Selfish Response to Epidemic Propagation

An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their decision depends on the tradeoff between the perceived infection and the protection cost. Aiming to help users reach an informed decision, secu...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on automatic control Vol. 58; no. 2; pp. 363 - 376
Main Authors Theodorakopoulos, G., Le Boudec, Jean-Yves, Baras, J. S.
Format Journal Article
LanguageEnglish
Published IEEE 01.02.2013
Subjects
Online AccessGet full text
ISSN0018-9286
1558-2523
2334-3303
1558-2523
DOI10.1109/TAC.2012.2209949

Cover

Abstract An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their decision depends on the tradeoff between the perceived infection and the protection cost. Aiming to help users reach an informed decision, security advisories provide periodic information about the infection level in the network. We study the best-response dynamic in a network whose users repeatedly activate or de-activate security, depending on what they learn about the infection level. Our main result is the counterintuitive fact that the equilibrium level of infection increases as the users' learning rate increases. The same is true when the users follow smooth best-response dynamics, or any other continuous response function that implies higher probability of protection when learning a higher level of infection. In both cases, we characterize the stability and the domains of attraction of the equilibrium points. Our finding also holds when the epidemic propagation is simulated on human contact traces, both when all users are of the same best-response behavior type and when they are of two distinct behavior types.
AbstractList An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their decision depends on the tradeoff between the perceived infection and the protection cost. Aiming to help users reach an informed decision, security advisories provide periodic information about the infection level in the network. We study the best-response dynamic in a network whose users repeatedly activate or de-activate security, depending on what they learn about the infection level. Our main result is the counterintuitive fact that the equilibrium level of infection increases as the users' learning rate increases. The same is true when the users follow smooth best-response dynamics, or any other continuous response function that implies higher probability of protection when learning a higher level of infection. In both cases, we characterize the stability and the domains of attraction of the equilibrium points. Our finding also holds when the epidemic propagation is simulated on human contact traces, both when all users are of the same best-response behavior type and when they are of two distinct behavior types.
Author Le Boudec, Jean-Yves
Baras, J. S.
Theodorakopoulos, G.
Author_xml – sequence: 1
  givenname: G.
  surname: Theodorakopoulos
  fullname: Theodorakopoulos, G.
  email: g.theodorakopoulos@cs.cardiff.ac.uk
  organization: Sch. of Comput. Sci. & Inf., Cardiff Univ., Cardiff, UK
– sequence: 2
  givenname: Jean-Yves
  surname: Le Boudec
  fullname: Le Boudec, Jean-Yves
  email: jean-yves.leboudec@epfl.ch
  organization: Sch. of Comput. & Commun. Sci., Ecole Polytech. Fed. de Lausanne (EPFL), Lausanne, Switzerland
– sequence: 3
  givenname: J. S.
  surname: Baras
  fullname: Baras, J. S.
  email: baras@umd.edu
  organization: Dept. of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA
BookMark eNp90M9LwzAUwPEgE9ymd8FLj15a815-tDmOMX_AQNF5LmmaaKRrS1OR_fd2dniY4Cm8w-c9vpmRSd3UlpBLoAkAVTebxTJBCpggUqW4OiFTECKLUSCbkCmlkMUKM3lGZiF8DKPkHKbk-sVWzof36NmGtqmDjfomWrW-tFtvoqeuafWb7n1Tn5NTp6tgLw7vnLzerjbL-3j9ePewXKxjw1LRx1xLx5xgVKFIEbRxhSwKw2mpCrRKlhIEl1YAc1BkgIXG0qlSpBqFcYqxOYFx72fd6t2Xrqq87fxWd7scaL5PzXtt8n1qfkgdDB2N6ZoQOuv-kOF3jok8Isb3P6F9p331H7waobfW_t6RQy3HjH0D321xMQ
CODEN IETAA9
CitedBy_id crossref_primary_10_1016_j_automatica_2020_109063
crossref_primary_10_1109_LCSYS_2023_3273504
crossref_primary_10_1016_j_amc_2022_127453
crossref_primary_10_1109_TAC_2020_2975811
crossref_primary_10_1016_j_eswa_2017_06_042
crossref_primary_10_1016_j_jnca_2019_102420
crossref_primary_10_1109_MCS_2015_2495000
crossref_primary_10_1109_TNSE_2024_3464852
crossref_primary_10_1186_s40649_015_0025_4
crossref_primary_10_1016_j_im_2018_11_003
crossref_primary_10_1109_ACCESS_2019_2927220
crossref_primary_10_1109_TNSE_2017_2766665
crossref_primary_10_1109_TDSC_2013_57
crossref_primary_10_1145_2635673
crossref_primary_10_1007_s13235_023_00529_4
crossref_primary_10_1007_s11432_020_3076_1
crossref_primary_10_1109_TCNS_2023_3312250
crossref_primary_10_1007_s13235_022_00428_0
crossref_primary_10_1137_20M1376923
crossref_primary_10_1007_s13235_021_00403_1
crossref_primary_10_3390_e20030204
crossref_primary_10_3390_info13040181
crossref_primary_10_1109_TCNS_2015_2426755
crossref_primary_10_1109_TCNS_2019_2897904
crossref_primary_10_1109_TIFS_2017_2687883
crossref_primary_10_1109_TCYB_2020_2975530
crossref_primary_10_1007_s13235_018_0284_4
crossref_primary_10_3390_fi9040088
Cites_doi 10.1016/j.jcss.2006.02.003
10.1137/S0036144500371907
10.2307/1914185
10.1145/1375457.1375463
10.1109/ITA.2009.5044961
10.1017/CBO9781139173179
10.1007/978-94-015-7793-9
10.1145/586110.586130
10.1090/S0273-0979-03-00988-1
10.1145/948187.948190
10.1109/TNET.2010.2071397
10.1109/RISP.1991.130801
10.1109/TNET.2007.909678
10.1109/ACC.2011.5991557
10.1109/ICCCN.2009.5235239
10.1109/INFCOM.2005.1498374
10.1145/1870178.1870189
10.1109/MSECP.2003.1219056
10.1137/1.9781611970333
10.1214/aos/1176344212
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
ADTOC
UNPAY
DOI 10.1109/TAC.2012.2209949
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2523
EndPage 376
ExternalDocumentID oai:infoscience.epfl.ch:152252
10_1109_TAC_2012_2209949
6257428
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
VJK
~02
AAYXX
CITATION
ADTOC
UNPAY
ID FETCH-LOGICAL-c375t-4a6f3f530925721acfb6bbc40d9b2e96d61546e513f1b812ba2df9d57a25cf933
IEDL.DBID RIE
ISSN 0018-9286
1558-2523
2334-3303
IngestDate Wed Oct 29 12:05:10 EDT 2025
Wed Oct 01 01:53:39 EDT 2025
Thu Apr 24 23:01:16 EDT 2025
Wed Aug 27 02:52:18 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c375t-4a6f3f530925721acfb6bbc40d9b2e96d61546e513f1b812ba2df9d57a25cf933
OpenAccessLink https://proxy.k.utb.cz/login?url=http://infoscience.epfl.ch/record/152252
PageCount 14
ParticipantIDs ieee_primary_6257428
crossref_primary_10_1109_TAC_2012_2209949
unpaywall_primary_10_1109_tac_2012_2209949
crossref_citationtrail_10_1109_TAC_2012_2209949
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2013-02-01
PublicationDateYYYYMMDD 2013-02-01
PublicationDate_xml – month: 02
  year: 2013
  text: 2013-02-01
  day: 01
PublicationDecade 2010
PublicationTitle IEEE transactions on automatic control
PublicationTitleAbbrev TAC
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
References ref13
ref15
dulac (ref29) 1937; 204
ref10
(ref12) 0
ref1
ref16
ref19
dolgoarshinnykh (ref26) 2010
filippov (ref24) 1988
moscibroda (ref7) 2006
hethcote (ref14) 2000; 42
ref25
ref22
ref21
sandholm (ref23) 2010
(ref11) 0
ref28
ref27
scott (ref30) 2006
ref8
weibull (ref20) 1997
ref4
zou (ref17) 2002
ref3
(ref2) 2009
ref6
ref5
barnes (ref31) 2004; 83
moore (ref18) 2003; 1
schneier (ref9) 2008
References_xml – year: 2009
  ident: ref2
  publication-title: Calculating the size of the downadup outbreak
– ident: ref6
  doi: 10.1016/j.jcss.2006.02.003
– volume: 42
  start-page: 599
  year: 2000
  ident: ref14
  article-title: The mathematics of infectious diseases
  publication-title: SIAM Rev
  doi: 10.1137/S0036144500371907
– year: 2008
  ident: ref9
  publication-title: How to sell security
– ident: ref10
  doi: 10.2307/1914185
– volume: 83
  start-page: 279
  year: 2004
  ident: ref31
  article-title: Deworming the internet
  publication-title: Texas Law Rev
– year: 0
  ident: ref11
– ident: ref5
  doi: 10.1145/1375457.1375463
– ident: ref3
  doi: 10.1109/ITA.2009.5044961
– ident: ref21
  doi: 10.1017/CBO9781139173179
– year: 1988
  ident: ref24
  publication-title: Differential Equations with Discontinuous Righthand Sides
  doi: 10.1007/978-94-015-7793-9
– start-page: 138
  year: 2002
  ident: ref17
  article-title: Code red worm propagation modeling and analysis
  publication-title: Proc 9th ACM Conf Comput Commun Security
  doi: 10.1145/586110.586130
– year: 1997
  ident: ref20
  publication-title: Evolutionary Game Theory
– ident: ref22
  doi: 10.1090/S0273-0979-03-00988-1
– year: 2010
  ident: ref23
  publication-title: Population Games and Evolutionary Dynamics
– ident: ref1
  doi: 10.1145/948187.948190
– start-page: 35
  year: 2006
  ident: ref7
  article-title: When selfish meets evil: Byzantine players in a virus inoculation game
  publication-title: Proc ACM Symp Principles Distributed Computing
– ident: ref4
  doi: 10.1109/TNET.2010.2071397
– ident: ref15
  doi: 10.1109/RISP.1991.130801
– ident: ref16
  doi: 10.1109/TNET.2007.909678
– year: 0
  ident: ref12
  publication-title: Mobile malware descriptions
– ident: ref25
  doi: 10.1109/ACC.2011.5991557
– ident: ref8
  doi: 10.1109/ICCCN.2009.5235239
– year: 2010
  ident: ref26
  publication-title: Law of large numbers for the SIRS epidemic processes
– ident: ref19
  doi: 10.1109/INFCOM.2005.1498374
– volume: 204
  start-page: 1703
  year: 1937
  ident: ref29
  article-title: Recherche des cycles limites
  publication-title: CR Acad Sci Paris
– year: 2006
  ident: ref30
  publication-title: CRAWDAD data set Cambridge/Haggle (v 2006-09-15)
– ident: ref13
  doi: 10.1145/1870178.1870189
– volume: 1
  start-page: 33
  year: 2003
  ident: ref18
  article-title: Inside the slammer worm
  publication-title: IEEE Security Privacy
  doi: 10.1109/MSECP.2003.1219056
– ident: ref27
  doi: 10.1137/1.9781611970333
– ident: ref28
  doi: 10.1214/aos/1176344212
SSID ssj0016441
Score 2.332666
Snippet An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their...
SourceID unpaywall
crossref
ieee
SourceType Open Access Repository
Enrichment Source
Index Database
Publisher
StartPage 363
SubjectTerms Communication networks
differential inclusions
Invasive software
Nonlinear systems
Security
Switched systems
SummonAdditionalLinks – databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kHtSDb7G-yMGDCqnZZ7rHIooIimgL9RR2N7tWDG1pU0R_vbNJWiuC4n2ykJnd-WY2k-9D6NjZ2DCCaYhFqkOGrQm11CJMWdx0kdAusv6-4_ZOXHfYTZd3v-47vFer1A_p2GUN05tqowHQEA7JdlFwqLpraLFzd996KhMtnFlSiDoCOkLgeaHqRihlIbTrdPp1MpLnufK0hZg0iP9l1BNozqFRIa-ygpYm_aF6f1NZNoc0V2sl7dG4ICj0AyavjUmuG-bjJ33jny-xjlarcjNolftjAy3Y_iZamSMh3EInjzZzL-Ne8FCOy9ogHwSXpXCsCe5H0FU_F-HbRp2ry_bFdVjpJ4SGxjwPmRKOOk4jCeeSYGWcFlobFqVSEytFCtUME5Zj6rAGoNeKpE6mPFaEGycp3UG1_qBvd1FgjZIAdzHRRjOhIk2t4Cx1pgl7wGFcR-dTPyamIhf3GhdZUjQZkUzarYvEez6pPF9Hp7MnhiWxxi-2Wz40Mzvo2aCjb9bR2SxUP9aASH9bY-8_xvtomRSyF35s5QDV8tHEHkLxkeujat99Av_b0SA
  priority: 102
  providerName: Unpaywall
Title Selfish Response to Epidemic Propagation
URI https://ieeexplore.ieee.org/document/6257428
http://infoscience.epfl.ch/record/152252
UnpaywallVersion submittedVersion
Volume 58
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-2523
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016441
  issn: 1558-2523
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_MedAd_BbnFz14ULFbm6ZpcxxjMgTH0A3mqSRpouLoRFtE_3qTtivzA_GWQ_Iafi_pey_vC-BEyUBg5Hq2S2JuY1cKm1NO7BgHoXIIV4407x3XA9If46uJP6nBRZULI6XMg89kywxzX348E5l5KmtrXV1bcuESLAUhKXK1Ko-BkevFX1dfYBRWLkmHtkedronhQi1k8kRN1cwFEZT3VGnASpY8s_c3Np0uiJfLdbieb6yIKnlqZSlviY9vNRv_u_MNWCv1TKtTHIxNqMlkCxoL1Qe34fRWTtXj64N1U8TJSiudWb2iY6ywhi_anL7P-bYD48veqNu3y8YJtvACP7UxI8pTvudQ_VnkMqE44VxgJ6YcSUpircZgIn3XUy7XEp4zFCsa-wFDvlDU83ahnswSuQeWFIxqORcgLjgmzOGeJD6OlQg185XrNqE9xzISZVVx09xiGuXWhUMjjX5k0I9K9JtwVq14Lipq_DF322BZzSthbMJ5xa4fNFImvtDY_53GAayivLOFiUw5hHr6kskjrV-k_Dg_WMewPB4MO3ef8sXMIQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGEoH3ojyzMAAiKSJYzv1iFBRgbZCUCS2yHZsQFRtVVIh-PXYSYjKQ4jNg32xvrNzd74XwIFWkcQoCN2AJsLFgZKuYIK6CY4a2qdC-8q-d3S6tHWHL-_J_QyclLkwSqks-Ex5dpj58pOhnNinsrrR1Y0l15iFeYIxJnm2VukzsJI9_--aK4wapVPSZ_Xe6ZmN4kIespmitm7mlBDKuqpUoTIZjPjbK-_3pwTM-RJ0PreWx5U8e5NUePL9W9XG_-59GRYLTdM5zY_GCsyowSpUp-oPrsHhrerrp5dH5yaPlFVOOnSaec9Y6VyPjUH9kHFuHe7Om72zllu0TnBlGJHUxZzqUJPQZ-azKOBSCyqExH7CBFKMJkaRwVSRINSBMDJecJRolpCIIyI1C8MNmBsMB2oTHCU5M5IuQkIKTLkvQkUJTrRsGPbrIKhB_RPLWBZ1xW17i36c2Rc-iw36sUU_LtCvwVG5YpTX1Phj7prFspxXwFiD45JdP2ikXH6hsfU7jX2otHqddty-6F5twwLK-lzYOJUdmEvHE7VrtI1U7GWH7ANiLM2-
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kHtSDb7G-yMGDCqnZZ7rHIooIimgL9RR2N7tWDG1pU0R_vbNJWiuC4n2ykJnd-WY2k-9D6NjZ2DCCaYhFqkOGrQm11CJMWdx0kdAusv6-4_ZOXHfYTZd3v-47vFer1A_p2GUN05tqowHQEA7JdlFwqLpraLFzd996KhMtnFlSiDoCOkLgeaHqRihlIbTrdPp1MpLnufK0hZg0iP9l1BNozqFRIa-ygpYm_aF6f1NZNoc0V2sl7dG4ICj0AyavjUmuG-bjJ33jny-xjlarcjNolftjAy3Y_iZamSMh3EInjzZzL-Ne8FCOy9ogHwSXpXCsCe5H0FU_F-HbRp2ry_bFdVjpJ4SGxjwPmRKOOk4jCeeSYGWcFlobFqVSEytFCtUME5Zj6rAGoNeKpE6mPFaEGycp3UG1_qBvd1FgjZIAdzHRRjOhIk2t4Cx1pgl7wGFcR-dTPyamIhf3GhdZUjQZkUzarYvEez6pPF9Hp7MnhiWxxi-2Wz40Mzvo2aCjb9bR2SxUP9aASH9bY-8_xvtomRSyF35s5QDV8tHEHkLxkeujat99Av_b0SA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Selfish+Response+to+Epidemic+Propagation&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Theodorakopoulos%2C+G.&rft.au=Le+Boudec%2C+Jean-Yves&rft.au=Baras%2C+J.+S.&rft.date=2013-02-01&rft.pub=IEEE&rft.issn=0018-9286&rft.volume=58&rft.issue=2&rft.spage=363&rft.epage=376&rft_id=info:doi/10.1109%2FTAC.2012.2209949&rft.externalDocID=6257428
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon