Cyber security based on mean field game model of the defender: Attacker strategies

Size: px
Start display at page:

Download "Cyber security based on mean field game model of the defender: Attacker strategies"

Transcription

1 Research Article Cyber security based on mean field game model of the defender Attacker strategies International Journal of Distributed Sensor Networks 2017, Vol. 13(10) Ó The Author(s) 2017 DOI / journals.sagepub.com/home/ijdsn Li Miao and Shuai Li Abstract The transmission process of information among computers of network is considered as the procedure of interactive behaviors. In this article, we present a mean field game model for the binary interactive behaviors between the malicious attackers and the defenders. We first discuss the evolution of the states of the malicious attackers and the defenders using the susceptiable-infective-removal epidemic model in which we take into account the stochastic process of the propagation of the infected computers and the attack intensity. Then, we formulate the mean field game consistency stability problem generated by a Hamilton Jacobi Bellman equation of the individual player and the fixed-point problem. Finally, we derive the optimal individual strategy with an appropriate assumption that the response time of the defense system is faster than the infection rate. Keywords Cyber security, mean field games, approximation transformation, stable equilibrium, optimal strategy Date received 10 March 2017; accepted 26 September 2017 Handling Editor Kim-Kwang R Choo Introduction Rapid development of the computer technology has influenced all aspects of people s daily life. Individuals usually store and utilize their daily data using online and offline technologies. This sort of stored information becomes the main target of hackers. It has been discussed online that there are many different kinds of cyber-attacks such as malware, denial-of-service (DoS) attacks, hacking the data, bombing, and targeted attack. 1 Therefore, it is required to develop efficient defense strategies to prevent these attacks arising every now and then. Various approaches have been considered to prevent the cyber-attacks, including the firewall, anti-virus program, and intrusion detection system (IDS). 2 6 For instance, Khouzani et al. 4 proposed an optimal control model to discuss the damage maximization problem inflicted by the malware attack, which minimized the overall cost of the security patches. Huang et al. 5 transformed the targeted attacks into random attacks to study the robustness of the interdependent networks. Then, Zargar et al. 6 classified the current distributed denial-of-service (DDoS) flooding attacks and introduced a comprehensive DDoS defense mechanism. Game theory has been introduced for the defense strategy in cyber security problems. 2,7 This method presents a useful mathematical tool for analyzing decision problems for multiple players. The outcome of each player depends on both his decisions and others decisions. In cyber security problems, an effective security model depends on the defense strategies and the actions School of Computer and Communication Engineering, University of Science & Technology Beijing (USTB), Beijing, P.R. China Corresponding author Li Miao, School of Computer and Communication Engineering, University of Science & Technology Beijing (USTB), Beijing 10003, P.R. China @qq.com Creative Commons CC-BY This article is distributed under the terms of the Creative Commons Attribution 4.0 License (http// which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (http// openaccess.htm).

2 2 International Journal of Distributed Sensor Networks of the attackers. Bedi et al. modeled the probability actions between the attackers and the defenders as a static game for defending against the DDoS attack. In the study of Dingankar and Brooks, 9 DDoS attacks were modeled as a non-cooperative game in which the defenders tried to form an optimum network topology to prevent the attack, while the attackers tried to deploy the zombies in the network. Integration of the interactive behaviors among the attackers, defenders and users with game theoretic approach is proposed in Ryutov et al. 10 The advantage is that for the first time, users are considered as the independent players, where their incentives and behaviors affect the game process. An optimal defense strategy based on the stochastic game theoretic scheme is reported in Jiang et al. 11 Farhang et al. 12 modeled a Bayesian game to analyze the interactions between a server and its end user, that is, either a legitimate user or an attacker, where the optimal strategy of the defender only depends on the attackers. Despite the efforts of the current researches and the contribution they have made for the security problems, most of the existing researches modeled a security game scheme with only two players. In such a scenario, all attackers are considered as one attacker, as is the whole of defenders. This assumption is not suitable for the real cyber environment with the security problems represented by multiple attackers and multiple defenders. Therefore, we form a mean field game model to discuss the individual optimal strategy in this article, while taking into account the dynamic evolution of each individual player. Mean field games have been created by Lasry and Lions 13 and Huang et al. 14 as a method to model the games with large players. The systems are coupled through Hamilton Jacobi Bellman (HJB) and Kolmogorov equations, in which the HJB equation describes the behavior of the individual strategy, while the Kolmogorov equation discusses the evolution of the individual optimal strategy. Mean field game is also applied by economics, 15 engineering in different areas, 16 communication networks, 17,1 and other fields. 19,20 A mean field game model for cyber security is proposed in Wang et al. 21 and Kolokoltsov and Malafeyev. 22 The work of Wang et al. 21 considered an attacker and multiple defenders in mobile ad hoc networks. The legitimate nodes of such a model may select actions intelligently to decrease their energy consumption and security loss. Kolokoltsov and Malafeyev 22 proposed a basic mean field game consistency problem to discuss the botnet defense problem, while they did not consider the individual strategy. Inspired by Kolokoltsov and Malafeyev 22 and Gomes et al., 23,24 we introduce a simple mean field game model for the cyber security problems. Different from the current works, the proposed model is a solvable mean field game model for infinite computers. The contributions of this article are as follows we first study the binary interactive behaviors of the states of the attackers and defenders using the susceptible infectious removed (SIR) epidemic model, in which we take into account the stochastic process of the propagation of the infected users and attack intensity. Then, existence of the solutions of this model will be investigated. Next, we formulate the mean field game consistency stability problem generated by a HJB equation of the individual player and the fixed-point problem. Finally, the existence and stability of the solutions of the mean field game model and the optimal individual strategy will be considered. The proposed model evaluates non-uniqueness of the solutions that is investigated in the mean field game theory. Moreover, the proposed model may help understand the link between the dynamic and stationary mean field games models. The article is organized as follows. We present the dynamic evolution of the states of the nodes with SIR epidemic model and elaboration of the mean field game consistency stability problem in section System model. Then, section Analysis of the solutions of HJB equation analyzes existence of the optimal individual defense strategy of the HJB equation. Next, section Stability of the solutions provides the stability of the solutions of the optimal individual defense strategy. Finally, section Conclusion concludes the article. System model We presume that any computer in the network may operate in three states, that is, infective (I), susceptible (S), and recovery (R). The infective node shows the infected computer by the malicious attacks and a susceptible node is prone to be, but not infected. The node R represents the recovery which is immune to any malicious attacks, and we assume that the nodes have the defensive systems. In this framework, we presume both computers and their interactive behaviors among them satisfy the stochastic distribution and depend on the attack intensity a, and the changes in the states between I (S) andr depend on the decisions of computers. We consider n I (t), n S (t), and n R (t) as the numbers of the nodes of different states, at time t, where the total numbers of the nodes in the network are represented by N, and n(t)=½n I (t), n S (t), n R (t)š is a non-negative integer. Then, N = n I (t)+n S (t)+n R (t). We define x(t)=n(t)=n as the standardized state of n(t), where x(t)=½x I (t), x S (t), x R (t)š and x I (t)+x S (t)+x R (t)=1. Considering all participants have the same strategy w =(w I, w S ) and the values are defined as 0 and 1, where each node likes to switch I to S.

3 Miao and Li 3 Figure 1. The transitions between different states. We assume ar S represents the infection rate of the susceptible nodes under the direct attacks in which r S is a constant. Besides, infective nodes will infect the susceptible nodes by transmitting the malware, while susceptible nodes will transmit the defensive systems to infective nodes to cure them. Hence, we consider k I =N and k S =N as the interaction probabilities between the infected and susceptible nodes, where k I and k S denote the number of the interactions of the nodes. The recovery probabilities of the infected and susceptible nodes are denoted by b IR and b SR, respectively, and b exhibits the probability of the immune nodes transformed to the susceptible nodes. The specific transitions between different states are discussed in Figure 1. The set of differential equations of the system, showing the evolution of the state of the infinite players, reads < _x I (t)=x S (t)ear S + x I (t)x S (t)k I + eðx S (t)w S (t) x I (t)w I (t) Þ x I (t) ðb IR + k S x S (t) Þ _x S (t)= x S (t)ear S x I (t)x S (t)k I eðx S (t)w S (t) x I (t)w I (t) Þ x S (t)b SR + x R (t)b _x R (t)=x S (t)b SR + x I (t) ðb IR + k S x S (t) Þ x R (t)b F N fðn(t) Þ = n S (t)aer S ½fðn I (t)+1, n S (t) 1, n R (t) Þ fðn(t) + n S (t)b SR ½fðn I (t), n S (t) 1, n R (t)+1þ fðn(t) + en S (t)w S (t) ½fðn I (t)+1, n S (t) 1, n R (t) Þ fðn(t) + en I (t)w I (t) ½fðn I (t) 1, n S (t)+1, n R (t) Þ fðn(t) + k I n I (t)n S (t) ½fðn I (t)+1, n S (t) 1, n R (t) Þ fðn(t) =N + k S n I (t)n S (t) ½fðn I (t) 1, n S (t)1, n R (t)+1þ fðn(t) =N + n I (t)b IR ½fðn I (t) 1, n S (t), n R (t)+1þ fðn(t) + n R (t)b½fðn I (t), n S (t)+1, n R (t) 1Þ fðn(t) ð1þ ð2þ where f =(f ni, f ns, f nr ). For the standardized state x(t), there exists a set of normal basis fe i 2 R 3 ji = 1, 2, 3g,so that equation (2) may be expressed as a vector function as L N fðx(t) Þ = x S (t)aer S N½fðx(t)+e I (t)=n e S (t)=n + x S (t)b SR N½fðx(t) e S (t)=n + e R (t)=n + x I (t)x S (t)k I N½fðx(t) e S (t)=n + e I (t)=n + x R (t) ½fðx(t)+e S (t)=n e R (t)=n + ex S (t)w S (t)n½fðx(t) e S (t)=n + e I (t)=n + ex I (t)w I (t)n½fðx(t) e I (t)=n + e R (t)=n + x I (t) ðb IR + k S x S (t) ÞN½fðx(t) e I (t)=n + e R (t)=n ð3þ where a is the attack intensity and e represents the reaction rates of the defense systems, so that for limit e!, the system may react immediately. w I and w S are the active strategy and the passive strategy of the nodes, respectively, where their values are defined as 0 and 1. x S (t)ear S denotes the evolution of the susceptible nodes under the directed attacks, x I (t)x S (t)k I means that the susceptible nodes are infected by the infected nodes with the number k I, while x I (t)x S (t)k S shows the infected nodes are recovered by the susceptible nodes with the number k S, x S (t)w S (t) x I (t)w I (t) indicates that the dynamic evolution of the nodes under the reaction rate of the defense systems, and x I (t)b IR denotes that the infected nodes are immune to the malicious attacks. It can be shown that for the states of the susceptible nodes transformed into the infected or immune nodes, it reads n S 1, n I + 1, orn R Equation (1) discussed the evolution of the states with infinite nodes, and the finite state space of the nodes i 2 N can be written as fn(t)=½n I (t), n S (t), n R (t)šjn I (t)+n S (t)+ n R (t) = N, n i.0, i = I, S or Rg, so we get the evolution of the finite state space of the nodes Next, we will introduce the convergence conditions of the differential equation (3) in the limit N!. Proposition 2.1. If f 2 C 1, then lim L N f (x)=lf (x), where Lf (x) = x S (t)aer S ð f (x)= x I f (x)= x S Þ + x S (t)b SR ð f (x)= x R f (x)= x S Þ + x I (t)x S (t)k I ð f (x)= x I f (x)= x S Þ + x I (t) ðb IR + k S x S (t) Þð f (x)= x R f (x)= x I Þ + ex S (t)w S (t) ð f (x)= x I f (x)= x S Þ + ex I (t)w I (t) ð f (x)= x S f (x)= x I Þ ð4þ represents a first-order partial differential equation. The proof is discussed in Appendix 1. Under the finite state framework, we have proved equation (3) converges to equation (4). The solutions of equation (1) discuss the limit of equation (3), and for a general environment, the differential equation (3) weakly converges to the solution of equation (1) if N!. 25

4 4 International Journal of Distributed Sensor Networks Moreover, we can analyze the evolution of each individual behavior of participants using the Markov model. We define w ind =(w ind, I, w ind, S ) 2f0, 1g as the individual strategy; then, the dynamic evolution of the individual participant with three states can be discussed as < L ind h I = ew ind, I (h S h I )+(b IR + k S x S )(h R h I ) L ind h S = ew ind, S (h I h S )+(x I k I + ar S )(h I h S )+b SR (h R h S ) L ind h R = b(h S h R ) ð5þ where h S, h I, and h R denote the individual average cost of the nodes. We presume that the profit function of the attacker, g(x), depends on the states distribution of the nodes and the payment per unit time of the network attacker, In contrast, for determined a and x(t), the players will derive the optimal individual strategy w ind by solving equations (5) and (7). Hence, we form a mean field game consistency equation to analyze the optimal individual strategy of the nodes at game time ½0, TŠ, that is w ind = w ðþ where w ind =(w ind, I, w ind, S, w ind, R ) 2f0, 1g and w =(w I, w S, w R ) 2f0, 1g. In general, this mean field game problem is discussed Ð 1 T by studying the average payment h = lim T! T 0 f(t)dt, in which the form of the solutions to the HJB equation satisfies u(t t)+h. Hence, HJB equation (5) can be written as follows >< max ew I(h S h I )+(b IR + k S x S )(h R h I ) (b IR + k S x S )a I + l I = u w max (ew S + ar S + x I k I )(h I h S )+b SR (h R h S )+l S = u > w b(h S h R )+l R = u ð9þ au. Attackers will maximize their profits during the game time, and therefore, the profit function at time t 2½0, TŠ is G(T)= ð T 0 ðgx(t) ð Þ auþdt ð6þ We define l S as the payoff per unit time of the susceptible nodes, l I as the payoff per unit time of the < where u is the optimal average payment function. If we derive the stable solutions (x(t), w(t)) from equations (1) and (9), the optimal individual strategy will be formed in equation (9), in which w(t)=(w I (t), w S (t)) are the maximization values of equation (9) and x(t)=(x I (t), x S (t), x R (t)) are the stable solutions of equation (1). The individual optimal strategy depends on the stable solutions x(t) which satisfy the following equation x S (t)ar S + x I (t)x S (t)k I + eðx S (t)w S (t) x I (t)w I (t) Þ x I (t) ðb IR + k S x S (t) Þ= 0 x S (t)ear S x I (t)x S (t)k I eðx S (t)w S (t) x I (t)w I (t) Þ x S (t)b SR + x R (t)b = 0 x S (t)b SR + x I (t) ðb IR + k S x S (t) Þ x R (t)b = 0 ð10þ infected nodes, and l R as the payment per unit time of the immune nodes. a I denotes the loss per unit time of the infected nodes. The nodes will minimize their cost functions, and hence, the total payoff functions can be expressed as f i (T)= ð T 0 l i 1 i dt + a I u ½0, TŠ ð7þ where i = I, S, R, 1 S, 1 I, 1 R denote the indicator functions of the states, and u ½0, TŠ is the number of times of the nodes from I to R during the period. We will get the solutions of the dynamic equation (1) and the payment function (5) if we achieve the optimal attack intensity a and the optimal trajectory x(t). Analysis of the solutions of HJB equation In this section, we elaborate the solutions of the mean field consistency problem () with h S h I and h I h S, respectively. If h S h I, the infected node will choose its active defense behavior to reduce its payoff and the susceptible node may not change its state. If h I h S, the passive defense behavior will be optimal. We discuss the existence of the individual optimal solutions of HJB equation in equation (9) with few assumptions, that is, e.0, a.0, r S.0, k I.0, k S.0, b, b IR, and b SR.0. If h S h I, we consider w S = 0 and w I = 1. Then, the optimal individual strategy is the active defense behavior. Equation (9) can be written as

5 Miao and Li 5 < e(h S h I )+(b IR + k S x S )(h R h I ) (b IR + k S x S )a I + l I = u (ar S + x I k I )(h I h S )+b SR (h R h S )+l S = u b(h S h R )+l R = u ð11þ To simplify, we consider h R = 0 because the solution, h, of equation (7) may be expressed as the addictive constant. We achieve u = bh S. Then, equation (11) reduces to e(h S h I ) h I (b IR + k S x S ) (b IR + k S x S )a I + l I bh S = 0 (ar S + x I k I )(h I h S ) b SR h S + l S bh S = 0 yielding h I = h S = ð12þ (e b)l S ½a I (b IR + x S k S ) l I Š(x I k I + ar S + b SR + b) (e + b IR + x S k S )(b + b SR + ar S + x I k I ) (e b)(e + ar S ) ð13þ l S(e + b IR + x S k S ) ½a I (b IR + x S k S ) l S Š(x I k I + ar S ) (e + b IR + x S k S )(b + b SR + ar S + x I k I ) (e b)(e + ar S ) ð14þ For h S h I, combining equations (14) and (15), we achieve x S 1 (b + b SR )(l I a I b IR ) l S (b + b IR ) ð15þ k S l S + a I (b + b SR ) Let x=((b+b SR )(l I a I b IR ) l S (b+b IR ))=k S (l S + a I (b+b SR )) and this assumption is only valid for x.1 because of x S 2 (0,1). Next, we elaborate the existence of the optimal solutions from equation (10). If h S h I, equation (10) yields x S (t)ear S + x I (t)x S (t)k I ex I (t) x I (t) ðb IR + k S x S (t) Þ= 0 x S (t)ear S x I (t)x S (t)k I + ex I (t) x S (t)b SR + x R (t)b = 0 ð16þ where x R = 1 x I x S. The first equation of equation (16) gives x I (t)= x S(t)e(ar S + 1) b IR + x S (t)(k S k I ) ð17þ and then, inserting equation (17) into the second equation of equation (16) results in a quadratic equation in terms of x S (t) as R 1 (x S )=x 2 S ½ (k S k I )(ear S + b SR + b)+k I (ear S + e) Š + x S ½b IR (ear S + b SR + b) (ear S + e)(e b) b(k S k I )Š bb IR ð1þ Since x S (t) 2 (0, 1) yields R 1 (0)\0 and R 1 (0).0 on intervals ½0, 1Š, therefore there exists x S 2 (0, 1) so that R 1 (x S )=0 holds. Thus, x S is the optimal solution that satisfies equation (15) if and only if x.1. Hence, we derive the following proposition. Proposition 3.1. If h S h I and x.1, there exists a unique solution x =(x I, x S, x R ) for the mean field game consistency problem in equations (9) and (10), where x I (t)=(x S (t)(ear S + e))=(b IR + x S (t)(k S k I )) and x S 2 (0, 1) are the unique solutions of equation R 1 (x S )=0. In this framework, we get the optimal individual strategy of the active defense behavior. For h I h S, we consider w I = 0 and w S = 1, so that the optimal individual strategy is the passive defense behavior. Then, equation (9) simplifies to < (b IR + k S x S )(h R h I ) (b IR + k S x S )a I + l I = u (e + ar S + x I k I )(h I h S )+b SR (h R h S )+l S = u b(h S h R )+l R = u ð19þ For h R = 0, we achieve u = bh S. Then, equation (19) reduces to (b IR + k S x S )h I (b IR + k S x S )a I + l I bh S = 0 (e + ar S + x I k I )h I (e + ar S + x I k I )h S b SR h S + l S = 0 yielding ð20þ lim h I = x! bl S ½a I (b IR + x S k S ) l I Š(e + x I k I + ar S + b SR + b) b(e + x I k I + ar S )+(b IR + x S k S )(e + x I k I + ar S + b SR ) h S = ð21þ l S (b IR + x S k S ) (e + x I k I + ar S ) ½a I (b IR + x S k S ) l I Š b(e + x I k I + ar S )+(b IR + x S k S )(e + x I k I + ar S + b SR ) ð22þ Similarly, for h I h S, combining equations (21) and (22), we have x S 1 (b + b SR )(l I a I b IR ) l S (b + b IR ) = x k S l S + a I (b + b SR ) ð23þ If h I h S, equation (10) simplifies to < x S (t)ear S + x I (t)x S (t)k I + ex S (t) x I (t) ðb IR + k S x S (t) Þ= 0 x S (t)ear S x I (t)x S (t)k I ex S (t) x S (t)b SR + x R (t)b = 0 x S (t)b SR + x I (t) ðb IR + k S x S (t) Þ x R (t)b = 0 ð24þ It may be shown that x R = 1 x I x S, and then, the sum of the first two equations in equation (24) yields the third equation. Therefore, equation (24) reduces to

6 6 International Journal of Distributed Sensor Networks x S (t)ear S + x I (t)x S (t)k I + ex S (t) x I (t) ðb IR + k S x S (t) Þ= 0 x S (t)ear S x I (t)x S (t)k I ex S (t) x S (t)b SR + ð1 x I (t) x S (t) Þb = 0 ð25þ The first equation in equation (17) gives x I (t)= x S(t)(ear S + e) b IR + x S (t)(k S k I ) ð26þ and then inserting equation (26) into the second equation of equation (25) leads to the quadratic equation in terms of x S (t) as R 2 (x S )=x 2 S ½ (k S k I )(ear S + e + b SR + b) + k I (ear S + e)š + x S ½b IR (ear S + e + b SR + b) + b(ear S + e k S + k I )Š bb IR ð27þ Stability of the solutions In this section, we analyze the stability of the solutions. The solutions are stable if and only if all eigenvalues of the characteristic equations generated by them present negative real parts. Therefore, we perform a linear approximation for the system of equation (1) with the optimal solutions x and fx S = 1, x I = 0, x R = 0g, respectively. For h S h I and x R = 1 x I x S, equation (1) can be written as _x I (t)=x S (t)ear S + x I (t)x S (t)k I ex I (t) x I (t) ðb IR + k S x S (t) Þ _x S (t)= x S (t)ear S x I (t)x S (t)k I + ex I (t) x S (t)b SR + ð1 x I (t) x S (t) Þb ð2þ In order to analyze the stability of the fixed solution x S, we consider y = x I x I and z = x S x S, and the system of equations in equation (2) reads _y = yx S (k I k S ) b IR e + z ears + x I (k I k S ) +(ki k S )yz _z = y( x S k I + e b)+z x I k ð29þ I (ear S + b + b SR ) ki yz Since x S (t) 2 (0, 1) yields R 2 (0)\0 and R 2 (1).0 on intervals ½0, 1Š, therefore there exists x S 2 (0, 1) so that R 2 (x S )=0 holds. We derive the following proposition. The problem of the eigenvalues presents negative real parts which are equivalent to the negative trace of the characteristic equation and the positive determinant of the characteristic equation. Therefore, we need to discuss the following inequality holds x S (k I k S ) b IR e x I k I ear S b b SR \0 x S (k I k S ) (b IR + e) x I k I (ear S + b + b SR ) ears + x I (k I k S ) ( x S k I + e b).0 ð30þ Proposition 3.2. If h I h S, there exists several solutions for the mean field game consistency stability problem in equations (9) and (10), that is, if x\1, thenx S = 1, x R = 0, and x I = 0 are always the solution. Moreover, if 0\x\1 and R 2 (x) 0, then there exists x S 2 (0, xš so that R 2 (x S )=0 and x I (t) generated by equation (26). In this framework, we obtain the optimal individual strategy of the passive defense behavior. Inserting equation (27) into equation (31) yields >< (x S )2 (k I k S ) 2 + x S ½ (k I k S )(2b IR + ear S + b + b SR + e) k I (v) Š b IR (ear S + b + b SR + b IR + e)\0 (x S )2 (k I k S )(ear ½ S + b + b SR )(k I k S ) k I ear S Š ear S (e b)b IR > + x S ½ (k I k S )e(ear S + b + b SR )+k I ð(ear S + e)(b IR + e)+ear S b IR + b IR (b IR + e)(ear S + b + b SR ).0 ð31þ For k I k S 0, we see that equation (26) always holds for any positive x S 2 (0, 1), and the eigenvalues of the characteristic equations present negative real parts. Hence, the solution x S is stable. For h I h S and x R = 1 x I x S, equation (1) can be written as

7 Miao and Li 7 _x I (t)=x S (t)ear S + x I (t)x S (t)k I + ex S (t) x I (t) ðb IR + k S x S (t) Þ _x S (t)= x S (t)ear S x I (t)x S (t)k I ex S (t) x S (t)b SR + ð1 x I (t) x S (t) Þb ð32þ We first analyze the stability of the solutions x I = 1 and x S = 0; considering x I and z = 1 x S, the system of equations in equation (32) reduces to _x I = x I (k I k S b IR ) z(ear S + e)+x I z(k S k I ) _z = x I (k I + b) z(ear S + e + b + b SR ) x I zk I ð33þ The trace and the determinant of the characteristic equation read (k I k S b IR ) (ear S + e + b + b SR )\0 (k I k S b IR )(ear S + e + b + b SR ) (ear S + e)(k I + b)\0 ð34þ problem. In our model, we took into account both stochastic process of the propagation of the infected players and attack intensity. Existence and stability of solutions of the mean field game model were elaborated in two scenarios, that is, h S h I and h I h S, assuming that players are distributed with the three states, and we derived the optimal individual strategy of the active defense behavior and the passive defense behavior, respectively. Acknowledgements The authors gratefully acknowledge the anonymous reviewers who read drafts and made many helpful suggestions. Hence, the solutions x I = 0 and x S = 1 are stable because inequality (34) is always established. Next, we analyze the stability of the solution x S ; considering y = x I x I and z = x S x S, the system of equations in equation (33) reduces to _y = yx S (k I k S ) b IR + z ears + e + x I (k I k S ) + yz(ki k S ) _z = y( x S k I b)+z x I k I (ear S + e + b + b IR ) yzki ð35þ Similarly, the trace and the determinant of the characteristic equation read Declaration of conflicting interests The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article This work was supported by the National Natural Science Foundation of China under grant no x S (k I k S ) b IR x I k I (ear S + e + b + b IR )\0 x S (k I k S ) b IR x I k I (ear S + e + b + b IR ) +(x S k I + b) ear S + e + x I (k I k S ).0 ð36þ >< > Inserting equation (26) into equation (36) yields (x S )2 (k I k S ) 2 + x S ½ (k I k S )(3b IR + ear S + e + b)+k I (ear S + e) Š b IR (ear S + e + b + 2b IR )\0 (x S )2 (k I k S )(ear ½ S + e + b + b IR )(k I k S ) (ear S + e) Š + x S½ b IR(ear S + e) 2b IR (ear S + e + b + b IR )(k I k S )+k I b IR (ear S + e) Š+ bb IR (ear S + e).0 ð37þ For k I k S 0, it is seen that equation (26) always holds for any positive x S 2 (0, 1), where the eigenvalues of the characteristic equations have negative real parts. Hence, the solution x =(x I, x S, x R ) is stable if k I k S. Conclusion In this article, a simple security mean field game model for the binary interactive behaviors between the malicious attackers and the defenders was investigated in cyber security. We formed the optimal individual defense strategy. The evolution of the states of the malicious attackers and the defenders was modeled using the SIR epidemic model, and the mean field game consistency stability problem was generated by an HJB equation of the individual player and the stable point References 1. Chowdhury A. Recent cyber security attacks and their mitigation approaches an overview. In International conference on applications and techniques in information security, Cairns, QLD, Australia, 26 2 October 2016, pp New York Springer. 2. Liang X and Xiao Y. Game theory for network security. IEEE Commun Surv Tut 2013; 15(1) Zhang HG, Han WB, Lai XJ, et al. Survey on cyberspace security. Sci China Inform Sci 2015; 5(11) Khouzani MHR, Sarkar S and Altman E. Maximum damage malware attack in mobile wireless networks. IEEE ACM T Network 2012; 20(5) Huang X, Gao J, Buldyrev SV, et al. Robustness of interdependent networks under targeted attack. Physical Review E 2011; 3(6)

8 International Journal of Distributed Sensor Networks 6. Zargar ST, Joshi J and Tipper D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tut 2013; 15(4) Alpcan T and Basxar T. Network security a decision and game-theoretic approach. Cambridge Cambridge University Press, Bedi H, Shiva S and Roy S. A game inspired defense mechanism against distributed denial of service attacks. Secur Commun Netw 2014; 7(12) Dingankar C and Brooks RR. Denial of service games. In Third annual cyber security and information infrastructure research workshop, Oak Ridge, TN, May 2007, pp Ryutov T, Orosz M, Blythe J, et al. A game theoretic framework for modeling adversarial cyber security game among attackers, defenders, and users. In International workshop on security and trust management, Vienna, 21 September 2015, pp New York Springer. 11. Jiang W, Tian Z, Zhang H, et al. A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. In 200 IEEE international conference on networking, sensing and control, Sanya, China, 6 April 200, pp New York IEEE. 12. Farhang S, Manshaei MH, Esfahani MN, et al. A dynamic Bayesian security game framework for strategic defense mechanism design. In International conference on decision and game theory for security, Los Angeles, CA, 6 7 November 2014, pp New York Springer. 13. Jeanmichel Lasry PL and Lions PL. Jeux a` champ moyen. I - Le cas stationnaire[j]. Comptes rendus - Mathe matique 2006; 343(9) Huang M, Malhame RP and Caines PE. Large population stochastic dynamic games closed-loop McKean-Vlasov systems and the Nash certainty equivalence principle. Commun Inf Syst 2006; Guéant O. Mean field games and applications to economics. PhD Thesis, Université Paris-Dauphine, Paris, Djehiche B, Tcheukam A and Tembine H. Mean-fieldtype games in engineering. arxiv , September Mériaux F, Varma V and Lasaulce S. Mean field energy games in wireless networks conference record of the forty sixth asilomar conference on signals, systems and computers, Pacific Grove, CA, 4 7 November 2012, pp New York IEEE. 1. Tembine H, Vilanova P and Debbah M. Noisy mean field stochastic games with network applications. Report, Ecole superieure d electricite, Paris, December Bauso D, Tembine H and Basxar T. Opinion dynamics in social networks through mean-field games. SIAM J Control Optim 2016; 54(6) Guéant O, Lasry JM and Lions PL. Mean field games and applications. In Cousin A, Cre pey S, Guéant O, et al. (eds) Paris-Princeton lectures on mathematical finance Berlin, Heidelberg Springer-Verlag, 2011, pp Wang Y, Yu FR, Tang H, et al. A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE T Wirel Commun 2014; 13(3) Kolokoltsov VN and Malafeyev OA. Corruption and botnet defense a mean field game approach. arxiv , July Gomes DA, Mohr J and Souza RR. Discrete time, finite state space mean field games. J Math Pure Appl 2010; 93(3) Gomes DA, Mohr J and Souza RR. Continuous time finite state mean field games. Appl Math Opt 2013; 6(1) Kolokoltsov VN. Nonlinear Markov games on a finite state space (mean-field and binary interactions). Int J Stat Probab 2012; 1(1) Appendix 1 Proof of Proposition 3.1. Since equation (3) represents a symmetric structure, we only need to elaborate the first term on the right side of equation (3), that is, lim x Saer S N ½fðx+ e I = N e S =NÞ f (x)š = x S aer S ( f (x)= x I f (x)= x S ). It is well known that f is the first-order differentiable function if f 2 C 1 and N½f (x + e I =N e S =N) f (x)š = f (n I + 1, n S 1, n R ) f (n). We may represent the limit in terms of the Taylor expansion, as lim N ½ f(x + e I=N e S =N) f (x) Š = lim N½ f(x + e I =N e S =N) f (x e S =N) + f (x e S =N) f (x)š = f (x)= x I f (x)= x S Then, equation (3) reduces to lim x x + e I Saer S N f N e S f (x) N f (x) f (x) = x S aer S x I x S Similarly, the other terms in equation (3) can be proved. Hence, lim L N f (x)=lf (x) is established.

