DocumentCode
3230290
Title
Economics of malware: Epidemic risks model, network externalities and incentives
Author
Lelarge, Marc
Author_Institution
Fac. of INRIA, ENS, Paris, France
fYear
2009
fDate
Sept. 30 2009-Oct. 2 2009
Firstpage
1353
Lastpage
1360
Abstract
Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impact are also influenced by the decisions of legitimate end users. Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arising from the presence of network externalities. Our goal in this paper is to model and quantify the impact of such externalities on the investment in security features in a network. We study a network of interconnected agents, which are subject to epidemic risks such as those caused by propagating viruses and worms. Each agent can decide whether or not to invest some amount to self-protect and deploy security solutions which decreases the probability of contagion. Borrowing ideas from random graphs theory, we solve explicitly this ´micro´-model and compute the fulfilled expectations equilibria. We are able to compute the network externalities as a function of the parameters of the epidemic. We show that the network externalities have a public part and a private one. As a result of this separation, some counter-intuitive phenomena can occur: there are situations where the incentive to invest in self-protection decreases as the fraction of the population investing in self-protection increases. In a situation where the protection is strong and ensures that the protected agent cannot be harmed by the decision of others, we show that the situation is similar to a free-rider problem. In a situation where the protection is weaker, then we show that the network can exhibit critical mass. We also look at interaction with the security supplier. In the case where security is provided by a monopolist, we show that the monopolist is taking advantage of these positive network externalities by providing a low quality protection.
Keywords
invasive software; software agents; epidemic risks model; incentives model; interconnected agents network; malware; network externalities model; Computer networks; Computer viruses; Computer worms; Graph theory; IP networks; Investments; Protection; Protocols; Security; Software systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on
Conference_Location
Monticello, IL
Print_ISBN
978-1-4244-5870-7
Type
conf
DOI
10.1109/ALLERTON.2009.5394516
Filename
5394516
Link To Document