• Media type: E-Book
  • Title: Network Security and Contagion
  • Contributor: Acemoglu, Daron [Author]; Malekian, Azarakhsh [Other]; Ozdaglar, Asuman [Other]
  • Corporation: National Bureau of Economic Research
  • imprint: Cambridge, Mass: National Bureau of Economic Research, June 2013
  • Published in: NBER working paper series ; no. w19174
  • Extent: 1 Online-Ressource
  • Language: English
  • DOI: 10.3386/w19174
  • Identifier:
  • Reproduction note: Hardcopy version available to institutional subscribers
  • Origination:
  • Footnote: Mode of access: World Wide Web
    System requirements: Adobe [Acrobat] Reader required for PDF files
  • Description: We develop a theoretical model of security investments in a network of interconnected agents. Network connections introduce the possibility of cascading failures due to an exogenous or endogenous attack depending on the profile of security investments by the agents. The general presumption in the literature, based on intuitive arguments or analysis of symmetric networks, is that because security investments create positive externalities on other agents, there will be underinvestment in security. We show that this reasoning is incomplete because of a first-order economic force: security investments are also strategic substitutes. In a general (non-symmetric) network, this implies that underinvestment by some agents will encourage overinvestment by others. We demonstrate by means of examples that there can be overinvestment by some agents and also that aggregate probabilities of infection can be lower in equilibrium compared to the social optimum. We then provide sufficient conditions for underinvestment. This requires both sufficiently convex cost functions (convexity alone is not enough) and networks that are either symmetric or locally tree-like. We also characterize the impact of network structure on equilibrium and optimal investments. Finally, we show that when the attack location is endogenized (by assuming that the attacker chooses a probability distribution over the location of the attack in order to maximize damage), there is an additional incentive for overinvestment: greater investment by an agent shifts the attack to other parts of the network
  • Access State: Open Access