Large-population, dynamical, multi-agent, competitive, and cooperative phenomena occur in a wide range of designed

Large-population, dynamical, multi-agent, competitive, and cooperative phenomena occur in a wide range of designed Definition Mean Field Game (MFG) theory studies the existence of Nash equilibria, together with the individual strategies which generate them, in games involving a large number of agents modeled by controlled

More information

Thermodynamic limit and phase transitions in non-cooperative games: some mean-field examples

Thermodynamic limit and phase transitions in non-cooperative games: some mean-field examples Thermodynamic limit and phase transitions in non-cooperative games: some mean-field examples Conference on the occasion of Giovanni Colombo and Franco Ra... https://events.math.unipd.it/oscgc18/ Optimization,

More information

Cyber-Awareness and Games of Incomplete Information

Cyber-Awareness and Games of Incomplete Information Cyber-Awareness and Games of Incomplete Information Jeff S Shamma Georgia Institute of Technology ARO/MURI Annual Review August 23 24, 2010 Preview Game theoretic modeling formalisms Main issue: Information

More information

Adaptability analysis of radiative transport diffusion approximation in planar-graded-index media

Adaptability analysis of radiative transport diffusion approximation in planar-graded-index media Research Article Adaptability analysis of radiative transport diffusion approximation in planar-graded-index media Advances in Mechanical Engineering 2018, ol. 10(11) 1 6 Ó The Author(s) 2018 DOI: 10.1177/1687814018809613

More information

ON MEAN FIELD GAMES. Pierre-Louis LIONS. Collège de France, Paris. (joint project with Jean-Michel LASRY)

ON MEAN FIELD GAMES. Pierre-Louis LIONS. Collège de France, Paris. (joint project with Jean-Michel LASRY) Collège de France, Paris (joint project with Jean-Michel LASRY) I INTRODUCTION II A REALLY SIMPLE EXAMPLE III GENERAL STRUCTURE IV TWO PARTICULAR CASES V OVERVIEW AND PERSPECTIVES I. INTRODUCTION New class

More information

arxiv: v4 [math.oc] 24 Sep 2016

arxiv: v4 [math.oc] 24 Sep 2016 On Social Optima of on-cooperative Mean Field Games Sen Li, Wei Zhang, and Lin Zhao arxiv:607.0482v4 [math.oc] 24 Sep 206 Abstract This paper studies the connections between meanfield games and the social

More information

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Discrete Dynamics in Nature and ociety Volume 2012, Article ID 106950, 8 pages doi:10.1155/2012/106950 Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Chenquan

More information

HAMILTON-JACOBI EQUATIONS : APPROXIMATIONS, NUMERICAL ANALYSIS AND APPLICATIONS. CIME Courses-Cetraro August 29-September COURSES

HAMILTON-JACOBI EQUATIONS : APPROXIMATIONS, NUMERICAL ANALYSIS AND APPLICATIONS. CIME Courses-Cetraro August 29-September COURSES HAMILTON-JACOBI EQUATIONS : APPROXIMATIONS, NUMERICAL ANALYSIS AND APPLICATIONS CIME Courses-Cetraro August 29-September 3 2011 COURSES (1) Models of mean field, Hamilton-Jacobi-Bellman Equations and numerical

More information

Dynamic Games with Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition

Dynamic Games with Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition Dynamic Games with Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition 1 arxiv:1510.07001v1 [cs.gt] 23 Oct 2015 Yi Ouyang, Hamidreza Tavafoghi and

More information

Multi-dimensional Stochastic Singular Control Via Dynkin Game and Dirichlet Form

Multi-dimensional Stochastic Singular Control Via Dynkin Game and Dirichlet Form Multi-dimensional Stochastic Singular Control Via Dynkin Game and Dirichlet Form Yipeng Yang * Under the supervision of Dr. Michael Taksar Department of Mathematics University of Missouri-Columbia Oct

More information

Evaporation of nanofluid droplet on heated surface

Evaporation of nanofluid droplet on heated surface Research Article Evaporation of nanofluid droplet on heated surface Advances in Mechanical Engineering 1 8 Ó The Author(s) 2015 DOI: 10.1177/1687814015578358 aime.sagepub.com Yeung Chan Kim Abstract In

More information

Note on Influences of Resource Limitations and Transmission Costs on Epidemic Simulations and Critical Thresholds in Scale-Free Networks

Note on Influences of Resource Limitations and Transmission Costs on Epidemic Simulations and Critical Thresholds in Scale-Free Networks SIMULATION OnlineFirst, published on March, 2010 as doi:10.1177/003754710366018 Simulation Note on Influences of Resource Limitations and Transmission Costs on Epidemic Simulations and Critical Thresholds

More information

A Game Theoretic Investigation of Deception in Network Security

A Game Theoretic Investigation of Deception in Network Security A Game Theoretic Investigation of Deception in Network Security Thomas E. Carroll Pacific Northwest National Laboratory 902 Battelle Boulevard P.O. Box 999, MSIN J4-45 Richland, WA 99352 USA Email: Thomas.Carroll@pnl.gov

More information

Runge-Kutta Method for Solving Uncertain Differential Equations

Runge-Kutta Method for Solving Uncertain Differential Equations Yang and Shen Journal of Uncertainty Analysis and Applications 215) 3:17 DOI 1.1186/s4467-15-38-4 RESEARCH Runge-Kutta Method for Solving Uncertain Differential Equations Xiangfeng Yang * and Yuanyuan

More information

MEAN FIELD GAMES WITH MAJOR AND MINOR PLAYERS

MEAN FIELD GAMES WITH MAJOR AND MINOR PLAYERS MEAN FIELD GAMES WITH MAJOR AND MINOR PLAYERS René Carmona Department of Operations Research & Financial Engineering PACM Princeton University CEMRACS - Luminy, July 17, 217 MFG WITH MAJOR AND MINOR PLAYERS

More information

This is a repository copy of Density flow over networks: A mean-field game theoretic approach.

This is a repository copy of Density flow over networks: A mean-field game theoretic approach. This is a repository copy of Density flow over networks: A mean-field game theoretic approach. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/89655/ Version: Accepted Version

More information

Variational approach to mean field games with density constraints

Variational approach to mean field games with density constraints 1 / 18 Variational approach to mean field games with density constraints Alpár Richárd Mészáros LMO, Université Paris-Sud (based on ongoing joint works with F. Santambrogio, P. Cardaliaguet and F. J. Silva)

More information

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components Applied Mathematics Volume 202, Article ID 689820, 3 pages doi:0.55/202/689820 Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

More information

Mathematical Modeling of Incentive Policies in P2P Systems

Mathematical Modeling of Incentive Policies in P2P Systems Mathematical Modeling of Incentive Policies in P2P Systems Bridge Q. Zhao Dept. of Computer Science and Engineering The Chinese University of HK Shatin, NT, Hong Kong qzhao@cse.cuhk.edu.hk John C.S. Lui

More information

An Introduction to Noncooperative Games

An Introduction to Noncooperative Games An Introduction to Noncooperative Games Alberto Bressan Department of Mathematics, Penn State University Alberto Bressan (Penn State) Noncooperative Games 1 / 29 introduction to non-cooperative games:

More information

Mean-field-game model for Botnet defense in Cyber-security

Mean-field-game model for Botnet defense in Cyber-security 1 Mean-field-game model for Botnet defense in Cyber-security arxiv:1511.06642v1 [math.oc] 20 Nov 2015 V. N. Kolokoltsov and A. Bensoussan November 23, 2015 Abstract We initiate the analysis of the response

More information

Research Article Stabilization Analysis and Synthesis of Discrete-Time Descriptor Markov Jump Systems with Partially Unknown Transition Probabilities

Research Article Stabilization Analysis and Synthesis of Discrete-Time Descriptor Markov Jump Systems with Partially Unknown Transition Probabilities Research Journal of Applied Sciences, Engineering and Technology 7(4): 728-734, 214 DOI:1.1926/rjaset.7.39 ISSN: 24-7459; e-issn: 24-7467 214 Maxwell Scientific Publication Corp. Submitted: February 25,

More information

Interval-Valued Cores and Interval-Valued Dominance Cores of Cooperative Games Endowed with Interval-Valued Payoffs

Interval-Valued Cores and Interval-Valued Dominance Cores of Cooperative Games Endowed with Interval-Valued Payoffs mathematics Article Interval-Valued Cores and Interval-Valued Dominance Cores of Cooperative Games Endowed with Interval-Valued Payoffs Hsien-Chung Wu Department of Mathematics, National Kaohsiung Normal

More information

Explicit solutions of some Linear-Quadratic Mean Field Games

Explicit solutions of some Linear-Quadratic Mean Field Games Explicit solutions of some Linear-Quadratic Mean Field Games Martino Bardi Department of Pure and Applied Mathematics University of Padua, Italy Men Field Games and Related Topics Rome, May 12-13, 2011

More information

Monotone variational inequalities, generalized equilibrium problems and fixed point methods

Monotone variational inequalities, generalized equilibrium problems and fixed point methods Wang Fixed Point Theory and Applications 2014, 2014:236 R E S E A R C H Open Access Monotone variational inequalities, generalized equilibrium problems and fixed point methods Shenghua Wang * * Correspondence:

More information

Solution of Stochastic Optimal Control Problems and Financial Applications

Solution of Stochastic Optimal Control Problems and Financial Applications Journal of Mathematical Extension Vol. 11, No. 4, (2017), 27-44 ISSN: 1735-8299 URL: http://www.ijmex.com Solution of Stochastic Optimal Control Problems and Financial Applications 2 Mat B. Kafash 1 Faculty

More information

Global Stability of a Computer Virus Model with Cure and Vertical Transmission

Global Stability of a Computer Virus Model with Cure and Vertical Transmission International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1, January 016, PP 16-4 ISSN 349-4840 (Print) & ISSN 349-4859 (Online) www.arcjournals.org Global

More information

Efficient Estimation for the Partially Linear Models with Random Effects

Efficient Estimation for the Partially Linear Models with Random Effects A^VÇÚO 1 33 ò 1 5 Ï 2017 c 10 Chinese Journal of Applied Probability and Statistics Oct., 2017, Vol. 33, No. 5, pp. 529-537 doi: 10.3969/j.issn.1001-4268.2017.05.009 Efficient Estimation for the Partially

More information

A new computational method for threaded connection stiffness

A new computational method for threaded connection stiffness Research Article A new computational method for threaded connection stiffness Advances in Mechanical Engineering 2016, Vol. 8(12) 1 9 Ó The Author(s) 2016 DOI: 10.1177/1687814016682653 aime.sagepub.com

More information

Credibilistic Bi-Matrix Game

Credibilistic Bi-Matrix Game Journal of Uncertain Systems Vol.6, No.1, pp.71-80, 2012 Online at: www.jus.org.uk Credibilistic Bi-Matrix Game Prasanta Mula 1, Sankar Kumar Roy 2, 1 ISRO Satellite Centre, Old Airport Road, Vimanapura

More information

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study The 1 st Net-X (2017) On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study Cong Li Adaptive Networks and Control Lab, Fudan University Collaborators: Xiaojie Li, Jianbo Wang,

More information

Continuous State MRF s

Continuous State MRF s EE64 Digital Image Processing II: Purdue University VISE - December 4, Continuous State MRF s Topics to be covered: Quadratic functions Non-Convex functions Continuous MAP estimation Convex functions EE64

More information

Robust control and applications in economic theory

Robust control and applications in economic theory Robust control and applications in economic theory In honour of Professor Emeritus Grigoris Kalogeropoulos on the occasion of his retirement A. N. Yannacopoulos Department of Statistics AUEB 24 May 2013

More information

A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks

A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks Chinese Journal of Electronics Vol.23, No.4, Oct. 2014 A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks WANG Xiaoming 1, HE Zaobo 1,2 and ZHANG Lichen 1

More information

Research Article On the Stability Property of the Infection-Free Equilibrium of a Viral Infection Model

Research Article On the Stability Property of the Infection-Free Equilibrium of a Viral Infection Model Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume, Article ID 644, 9 pages doi:.55//644 Research Article On the Stability Property of the Infection-Free Equilibrium of a Viral

More information

Understanding the Influence of Adversaries in Distributed Systems

Understanding the Influence of Adversaries in Distributed Systems Understanding the Influence of Adversaries in Distributed Systems Holly P. Borowski and Jason R. Marden Abstract Transitioning from a centralized to a distributed decision-making strategy can create vulnerability

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Inclusion Relationship of Uncertain Sets

Inclusion Relationship of Uncertain Sets Yao Journal of Uncertainty Analysis Applications (2015) 3:13 DOI 10.1186/s40467-015-0037-5 RESEARCH Open Access Inclusion Relationship of Uncertain Sets Kai Yao Correspondence: yaokai@ucas.ac.cn School

More information

Research Article The Application of Baum-Welch Algorithm in Multistep Attack

Research Article The Application of Baum-Welch Algorithm in Multistep Attack e Scientific World Journal, Article ID 374260, 7 pages http://dx.doi.org/10.1155/2014/374260 Research Article The Application of Baum-Welch Algorithm in Multistep Attack Yanxue Zhang, 1 Dongmei Zhao, 2

More information

A Game-Theoretic Analysis of Games with a Purpose

A Game-Theoretic Analysis of Games with a Purpose A Game-Theoretic Analysis of Games with a Purpose The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Published Version

More information

An Improved Computer Multi-Virus Propagation Model with User Awareness

An Improved Computer Multi-Virus Propagation Model with User Awareness Journal of Information & Computational Science 8: 16 (2011) 4301 4308 Available at http://www.joics.com An Improved Computer Multi-Virus Propagation Model with User Awareness Xiaoqin ZHANG a,, Shuyu CHEN

More information

Learning in Mean Field Games

Learning in Mean Field Games Learning in Mean Field Games P. Cardaliaguet Paris-Dauphine Joint work with S. Hadikhanloo (Dauphine) Nonlinear PDEs: Optimal Control, Asymptotic Problems and Mean Field Games Padova, February 25-26, 2016.

More information

An Uncertain Control Model with Application to. Production-Inventory System

An Uncertain Control Model with Application to. Production-Inventory System An Uncertain Control Model with Application to Production-Inventory System Kai Yao 1, Zhongfeng Qin 2 1 Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China 2 School of Economics

More information

Mean field equilibria of multiarmed bandit games

Mean field equilibria of multiarmed bandit games Mean field equilibria of multiarmed bandit games Ramesh Johari Stanford University Joint work with Ramki Gummadi (Stanford University) and Jia Yuan Yu (IBM Research) A look back: SN 2000 2 Overview What

More information

Long time behavior of Mean Field Games

Long time behavior of Mean Field Games Long time behavior of Mean Field Games P. Cardaliaguet (Paris-Dauphine) Joint work with A. Porretta (Roma Tor Vergata) PDE and Probability Methods for Interactions Sophia Antipolis (France) - March 30-31,

More information

Research Article Dynamical Models for Computer Viruses Propagation

Research Article Dynamical Models for Computer Viruses Propagation Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 28, Article ID 9426, 11 pages doi:1.11/28/9426 Research Article Dynamical Models for Computer Viruses Propagation José R. C. Piqueira

More information

Links Failure Analysis of Averaging Executed by. Protocol Push sum

Links Failure Analysis of Averaging Executed by. Protocol Push sum Contemporary Engineering Sciences, Vol. 9, 1, no., 7-3 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.19/ces.1.113 Links Failure Analysis of Averaging Executed by Protocol Push sum Martin Kenyeres Dept.

More information

Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity

Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity Sudip Saha Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial

More information

A Network Economic Model of a Service-Oriented Internet with Choices and Quality Competition

A Network Economic Model of a Service-Oriented Internet with Choices and Quality Competition A Network Economic Model of a Service-Oriented Internet with Choices and Quality Competition Anna Nagurney John F. Smith Memorial Professor Dong Michelle Li PhD candidate Tilman Wolf Professor of Electrical

More information

Econ 508B: Lecture 5

Econ 508B: Lecture 5 Econ 508B: Lecture 5 Expectation, MGF and CGF Hongyi Liu Washington University in St. Louis July 31, 2017 Hongyi Liu (Washington University in St. Louis) Math Camp 2017 Stats July 31, 2017 1 / 23 Outline

More information

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game IEEE ICC 202 - Wireless Networks Symposium Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game Yang Gao, Yan Chen and K. J. Ray Liu Department of Electrical and Computer

More information

Inverse optimal control of hyperchaotic finance system

Inverse optimal control of hyperchaotic finance system ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 10 (2014) No. 2, pp. 83-91 Inverse optimal control of hyperchaotic finance system Changzhong Chen 1,3, Tao Fan 1,3, Bangrong

More information

Game Theory and its Applications to Networks - Part I: Strict Competition

Game Theory and its Applications to Networks - Part I: Strict Competition Game Theory and its Applications to Networks - Part I: Strict Competition Corinne Touati Master ENS Lyon, Fall 200 What is Game Theory and what is it for? Definition (Roger Myerson, Game Theory, Analysis

More information

Noncooperative continuous-time Markov games

Noncooperative continuous-time Markov games Morfismos, Vol. 9, No. 1, 2005, pp. 39 54 Noncooperative continuous-time Markov games Héctor Jasso-Fuentes Abstract This work concerns noncooperative continuous-time Markov games with Polish state and

More information

Maximum Process Problems in Optimal Control Theory

Maximum Process Problems in Optimal Control Theory J. Appl. Math. Stochastic Anal. Vol. 25, No., 25, (77-88) Research Report No. 423, 2, Dept. Theoret. Statist. Aarhus (2 pp) Maximum Process Problems in Optimal Control Theory GORAN PESKIR 3 Given a standard

More information

Computation of Efficient Nash Equilibria for experimental economic games

Computation of Efficient Nash Equilibria for experimental economic games International Journal of Mathematics and Soft Computing Vol.5, No.2 (2015), 197-212. ISSN Print : 2249-3328 ISSN Online: 2319-5215 Computation of Efficient Nash Equilibria for experimental economic games

More information

Understanding the Influence of Adversaries in Distributed Systems

Understanding the Influence of Adversaries in Distributed Systems Understanding the Influence of Adversaries in Distributed Systems Holly P. Borowski and Jason R. Marden Abstract Transitioning from a centralized to a distributed decision-making strategy can create vulnerability

More information

Complete q-moment Convergence of Moving Average Processes under ϕ-mixing Assumption

Complete q-moment Convergence of Moving Average Processes under ϕ-mixing Assumption Journal of Mathematical Research & Exposition Jul., 211, Vol.31, No.4, pp. 687 697 DOI:1.377/j.issn:1-341X.211.4.14 Http://jmre.dlut.edu.cn Complete q-moment Convergence of Moving Average Processes under

More information

OPTIMAL RESOURCE ALLOCATION AMONG AREAS OF EQUAL VALUE

OPTIMAL RESOURCE ALLOCATION AMONG AREAS OF EQUAL VALUE 80 NZOR volume 4 number 2 July 1976 OPTIMAL RESOURCE ALLOCATION AMONG AREAS OF EQUAL VALUE John S. Cr o u c h e r* Macquarie Un i v e r s i t y, Sydney S u m m a r y This p a p e r c o n s i d e r s a

More information

Department of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia

Department of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia ISS: 978-602-71169-7-9 Proceeding of 5th International Seminar on ew Paradigm and Innovation on atural Science and Its Application (5th ISPISA) Mathematical Modeling of worm infection on computer in a

More information

Optimal Convergence in Multi-Agent MDPs

Optimal Convergence in Multi-Agent MDPs Optimal Convergence in Multi-Agent MDPs Peter Vrancx 1, Katja Verbeeck 2, and Ann Nowé 1 1 {pvrancx, ann.nowe}@vub.ac.be, Computational Modeling Lab, Vrije Universiteit Brussel 2 k.verbeeck@micc.unimaas.nl,

More information

Mathematical Games and Random Walks

Mathematical Games and Random Walks Mathematical Games and Random Walks Alexander Engau, Ph.D. Department of Mathematical and Statistical Sciences College of Liberal Arts and Sciences / Intl. College at Beijing University of Colorado Denver

More information

Research Article Chaos Control on a Duopoly Game with Homogeneous Strategy

Research Article Chaos Control on a Duopoly Game with Homogeneous Strategy Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 16, Article ID 74185, 7 pages http://dx.doi.org/1.1155/16/74185 Publication Year 16 Research Article Chaos Control on a Duopoly

More information

A Stackelberg Game Model of Dynamic Duopolistic Competition with Sticky Prices. Abstract

A Stackelberg Game Model of Dynamic Duopolistic Competition with Sticky Prices. Abstract A Stackelberg Game Model of Dynamic Duopolistic Competition with Sticky Prices Kenji Fujiwara School of Economics, Kwansei Gakuin University Abstract We develop the following Stackelberg game model of

More information

Privacy-Preserving Linear Programming

Privacy-Preserving Linear Programming Optimization Letters,, 1 7 (2010) c 2010 Privacy-Preserving Linear Programming O. L. MANGASARIAN olvi@cs.wisc.edu Computer Sciences Department University of Wisconsin Madison, WI 53706 Department of Mathematics

More information

Research Article Localization and Perturbations of Roots to Systems of Polynomial Equations

Research Article Localization and Perturbations of Roots to Systems of Polynomial Equations International Mathematics and Mathematical Sciences Volume 2012, Article ID 653914, 9 pages doi:10.1155/2012/653914 Research Article Localization and Perturbations of Roots to Systems of Polynomial Equations

More information

Generalized Riccati Equations Arising in Stochastic Games

Generalized Riccati Equations Arising in Stochastic Games Generalized Riccati Equations Arising in Stochastic Games Michael McAsey a a Department of Mathematics Bradley University Peoria IL 61625 USA mcasey@bradley.edu Libin Mou b b Department of Mathematics

More information

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Ruzhang Zhao, Lijun Yang Department of Mathematical Science, Tsinghua University, China. Corresponding author. Email: lyang@math.tsinghua.edu.cn,

More information

DETERMINISTIC AND STOCHASTIC SELECTION DYNAMICS

DETERMINISTIC AND STOCHASTIC SELECTION DYNAMICS DETERMINISTIC AND STOCHASTIC SELECTION DYNAMICS Jörgen Weibull March 23, 2010 1 The multi-population replicator dynamic Domain of analysis: finite games in normal form, G =(N, S, π), with mixed-strategy

More information

Title: The Castle on the Hill. Author: David K. Levine. Department of Economics UCLA. Los Angeles, CA phone/fax

Title: The Castle on the Hill. Author: David K. Levine. Department of Economics UCLA. Los Angeles, CA phone/fax Title: The Castle on the Hill Author: David K. Levine Department of Economics UCLA Los Angeles, CA 90095 phone/fax 310-825-3810 email dlevine@ucla.edu Proposed Running Head: Castle on the Hill Forthcoming:

More information

Anti-synchronization of a new hyperchaotic system via small-gain theorem

Anti-synchronization of a new hyperchaotic system via small-gain theorem Anti-synchronization of a new hyperchaotic system via small-gain theorem Xiao Jian( ) College of Mathematics and Statistics, Chongqing University, Chongqing 400044, China (Received 8 February 2010; revised

More information

An Optimal Control Problem Over Infected Networks

An Optimal Control Problem Over Infected Networks Proceedings of the International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 15-16 214 Paper No. 125 An Optimal Control Problem Over Infected Networks Ali Khanafer,

More information

Potential Game approach to virus attacks in network with general topology

Potential Game approach to virus attacks in network with general topology Potential Game approach to virus attacks in network with general topology François-Xavier Legenvre, Yezekael Hayel, Eitan Altman To cite this version: François-Xavier Legenvre, Yezekael Hayel, Eitan Altman.

More information

Coalitional solutions in differential games

Coalitional solutions in differential games 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Operations Research Transactions Vol.16 No.4 Coalitional solutions in differential games Leon A. Petrosyan 1 Abstract The two-stage level coalitional solution for n-person

More information

On Equilibria of Distributed Message-Passing Games

On Equilibria of Distributed Message-Passing Games On Equilibria of Distributed Message-Passing Games Concetta Pilotto and K. Mani Chandy California Institute of Technology, Computer Science Department 1200 E. California Blvd. MC 256-80 Pasadena, US {pilotto,mani}@cs.caltech.edu

More information

Modeling and Computation of Mean Field Equilibria in Producers Game with Emission Permits Trading

Modeling and Computation of Mean Field Equilibria in Producers Game with Emission Permits Trading Modeling and Computation of Mean Field Equilibria in Producers Game with Emission Permits Trading arxiv:506.04869v [q-fin.ec] 6 Jun 05 Shuhua Chang,, Xinyu Wang, and Alexander Shananin 3 Research Center

More information

Mean-Field optimization problems and non-anticipative optimal transport. Beatrice Acciaio

Mean-Field optimization problems and non-anticipative optimal transport. Beatrice Acciaio Mean-Field optimization problems and non-anticipative optimal transport Beatrice Acciaio London School of Economics based on ongoing projects with J. Backhoff, R. Carmona and P. Wang Robust Methods in

More information

Reducing False Alarm Rate in Anomaly Detection with Layered Filtering

Reducing False Alarm Rate in Anomaly Detection with Layered Filtering Reducing False Alarm Rate in Anomaly Detection with Layered Filtering Rafa l Pokrywka 1,2 1 Institute of Computer Science AGH University of Science and Technology al. Mickiewicza 30, 30-059 Kraków, Poland

More information

Application of Time Sequence Model Based on Excluded Seasonality in Daily Runoff Prediction

Application of Time Sequence Model Based on Excluded Seasonality in Daily Runoff Prediction Send Orders for Reprints to reprints@benthamscience.ae 546 The Open Cybernetics & Systemics Journal, 2014, 8, 546-552 Open Access Application of Time Sequence Model Based on Excluded Seasonality in Daily

More information

Dynamic and Adversarial Reachavoid Symbolic Planning

Dynamic and Adversarial Reachavoid Symbolic Planning Dynamic and Adversarial Reachavoid Symbolic Planning Laya Shamgah Advisor: Dr. Karimoddini July 21 st 2017 Thrust 1: Modeling, Analysis and Control of Large-scale Autonomous Vehicles (MACLAV) Sub-trust

More information

EULER MARUYAMA APPROXIMATION FOR SDES WITH JUMPS AND NON-LIPSCHITZ COEFFICIENTS

EULER MARUYAMA APPROXIMATION FOR SDES WITH JUMPS AND NON-LIPSCHITZ COEFFICIENTS Qiao, H. Osaka J. Math. 51 (14), 47 66 EULER MARUYAMA APPROXIMATION FOR SDES WITH JUMPS AND NON-LIPSCHITZ COEFFICIENTS HUIJIE QIAO (Received May 6, 11, revised May 1, 1) Abstract In this paper we show

More information

Les Cahiers de la Chaire / N 10

Les Cahiers de la Chaire / N 10 Les Cahiers de la Chaire / N 10 A reference case for mean field games models Olivier Guéant A reference case for mean field games models Olivier Guéant Abstract In this article, we present a reference

More information

ADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM

ADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM ADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM WITH UNKNOWN PARAMETERS Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University

More information

Coordinated Variable Structure Switching in Smart Power Systems: Attacks and Mitigation

Coordinated Variable Structure Switching in Smart Power Systems: Attacks and Mitigation Coordinated Variable Structure Switching in Smart Power Systems: Attacks and Mitigation Shan Liu, Deepa Kundur, Takis Zourntos and Karen Butler-Purry Department of Electrical and Computer Engineering Texas

More information

Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks

Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks Yuan Yuan, Quanyan Zhu, Fuchun Sun, Qinyi Wang and Tamer Başar Abstract The integration of control systems with modern information

More information

Hyperbolicity of Systems Describing Value Functions in Differential Games which Model Duopoly Problems. Joanna Zwierzchowska

Hyperbolicity of Systems Describing Value Functions in Differential Games which Model Duopoly Problems. Joanna Zwierzchowska Decision Making in Manufacturing and Services Vol. 9 05 No. pp. 89 00 Hyperbolicity of Systems Describing Value Functions in Differential Games which Model Duopoly Problems Joanna Zwierzchowska Abstract.

More information

Payoff Continuity in Incomplete Information Games

Payoff Continuity in Incomplete Information Games journal of economic theory 82, 267276 (1998) article no. ET982418 Payoff Continuity in Incomplete Information Games Atsushi Kajii* Institute of Policy and Planning Sciences, University of Tsukuba, 1-1-1

More information

Mean Field Consumption-Accumulation Optimization with HAR

Mean Field Consumption-Accumulation Optimization with HAR Mean Field Consumption-Accumulation Optimization with HARA Utility School of Mathematics and Statistics Carleton University, Ottawa Workshop on Mean Field Games and Related Topics 2 Padova, September 4-7,

More information

CURRICULUM VITAE. 1322B, New main building, Beijing Normal University, Haidian District, Beijing, China.

CURRICULUM VITAE. 1322B, New main building, Beijing Normal University, Haidian District, Beijing, China. CURRICULUM VITAE Name Chuang ZHENG Sex Male Birth (date and place) April, 1982, Sichuan, China Marital Status Married, 2 children. Present Address School of Mathematics, 1322B, New main building, Beijing

More information

arxiv: v3 [quant-ph] 20 Jan 2016

arxiv: v3 [quant-ph] 20 Jan 2016 arxiv:1508.01601v3 [quant-ph] 0 Jan 016 Two-player conflicting interest Bayesian games and Bell nonlocality Haozhen Situ April 14, 018 Abstract Nonlocality, one of the most remarkable aspects of quantum

More information

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor

More information

Research Article Partial Pole Placement in LMI Region

Research Article Partial Pole Placement in LMI Region Control Science and Engineering Article ID 84128 5 pages http://dxdoiorg/11155/214/84128 Research Article Partial Pole Placement in LMI Region Liuli Ou 1 Shaobo Han 2 Yongji Wang 1 Shuai Dong 1 and Lei

More information

Solving fuzzy matrix games through a ranking value function method

Solving fuzzy matrix games through a ranking value function method Available online at wwwisr-publicationscom/jmcs J Math Computer Sci, 18 (218), 175 183 Research Article Journal Homepage: wwwtjmcscom - wwwisr-publicationscom/jmcs Solving fuzzy matrix games through a

More information

Adaptive State Feedback Nash Strategies for Linear Quadratic Discrete-Time Games

Adaptive State Feedback Nash Strategies for Linear Quadratic Discrete-Time Games Adaptive State Feedbac Nash Strategies for Linear Quadratic Discrete-Time Games Dan Shen and Jose B. Cruz, Jr. Intelligent Automation Inc., Rocville, MD 2858 USA (email: dshen@i-a-i.com). The Ohio State

More information

Dynamic tracking performance of indoor global positioning system: An experimental and theoretical study

Dynamic tracking performance of indoor global positioning system: An experimental and theoretical study Research Article Dynamic tracking performance of indoor global positioning system: An experimental and theoretical study Advances in Mechanical Engineering 015, Vol. 7(10) 1 8 Ó The Author(s) 015 DOI:

More information

Risk-Sensitive and Robust Mean Field Games

Risk-Sensitive and Robust Mean Field Games Risk-Sensitive and Robust Mean Field Games Tamer Başar Coordinated Science Laboratory Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Urbana, IL - 6181 IPAM

More information

Research Article An Impulse Model for Computer Viruses

Research Article An Impulse Model for Computer Viruses Discrete Dynamics in Nature and Society Volume 2012, Article ID 260962, 13 pages doi:10.1155/2012/260962 Research Article An Impulse Model for Computer Viruses Chunming Zhang, Yun Zhao, and Yingjiang Wu

More information

Time-delay feedback control in a delayed dynamical chaos system and its applications

Time-delay feedback control in a delayed dynamical chaos system and its applications Time-delay feedback control in a delayed dynamical chaos system and its applications Ye Zhi-Yong( ), Yang Guang( ), and Deng Cun-Bing( ) School of Mathematics and Physics, Chongqing University of Technology,

More information

Permutation transformations of tensors with an application

Permutation transformations of tensors with an application DOI 10.1186/s40064-016-3720-1 RESEARCH Open Access Permutation transformations of tensors with an application Yao Tang Li *, Zheng Bo Li, Qi Long Liu and Qiong Liu *Correspondence: liyaotang@ynu.edu.cn

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information