skip to main content
10.1145/1774088.1774486acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Nudge: intermediaries' role in interdependent network security

Published:22 March 2010Publication History

ABSTRACT

By employing an interdependent security game-theoretic framework, we study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security of the overall system. We study two different forms of intervention: rebates in combination with penalties (pay for outcome) and costsubsidies (pay for effort).

References

  1. R. Anderson. Why information security is hard -- An economic perspective. In Proc. of the 17th Annual Computer Security Applications Conference (ACSAC'01), New Orleans, LA, Dec. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Clark, J. Wroclawski, K. Sollins, and R. Braden. Tussle in cyberspace: Defining tomorrow's Internet. In Proc. of ACM SIGCOMM'02, pages 347--356, Pittsburgh, PA, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Clayton. Using early results from the 'spamHINTS' project to estimate an ISP Abuse Team's task. In Proc. of CEAS'06, Mountain View, CA, July 2006.Google ScholarGoogle Scholar
  4. N. Feamster, L. Gao, and J. Rexford. How to lease the Internet in your spare time. ACM SIGCOMM Computer Communications Review, 37(1):61--64, Jan. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Gal-Or and A. Ghose. The economic incentives for sharing security information. Information Systems Research, 16(2):186--208, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Geers and J. Goobic (Eds.). Cyber insurance. The CIP Report, 6(3):1--11, Sept. 2007.Google ScholarGoogle Scholar
  7. J. Grossklags, N. Christin, and J. Chuang. Secure or insure? A game-theoretic analysis of information security games. In Proc. of WWW08, pages 209--218, Beijing, China, Apr. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Kirk. ISPs report success in fighting malware-infected PCs, June 2009. http://www.pcworld.com/businesscenter/article/166444/isps_report_success_in_fighting_malwareinfected_pcs.html.Google ScholarGoogle Scholar
  9. E. Mills. Comcast pop-ups alert customers to PC infections. CNet, Oct. 2009. http://news.cnet.com/8301-27080_3-10370996-245.html.Google ScholarGoogle Scholar
  10. W. Norton. The art of peering: The peering playbook, 2002.Google ScholarGoogle Scholar
  11. V. Shrestha. ISP security, Feb. 2005. Tutorial provided at SANOG5 ISP/NSP Security Workshop.Google ScholarGoogle Scholar
  12. R. Thaler and C. Sunstein. Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press, New Haven, CT, 2008.Google ScholarGoogle Scholar
  13. M. van Eeten and J. M. Bauer. Economics of malware: Security decisions, incentives and externalities. STI Working Paper, May 2008.Google ScholarGoogle Scholar
  14. H. Varian. System reliability and free riding. In L. Camp and S. Lewis, editors, Economics of Information Security (Advances in Information Security, Volume 12), pages 1--15. Kluwer, Dordrecht, The Netherlands, 2004.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Nudge: intermediaries' role in interdependent network security

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
                March 2010
                2712 pages
                ISBN:9781605586397
                DOI:10.1145/1774088

                Copyright © 2010 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 22 March 2010

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • poster

                Acceptance Rates

                SAC '10 Paper Acceptance Rate364of1,353submissions,27%Overall Acceptance Rate1,650of6,669submissions,25%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader