas and techniques used in statistical physics, we derive analytic solutions for sparse random graphs, for which we obtain asymptotic results. We show that we can explicitly identify the impact of network externalities on the adoptability and deployment of security features. In other words, we identify both the economic and network properties that determine the adoption of security technologies. Therefore, we expect our results to provide useful guidance for the design of new economic mechanisms and for the development of network protocols likely to be deployed at a large scale.

References

[1]
D. Aldous and A. Bandyopadhyay. A survey of max-type recursive distributional equations. Annals of Applied Probability, 15(2):1047--1110, 2005.
[2]
D. Aldous and J. M. Steeele. The objective method: probabilistic combinatorial optimization and local weak convergence. Probability on discrete structures, Springer, vol. 110, pp. 1--72, 2004.
[3]
H. Amini and M. Lelarge. Maximizing the Impact of Viral Marketing in a Random Network. preprint, 2008.
[4]
K. B. Athreya and P. E. Ney. Branching processes. Dover, 2000.
[5]
J. Bolot and M. Lelarge. A New Perspective on Internet Security using Insurance. INFOCOM 08, Mini-Conference, see also INRIA report 6329.
[6]
R. Durrett. Random graph Dynamics. Cambridge University Press, 2006.
[7]
A. Ganesh, L. Massoulie, D. Towsley. The effect of network topology on the spread of epidemics. Proc. IEEE Infocom 2005, Miami, FL, March 2005.
[8]
R. Gibbons. Game theory for applied economists. Princeton University Press, 1992.
[9]
C. Gollier. The Economics of Risk and Time. MIT Press, 2004.
[10]
S. Janson, T. Luczak and A. Rucinski. Random graphs. Wiley-Interscience, New York, 2000.
[11]
H. Kunreuther and G. Heal. Interdependent security: the case of identical agents. Journal of Risk and Uncertainty, 26(2):231--249, 2003.
[12]
M. Lelarge and J. Bolot. A Local Mean Field Analysis of Security Investments in Networks. arXiv:0803.3455 {cs.GT}, 2008.
[13]
M. Lelarge and J. Bolot. Using Insurance to Increase Security in the Internet. preprint, 2008.
[14]
J. Miekisz. Stochastic Stability in Spatial Games. Journal of Statistical Physics, 117(1/2):99--110, 2004.
[15]
D. Moore, V. Paxson, S. Savage, C. Shannon and N. Weaver. Inside the Slammer worm. IEEE Security and Privacy, 1(4):33--39, 2003.
[16]
N. Nisan, T. Roughgarden, E. Tardos and V. V. Vazirani (eds). Algorithmic game theory. Cambridge University Press, 2007.
[17]
H. Orman. The Morris worm: a fifteen-year perspective. IEEE Security and Privacy Magazine, Sept-Oct 2003.
[18]
S. Saniford et al. The top speed of flash worms. Proc. ACM Workshop on Rapid Malcode WORM04, Fairfax, VA, Oct. 2004.
[19]
J. Spencer. Ten lectures on the probabilistic method SIAM, vol. 64, 1994
[20]
M. Vojnovic and A. Ganesh. On the race of worms, alerts and patches. Proc. ACM Workshop on Rapid Malcode WORM05, Fairfax, VA, Nov. 2005.
[21]
N. Weaver, V. Paxson, S. Staniford, R. Cunningham. A taxonomy of computer worms. Proc. First ACM Workshop on Rapid Malcode (WORM 2003), Washington DC, Oct. 2003.
[22]
V. Yegneswaran, P. Barford, J. Ullrich. Internet intrusions: global characteristics and prevalence. Proc. ACM Sigmetrics, June 2003.
[23]
C. Zou, W. Gong, D. Towsley. Code Red worm propagation modeling and analysis. Proc. 9th ACM Conf. Computer Comm. Security CCS'02., Washington, DC, Nov 2002.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMETRICS '08: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
June 2008
486 pages
ISBN:9781605580050
DOI:10.1145/1375457
  • cover image ACM SIGMETRICS Performance Evaluation Review
    ACM SIGMETRICS Performance Evaluation Review  Volume 36, Issue 1
    SIGMETRICS '08
    June 2008
    469 pages
    ISSN:0163-5999
    DOI:10.1145/1384529
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 June 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cascading
  2. economics
  3. epidemics
  4. game theory
  5. price of anarchy
  6. security

Qualifiers

  • Research-article

Conference

SIGMETRICS08

Acceptance Rates

Overall Acceptance Rate 459 of 2,691 submissions, 17%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Information informing designJournal of the Association for Information Science and Technology10.1002/asi.2441871:11(1402-1412)Online publication date: 21-Oct-2020
  • (2019)Current Status and Prospects in Researches of Cyber-InsuranceComputer Science and Application10.12677/CSA.2019.9816509:08(1473-1482)Online publication date: 2019
  • (2018)Improving Cyber-Security via Profitable Insurance MarketsACM SIGMETRICS Performance Evaluation Review10.1145/3273996.327399945:4(7-15)Online publication date: 28-Aug-2018
  • (2018)Designing Virus-Resistant, High-Performance Networks: A Game-Formation ApproachIEEE Transactions on Control of Network Systems10.1109/TCNS.2017.27478405:4(1682-1692)Online publication date: Dec-2018
  • (2018)Cyber Insurance and Security Interdependence: Friends or Foes?2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)10.1109/CyberSA.2018.8551447(1-4)Online publication date: Jun-2018
  • (2017)Strategic investment in protection in networked systemsNetwork Science10.1017/nws.2017.15:1(108-139)Online publication date: 3-Apr-2017
  • (2015)Cluster-Based Epidemic Control through Smartphone-Based Body Area NetworksIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2014.231333126:3(681-690)Online publication date: Mar-2015
  • (2015)Decentralized Protection Strategies Against SIS Epidemics in NetworksIEEE Transactions on Control of Network Systems10.1109/TCNS.2015.24267552:4(406-419)Online publication date: Dec-2015
  • (2015)Designing virus-resistant networks: A game-formation approach2015 54th IEEE Conference on Decision and Control (CDC)10.1109/CDC.2015.7402216(294-299)Online publication date: Dec-2015
  • (2014)Will cyber-insurance improve network security? A market analysisIEEE INFOCOM 2014 - IEEE Conference on Computer Communications10.1109/INFOCOM.2014.6847944(235-243)Online publication date: Apr-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media