Catch the Cyber Thief: A Multi-Dimensional Asymmetric Network Attack-Defense Game

被引:0
|
作者
Wang, Wenhao [1 ,2 ]
Chen, Xingguo [3 ]
Li, Yuwei [2 ]
Zhu, Cheng [2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230031, Peoples R China
[2] Natl Univ Def Technol, Sci & Technol Informat Syst Engn Lab, Changsha 410073, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 20期
基金
中国国家自然科学基金;
关键词
network attack-defense game; partially observable stochastic game; agent-based modeling; reinforcement learning; CHALLENGES;
D O I
10.3390/app14209234
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This paper presents a novel multi-dimensional asymmetric game model for network attack-defense decision-making, called "Catch the Cyber Thief". The model is built upon the concept of partially observable stochastic games (POSG) and is designed to systematically incorporate multi-dimensional asymmetry into network attack-defense problems. The attack agent is called a "thief" who wants to control a key host by exploring the unfamiliar network environment, and the defense agent is called a "police" who needs to catch the opponent before its goal is accomplished. The results indicate that the asymmetry of network attack and defense is not only influenced by attack and defense strategies but also by spatio-temporal factors such as the attacker's initial position, network topology, and defense lag time. In addition, we have found that there may exist the "attack rhythm," which makes "how to maintain a good attack rhythm" and "how to generate a robust defense strategy against different attackers" worth exploring. Compared with existing attack-defense game models, our game model can better generate a direct mapping relationship with real elements, enabling us to understand network attack and defense interactions better, recognize security risks, and design defense strategies that can directly serve real-world decision-making.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] Cyber Attack-Defense Analysis for Automatic Generation Control with Renewable Energy Sources
    Sarangan, Srikrishna
    Singh, Vivek Kumar
    Govindarasu, Manimaran
    2018 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2018,
  • [32] A Game Theory Approach to Attack-Defense Strategy for Perception of Connected Vehicles
    Gu, Ziqing
    An, Yunlong
    Tan, Fangyuan
    Li, Yang
    Zheng, Sifa
    2019 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2019), 2019, : 2587 - 2594
  • [33] Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes
    Wang, Shuliang
    Sun, Jingya
    Zhang, Jianhua
    Dong, Qiqi
    Gu, Xifeng
    Chen, Chen
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 40
  • [34] Stochastic Evolutionary Analysis of an Aerial Attack-Defense Game in Uncertain Environments
    Hu, Shiguang
    Ru, Le
    Lu, Bo
    Wang, Zhenhua
    Wang, Wenfei
    Xi, Hailong
    MATHEMATICS, 2024, 12 (19)
  • [35] An attack-defense game model in infrastructure networks under link hiding
    Qi, Gaoxin
    Li, Jichao
    Xu, Xueming
    Chen, Gang
    Yang, Kewei
    CHAOS, 2022, 32 (11)
  • [36] Network Attack-Defense Simulation Training System Based on HLA
    Chen, Gang
    Xiang, Shang
    Ji, GuanQun
    Jia, YiLong
    2009 INTERNATIONAL CONFERENCE ON COMPUTER MODELING AND SIMULATION, PROCEEDINGS, 2009, : 303 - +
  • [37] State Grid Network Attack-defense Graph Generation Method
    Zhou, Cheng
    Fei, Jia-xuan
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 389 - 398
  • [38] Game Control of Attack and Defense in Cyber Physical System
    Cai, Xiaobo
    Wang, Baijuan
    Cao, Zhiyong
    Zhang, Haitao
    Han, Ke
    Chen, Min
    Xu, Jiajun
    Zi, Caifei
    Wu, Wendou
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 488 - 494
  • [39] Identifying influential nodes in social networks from the perspective of attack-defense game
    Hu, Wen
    Deng, Ye
    Xiao, Yu
    Wu, Jun
    CHAOS, 2024, 34 (11)
  • [40] Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution
    Shao, Chengwu
    Li, Yan-Fu
    RISK ANALYSIS, 2022, 42 (05) : 1086 - 1105