An Attacker-Defender Game Model with Constrained Strategies

被引:0
|
作者
Ren, Jiaqi [1 ]
Liu, Jin [1 ]
Dong, Yibo [1 ]
Li, Zhe [1 ]
Li, Weili [1 ]
机构
[1] Natl Univ Def Technol, Natl Key Lab Informat Syst Engn, Changsha 410073, Peoples R China
关键词
infrastructure attack and defense scenarios; complex networks; game theory; constrained strategies; information theory; CRITICAL INFRASTRUCTURES; PROBABILISTIC RISK; NETWORKS; CENTRALITY; RESOURCES;
D O I
10.3390/e26080624
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, research interest in the field of infrastructure attack and defense scenarios has increased. Numerous methods have been proposed for studying strategy interactions that combine complex network theory and game theory. However, the unavoidable effect of constrained strategies in complex situations has not been considered in previous studies. This study introduces a novel approach to analyzing these interactions by including the effects of constrained strategies, a factor often neglected in traditional analyses. First, we introduce the rule of constraints on strategies, which depends on the average distance between selected nodes. As the average distance increases, the probability of choosing the corresponding strategy decreases. Second, we establish an attacker-defender game model with constrained strategies based on the above rule and using information theory to evaluate the uncertainty of these strategies. Finally, we present a method for solving this problem and conduct experiments based on a target network. The results highlight the unique characteristics of the Nash equilibrium when setting constraints, as these constraints influence decision makers' Nash equilibria. When considering the constrained strategies, both the attacker and the defender tend to select strategies with lower average distances. The effect of the constraints on their strategies becomes less apparent as the number of attackable or defendable nodes increases. This research advances the field by introducing a novel framework for examining strategic interactions in infrastructure defense and attack scenarios. By incorporating strategy constraints, our work offers a new perspective on the critical area of infrastructure security.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game
    Abdallah, Mustafa
    Cason, Timothy
    Bagchi, Saurabh
    Sundaram, Shreyas
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 933 - 938
  • [22] Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game
    Hunt, Kyle
    Agarwal, Puneet
    Zhuang, Jun
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 207
  • [23] Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors
    Kassem Kallas
    Quentin Le Roux
    Wassim Hamidouche
    Teddy Furon
    EURASIP Journal on Information Security, 2024 (1)
  • [24] A Time Correlated Attacker-Defender Model for Smart Grid Communication Networks
    Bi, Ying
    Jamalipour, Abbas
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 815 - 819
  • [25] On the adoption of new technology to enhance counterterrorism measures: An attacker-defender game with risk preferences
    Hunt, Kyle
    Agarwal, Puneet
    Zhuang, Jun
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2022, 218
  • [26] An experimental analysis of risk effects in attacker-defender games
    Holt, Charles A.
    Sahu, Ricky
    Smith, Angela M.
    SOUTHERN ECONOMIC JOURNAL, 2022, 89 (01) : 185 - 215
  • [27] Network Defence Using Attacker-Defender Interaction Modelling
    Medkova, Jana
    Celeda, Pavel
    MANAGEMENT AND SECURITY IN THE AGE OF HYPERCONNECTIVITY, AIMS 2016, 2016, 9701 : 127 - 131
  • [28] Cyber security based on mean field game model of the defender: Attacker strategies
    Miao, Li
    Li, Shuai
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (10): : 1 - 8
  • [29] Resolving attacker-defender conflicts through intergroup negotiation
    Halevy, Nir
    BEHAVIORAL AND BRAIN SCIENCES, 2019, 42
  • [30] Competitive resource allocation in an attacker-defender game: When citizens become targets of being ingratiated
    Long, Jie
    Dong, Yucheng
    Chen, Xia
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 243