An Attacker-Defender Game Model with Constrained Strategies

被引:0
|
作者
Ren, Jiaqi [1 ]
Liu, Jin [1 ]
Dong, Yibo [1 ]
Li, Zhe [1 ]
Li, Weili [1 ]
机构
[1] Natl Univ Def Technol, Natl Key Lab Informat Syst Engn, Changsha 410073, Peoples R China
关键词
infrastructure attack and defense scenarios; complex networks; game theory; constrained strategies; information theory; CRITICAL INFRASTRUCTURES; PROBABILISTIC RISK; NETWORKS; CENTRALITY; RESOURCES;
D O I
10.3390/e26080624
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, research interest in the field of infrastructure attack and defense scenarios has increased. Numerous methods have been proposed for studying strategy interactions that combine complex network theory and game theory. However, the unavoidable effect of constrained strategies in complex situations has not been considered in previous studies. This study introduces a novel approach to analyzing these interactions by including the effects of constrained strategies, a factor often neglected in traditional analyses. First, we introduce the rule of constraints on strategies, which depends on the average distance between selected nodes. As the average distance increases, the probability of choosing the corresponding strategy decreases. Second, we establish an attacker-defender game model with constrained strategies based on the above rule and using information theory to evaluate the uncertainty of these strategies. Finally, we present a method for solving this problem and conduct experiments based on a target network. The results highlight the unique characteristics of the Nash equilibrium when setting constraints, as these constraints influence decision makers' Nash equilibria. When considering the constrained strategies, both the attacker and the defender tend to select strategies with lower average distances. The effect of the constraints on their strategies becomes less apparent as the number of attackable or defendable nodes increases. This research advances the field by introducing a novel framework for examining strategic interactions in infrastructure defense and attack scenarios. By incorporating strategy constraints, our work offers a new perspective on the critical area of infrastructure security.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] An Attacker-Defender Game for Honeynets
    Cai, Jin-Yi
    Yegneswaran, Vinod
    Alfeld, Chris
    Barford, Paul
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 7 - +
  • [2] Modeling a Multitarget Attacker-Defender Game with Budget Constraints
    Guan, Peiqiu
    He, Meilin
    Zhuang, Jun
    Hora, Stephen C.
    DECISION ANALYSIS, 2017, 14 (02) : 87 - 107
  • [3] Attacker-defender game from a network science perspective
    Li, Ya-Peng
    Tan, Suo-Yi
    Deng, Ye
    Wu, Jun
    CHAOS, 2018, 28 (05)
  • [4] A Temporal Model for the Prisoner's Dilemma and an Iterated Attacker-Defender Network Game
    Kovach, Nicholas
    Lamont, Gary
    PROCEEDINGS OF THE 2021 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2021, : 261 - 268
  • [5] An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects
    Al Aziz, Ridwan
    He, Meilin
    Zhuang, Jun
    RISK ANALYSIS, 2020, 40 (07) : 1481 - 1506
  • [6] Emotions in attacker-defender conflicts
    Curotto, Patricia Cernadas
    Halperin, Eran
    Sander, David
    Klimecki, Olga
    BEHAVIORAL AND BRAIN SCIENCES, 2019, 42
  • [7] A Pilot Contamination Attacker-Defender Model for Wireless Networks Under Stackelberg Game
    Wang, Zhangnan
    Wang, Yichen
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [8] A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,
  • [9] An Intelligent Pilot Contamination Attacker-Defender Model for Wireless Networks: A Stackelberg Game Based Approach
    Zhangnan Wang
    Yichen Wang
    Mobile Networks and Applications, 2022, 27 : 2163 - 2169
  • [10] Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    Zhuang, Jun
    Bier, Vicki M.
    Alagoz, Oguzhan
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2010, 203 (02) : 409 - 418