Selfish Response to Epidemic Propagation
An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their decision depends on the tradeoff between the perceived infection and the protection cost. Aiming to help users reach an informed decision, secu...
Saved in:
| Published in | IEEE transactions on automatic control Vol. 58; no. 2; pp. 363 - 376 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
IEEE
01.02.2013
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0018-9286 1558-2523 2334-3303 1558-2523 |
| DOI | 10.1109/TAC.2012.2209949 |
Cover
| Abstract | An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their decision depends on the tradeoff between the perceived infection and the protection cost. Aiming to help users reach an informed decision, security advisories provide periodic information about the infection level in the network. We study the best-response dynamic in a network whose users repeatedly activate or de-activate security, depending on what they learn about the infection level. Our main result is the counterintuitive fact that the equilibrium level of infection increases as the users' learning rate increases. The same is true when the users follow smooth best-response dynamics, or any other continuous response function that implies higher probability of protection when learning a higher level of infection. In both cases, we characterize the stability and the domains of attraction of the equilibrium points. Our finding also holds when the epidemic propagation is simulated on human contact traces, both when all users are of the same best-response behavior type and when they are of two distinct behavior types. |
|---|---|
| AbstractList | An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their decision depends on the tradeoff between the perceived infection and the protection cost. Aiming to help users reach an informed decision, security advisories provide periodic information about the infection level in the network. We study the best-response dynamic in a network whose users repeatedly activate or de-activate security, depending on what they learn about the infection level. Our main result is the counterintuitive fact that the equilibrium level of infection increases as the users' learning rate increases. The same is true when the users follow smooth best-response dynamics, or any other continuous response function that implies higher probability of protection when learning a higher level of infection. In both cases, we characterize the stability and the domains of attraction of the equilibrium points. Our finding also holds when the epidemic propagation is simulated on human contact traces, both when all users are of the same best-response behavior type and when they are of two distinct behavior types. |
| Author | Le Boudec, Jean-Yves Baras, J. S. Theodorakopoulos, G. |
| Author_xml | – sequence: 1 givenname: G. surname: Theodorakopoulos fullname: Theodorakopoulos, G. email: g.theodorakopoulos@cs.cardiff.ac.uk organization: Sch. of Comput. Sci. & Inf., Cardiff Univ., Cardiff, UK – sequence: 2 givenname: Jean-Yves surname: Le Boudec fullname: Le Boudec, Jean-Yves email: jean-yves.leboudec@epfl.ch organization: Sch. of Comput. & Commun. Sci., Ecole Polytech. Fed. de Lausanne (EPFL), Lausanne, Switzerland – sequence: 3 givenname: J. S. surname: Baras fullname: Baras, J. S. email: baras@umd.edu organization: Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA |
| BookMark | eNp90M9LwzAUwPEgE9ymd8FLj15a815-tDmOMX_AQNF5LmmaaKRrS1OR_fd2dniY4Cm8w-c9vpmRSd3UlpBLoAkAVTebxTJBCpggUqW4OiFTECKLUSCbkCmlkMUKM3lGZiF8DKPkHKbk-sVWzof36NmGtqmDjfomWrW-tFtvoqeuafWb7n1Tn5NTp6tgLw7vnLzerjbL-3j9ePewXKxjw1LRx1xLx5xgVKFIEbRxhSwKw2mpCrRKlhIEl1YAc1BkgIXG0qlSpBqFcYqxOYFx72fd6t2Xrqq87fxWd7scaL5PzXtt8n1qfkgdDB2N6ZoQOuv-kOF3jok8Isb3P6F9p331H7waobfW_t6RQy3HjH0D321xMQ |
| CODEN | IETAA9 |
| CitedBy_id | crossref_primary_10_1016_j_automatica_2020_109063 crossref_primary_10_1109_LCSYS_2023_3273504 crossref_primary_10_1016_j_amc_2022_127453 crossref_primary_10_1109_TAC_2020_2975811 crossref_primary_10_1016_j_eswa_2017_06_042 crossref_primary_10_1016_j_jnca_2019_102420 crossref_primary_10_1109_MCS_2015_2495000 crossref_primary_10_1109_TNSE_2024_3464852 crossref_primary_10_1186_s40649_015_0025_4 crossref_primary_10_1016_j_im_2018_11_003 crossref_primary_10_1109_ACCESS_2019_2927220 crossref_primary_10_1109_TNSE_2017_2766665 crossref_primary_10_1109_TDSC_2013_57 crossref_primary_10_1145_2635673 crossref_primary_10_1007_s13235_023_00529_4 crossref_primary_10_1007_s11432_020_3076_1 crossref_primary_10_1109_TCNS_2023_3312250 crossref_primary_10_1007_s13235_022_00428_0 crossref_primary_10_1137_20M1376923 crossref_primary_10_1007_s13235_021_00403_1 crossref_primary_10_3390_e20030204 crossref_primary_10_3390_info13040181 crossref_primary_10_1109_TCNS_2015_2426755 crossref_primary_10_1109_TCNS_2019_2897904 crossref_primary_10_1109_TIFS_2017_2687883 crossref_primary_10_1109_TCYB_2020_2975530 crossref_primary_10_1007_s13235_018_0284_4 crossref_primary_10_3390_fi9040088 |
| Cites_doi | 10.1016/j.jcss.2006.02.003 10.1137/S0036144500371907 10.2307/1914185 10.1145/1375457.1375463 10.1109/ITA.2009.5044961 10.1017/CBO9781139173179 10.1007/978-94-015-7793-9 10.1145/586110.586130 10.1090/S0273-0979-03-00988-1 10.1145/948187.948190 10.1109/TNET.2010.2071397 10.1109/RISP.1991.130801 10.1109/TNET.2007.909678 10.1109/ACC.2011.5991557 10.1109/ICCCN.2009.5235239 10.1109/INFCOM.2005.1498374 10.1145/1870178.1870189 10.1109/MSECP.2003.1219056 10.1137/1.9781611970333 10.1214/aos/1176344212 |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION ADTOC UNPAY |
| DOI | 10.1109/TAC.2012.2209949 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-2523 |
| EndPage | 376 |
| ExternalDocumentID | oai:infoscience.epfl.ch:152252 10_1109_TAC_2012_2209949 6257428 |
| Genre | orig-research |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 VJK ~02 AAYXX CITATION ADTOC UNPAY |
| ID | FETCH-LOGICAL-c375t-4a6f3f530925721acfb6bbc40d9b2e96d61546e513f1b812ba2df9d57a25cf933 |
| IEDL.DBID | RIE |
| ISSN | 0018-9286 1558-2523 2334-3303 |
| IngestDate | Wed Oct 29 12:05:10 EDT 2025 Wed Oct 01 01:53:39 EDT 2025 Thu Apr 24 23:01:16 EDT 2025 Wed Aug 27 02:52:18 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c375t-4a6f3f530925721acfb6bbc40d9b2e96d61546e513f1b812ba2df9d57a25cf933 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=http://infoscience.epfl.ch/record/152252 |
| PageCount | 14 |
| ParticipantIDs | ieee_primary_6257428 crossref_primary_10_1109_TAC_2012_2209949 unpaywall_primary_10_1109_tac_2012_2209949 crossref_citationtrail_10_1109_TAC_2012_2209949 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2013-02-01 |
| PublicationDateYYYYMMDD | 2013-02-01 |
| PublicationDate_xml | – month: 02 year: 2013 text: 2013-02-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE transactions on automatic control |
| PublicationTitleAbbrev | TAC |
| PublicationYear | 2013 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref13 ref15 dulac (ref29) 1937; 204 ref10 (ref12) 0 ref1 ref16 ref19 dolgoarshinnykh (ref26) 2010 filippov (ref24) 1988 moscibroda (ref7) 2006 hethcote (ref14) 2000; 42 ref25 ref22 ref21 sandholm (ref23) 2010 (ref11) 0 ref28 ref27 scott (ref30) 2006 ref8 weibull (ref20) 1997 ref4 zou (ref17) 2002 ref3 (ref2) 2009 ref6 ref5 barnes (ref31) 2004; 83 moore (ref18) 2003; 1 schneier (ref9) 2008 |
| References_xml | – year: 2009 ident: ref2 publication-title: Calculating the size of the downadup outbreak – ident: ref6 doi: 10.1016/j.jcss.2006.02.003 – volume: 42 start-page: 599 year: 2000 ident: ref14 article-title: The mathematics of infectious diseases publication-title: SIAM Rev doi: 10.1137/S0036144500371907 – year: 2008 ident: ref9 publication-title: How to sell security – ident: ref10 doi: 10.2307/1914185 – volume: 83 start-page: 279 year: 2004 ident: ref31 article-title: Deworming the internet publication-title: Texas Law Rev – year: 0 ident: ref11 – ident: ref5 doi: 10.1145/1375457.1375463 – ident: ref3 doi: 10.1109/ITA.2009.5044961 – ident: ref21 doi: 10.1017/CBO9781139173179 – year: 1988 ident: ref24 publication-title: Differential Equations with Discontinuous Righthand Sides doi: 10.1007/978-94-015-7793-9 – start-page: 138 year: 2002 ident: ref17 article-title: Code red worm propagation modeling and analysis publication-title: Proc 9th ACM Conf Comput Commun Security doi: 10.1145/586110.586130 – year: 1997 ident: ref20 publication-title: Evolutionary Game Theory – ident: ref22 doi: 10.1090/S0273-0979-03-00988-1 – year: 2010 ident: ref23 publication-title: Population Games and Evolutionary Dynamics – ident: ref1 doi: 10.1145/948187.948190 – start-page: 35 year: 2006 ident: ref7 article-title: When selfish meets evil: Byzantine players in a virus inoculation game publication-title: Proc ACM Symp Principles Distributed Computing – ident: ref4 doi: 10.1109/TNET.2010.2071397 – ident: ref15 doi: 10.1109/RISP.1991.130801 – ident: ref16 doi: 10.1109/TNET.2007.909678 – year: 0 ident: ref12 publication-title: Mobile malware descriptions – ident: ref25 doi: 10.1109/ACC.2011.5991557 – ident: ref8 doi: 10.1109/ICCCN.2009.5235239 – year: 2010 ident: ref26 publication-title: Law of large numbers for the SIRS epidemic processes – ident: ref19 doi: 10.1109/INFCOM.2005.1498374 – volume: 204 start-page: 1703 year: 1937 ident: ref29 article-title: Recherche des cycles limites publication-title: CR Acad Sci Paris – year: 2006 ident: ref30 publication-title: CRAWDAD data set Cambridge/Haggle (v 2006-09-15) – ident: ref13 doi: 10.1145/1870178.1870189 – volume: 1 start-page: 33 year: 2003 ident: ref18 article-title: Inside the slammer worm publication-title: IEEE Security Privacy doi: 10.1109/MSECP.2003.1219056 – ident: ref27 doi: 10.1137/1.9781611970333 – ident: ref28 doi: 10.1214/aos/1176344212 |
| SSID | ssj0016441 |
| Score | 2.332666 |
| Snippet | An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their... |
| SourceID | unpaywall crossref ieee |
| SourceType | Open Access Repository Enrichment Source Index Database Publisher |
| StartPage | 363 |
| SubjectTerms | Communication networks differential inclusions Invasive software Nonlinear systems Security Switched systems |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kHtSDb7G-yMGDCqnZZ7rHIooIimgL9RR2N7tWDG1pU0R_vbNJWiuC4n2ykJnd-WY2k-9D6NjZ2DCCaYhFqkOGrQm11CJMWdx0kdAusv6-4_ZOXHfYTZd3v-47vFer1A_p2GUN05tqowHQEA7JdlFwqLpraLFzd996KhMtnFlSiDoCOkLgeaHqRihlIbTrdPp1MpLnufK0hZg0iP9l1BNozqFRIa-ygpYm_aF6f1NZNoc0V2sl7dG4ICj0AyavjUmuG-bjJ33jny-xjlarcjNolftjAy3Y_iZamSMh3EInjzZzL-Ne8FCOy9ogHwSXpXCsCe5H0FU_F-HbRp2ry_bFdVjpJ4SGxjwPmRKOOk4jCeeSYGWcFlobFqVSEytFCtUME5Zj6rAGoNeKpE6mPFaEGycp3UG1_qBvd1FgjZIAdzHRRjOhIk2t4Cx1pgl7wGFcR-dTPyamIhf3GhdZUjQZkUzarYvEez6pPF9Hp7MnhiWxxi-2Wz40Mzvo2aCjb9bR2SxUP9aASH9bY-8_xvtomRSyF35s5QDV8tHEHkLxkeujat99Av_b0SA priority: 102 providerName: Unpaywall |
| Title | Selfish Response to Epidemic Propagation |
| URI | https://ieeexplore.ieee.org/document/6257428 http://infoscience.epfl.ch/record/152252 |
| UnpaywallVersion | submittedVersion |
| Volume | 58 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2523 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016441 issn: 1558-2523 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_MedAd_BbnFz14ULFbm6ZpcxxjMgTH0A3mqSRpouLoRFtE_3qTtivzA_GWQ_Iafi_pey_vC-BEyUBg5Hq2S2JuY1cKm1NO7BgHoXIIV4407x3XA9If46uJP6nBRZULI6XMg89kywxzX348E5l5KmtrXV1bcuESLAUhKXK1Ko-BkevFX1dfYBRWLkmHtkedronhQi1k8kRN1cwFEZT3VGnASpY8s_c3Np0uiJfLdbieb6yIKnlqZSlviY9vNRv_u_MNWCv1TKtTHIxNqMlkCxoL1Qe34fRWTtXj64N1U8TJSiudWb2iY6ywhi_anL7P-bYD48veqNu3y8YJtvACP7UxI8pTvudQ_VnkMqE44VxgJ6YcSUpircZgIn3XUy7XEp4zFCsa-wFDvlDU83ahnswSuQeWFIxqORcgLjgmzOGeJD6OlQg185XrNqE9xzISZVVx09xiGuXWhUMjjX5k0I9K9JtwVq14Lipq_DF322BZzSthbMJ5xa4fNFImvtDY_53GAayivLOFiUw5hHr6kskjrV-k_Dg_WMewPB4MO3ef8sXMIQ |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGEoH3ojyzMAAiKSJYzv1iFBRgbZCUCS2yHZsQFRtVVIh-PXYSYjKQ4jNg32xvrNzd74XwIFWkcQoCN2AJsLFgZKuYIK6CY4a2qdC-8q-d3S6tHWHL-_J_QyclLkwSqks-Ex5dpj58pOhnNinsrrR1Y0l15iFeYIxJnm2VukzsJI9_--aK4wapVPSZ_Xe6ZmN4kIespmitm7mlBDKuqpUoTIZjPjbK-_3pwTM-RJ0PreWx5U8e5NUePL9W9XG_-59GRYLTdM5zY_GCsyowSpUp-oPrsHhrerrp5dH5yaPlFVOOnSaec9Y6VyPjUH9kHFuHe7Om72zllu0TnBlGJHUxZzqUJPQZ-azKOBSCyqExH7CBFKMJkaRwVSRINSBMDJecJRolpCIIyI1C8MNmBsMB2oTHCU5M5IuQkIKTLkvQkUJTrRsGPbrIKhB_RPLWBZ1xW17i36c2Rc-iw36sUU_LtCvwVG5YpTX1Phj7prFspxXwFiD45JdP2ikXH6hsfU7jX2otHqddty-6F5twwLK-lzYOJUdmEvHE7VrtI1U7GWH7ANiLM2- |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kHtSDb7G-yMGDCqnZZ7rHIooIimgL9RR2N7tWDG1pU0R_vbNJWiuC4n2ykJnd-WY2k-9D6NjZ2DCCaYhFqkOGrQm11CJMWdx0kdAusv6-4_ZOXHfYTZd3v-47vFer1A_p2GUN05tqowHQEA7JdlFwqLpraLFzd996KhMtnFlSiDoCOkLgeaHqRihlIbTrdPp1MpLnufK0hZg0iP9l1BNozqFRIa-ygpYm_aF6f1NZNoc0V2sl7dG4ICj0AyavjUmuG-bjJ33jny-xjlarcjNolftjAy3Y_iZamSMh3EInjzZzL-Ne8FCOy9ogHwSXpXCsCe5H0FU_F-HbRp2ry_bFdVjpJ4SGxjwPmRKOOk4jCeeSYGWcFlobFqVSEytFCtUME5Zj6rAGoNeKpE6mPFaEGycp3UG1_qBvd1FgjZIAdzHRRjOhIk2t4Cx1pgl7wGFcR-dTPyamIhf3GhdZUjQZkUzarYvEez6pPF9Hp7MnhiWxxi-2Wz40Mzvo2aCjb9bR2SxUP9aASH9bY-8_xvtomRSyF35s5QDV8tHEHkLxkeujat99Av_b0SA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Selfish+Response+to+Epidemic+Propagation&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Theodorakopoulos%2C+G.&rft.au=Le+Boudec%2C+Jean-Yves&rft.au=Baras%2C+J.+S.&rft.date=2013-02-01&rft.pub=IEEE&rft.issn=0018-9286&rft.volume=58&rft.issue=2&rft.spage=363&rft.epage=376&rft_id=info:doi/10.1109%2FTAC.2012.2209949&rft.externalDocID=6257428 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon |