Attack-defense differential game to strength allocation strategies generation

被引:0
|
作者
Li, Lingwei [1 ]
Xiao, Bing [1 ,2 ]
Su, Shihong [1 ]
Zhang, Haichao [1 ]
Wu, Xiwei [1 ]
Guo, Yiming [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian, Peoples R China
[2] Northwestern Polytech Univ, Sch Automat, 127 West Youyi Rd, Xian 710129, Shaanxi, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
complicated attack-defense process; differential game; numerical method; simultaneous orthogonal collocation decomposition; strength allocation strategies; NUMERICAL-SOLUTION; COMBAT;
D O I
10.1002/oca.3035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses a difficult problem of strength allocation strategies generation with various adversaries and complex factors. Firstly, to investigate the strength allocation strategies generation problem, an attack-defense differential game problem is formulated based on an improved Lanchester equation. Secondly, a numerical method, multi-intervals simultaneous orthogonal collocation decomposition (MISOCD) method, is proposed to obtain the strength allocation strategies from the constructed model. Compared with the analytical method, MISOCD does not need to derive the necessary conditions. Thirdly, this study designs an approximated solution generation strategy based on adaptive learning pigeon-inspired optimization algorithm to pregenerate the approximated strength allocation strategies in order to solve the initial value sensitivity problem. The approximated strategies are then used as the initial value guess of MISOCD method to generate optimal strength allocation strategies. Finally, two attack-defense numerical simulations verify the effectiveness of strength allocation strategies generated by the proposed approach. