An Attacker-Defender Game Model with Constrained Strategies

被引:0
|
作者
Ren, Jiaqi [1 ]
Liu, Jin [1 ]
Dong, Yibo [1 ]
Li, Zhe [1 ]
Li, Weili [1 ]
机构
[1] Natl Univ Def Technol, Natl Key Lab Informat Syst Engn, Changsha 410073, Peoples R China
关键词
infrastructure attack and defense scenarios; complex networks; game theory; constrained strategies; information theory; CRITICAL INFRASTRUCTURES; PROBABILISTIC RISK; NETWORKS; CENTRALITY; RESOURCES;
D O I
10.3390/e26080624
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, research interest in the field of infrastructure attack and defense scenarios has increased. Numerous methods have been proposed for studying strategy interactions that combine complex network theory and game theory. However, the unavoidable effect of constrained strategies in complex situations has not been considered in previous studies. This study introduces a novel approach to analyzing these interactions by including the effects of constrained strategies, a factor often neglected in traditional analyses. First, we introduce the rule of constraints on strategies, which depends on the average distance between selected nodes. As the average distance increases, the probability of choosing the corresponding strategy decreases. Second, we establish an attacker-defender game model with constrained strategies based on the above rule and using information theory to evaluate the uncertainty of these strategies. Finally, we present a method for solving this problem and conduct experiments based on a target network. The results highlight the unique characteristics of the Nash equilibrium when setting constraints, as these constraints influence decision makers' Nash equilibria. When considering the constrained strategies, both the attacker and the defender tend to select strategies with lower average distances. The effect of the constraints on their strategies becomes less apparent as the number of attackable or defendable nodes increases. This research advances the field by introducing a novel framework for examining strategic interactions in infrastructure defense and attack scenarios. By incorporating strategy constraints, our work offers a new perspective on the critical area of infrastructure security.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Simple analytics of the impact of terror generation on attacker-defender interactions
    Mathews, Timothy
    Bagchi, Aniruddha
    Faria, Joo Ricardo
    PUBLIC CHOICE, 2019, 179 (3-4) : 287 - 299
  • [32] Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games
    Jose, Victor Richmond R.
    Zhuang, Jun
    MILITARY OPERATIONS RESEARCH, 2013, 18 (02) : 33 - +
  • [33] Constraints on competitive performance of attacker-defender dyads in team sports
    Vilar, Luis
    Araujo, Duarte
    Davids, Keith
    Travassos, Bruno
    JOURNAL OF SPORTS SCIENCES, 2012, 30 (05) : 459 - 469
  • [34] Attacker-Defender Signaling Game in Multi-Period Based on Technology Accumulation and Bayesian Learning
    Zhou, Xiaoyan
    Huang, Jincai
    Cheng, Guangquan
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 1528 - 1534
  • [35] Weighted automata on infinite words in the context of Attacker-Defender games
    Halava, V.
    Harju, T.
    Niskanen, R.
    Potapov, I.
    INFORMATION AND COMPUTATION, 2017, 255 : 27 - 44
  • [36] NIGA: A Novel Method for Investigating the Attacker-Defender Model within Critical Infrastructure Networks
    Ren, Jiaqi
    Liu, Jin
    Dong, Yibo
    Li, Zhe
    Li, Weili
    MATHEMATICS, 2024, 12 (16)
  • [37] A review of attacker-defender games: Current state and paths forward
    Hunt, Kyle
    Zhuang, Jun
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2024, 313 (02) : 401 - 417
  • [38] Weighted Automata on Infinite Words in the Context of Attacker-Defender Games
    Halava, Vesa
    Harju, Tero
    Niskanen, Reino
    Potapov, Igor
    EVOLVING COMPUTABILITY, 2015, 9136 : 206 - 215
  • [39] Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts
    Payyappalli, Vineet M.
    Zhuang, Jun
    Jose, Victor Richmond R.
    RISK ANALYSIS, 2017, 37 (11) : 2229 - 2245
  • [40] Simulating attacker and defender strategies within a dynamic game on network topology
    Nystrom, Jared K.
    Robbins, Matthew J.
    Deckro, Richard F.
    Morris, James F.
    JOURNAL OF SIMULATION, 2018, 12 (04) : 307 - 331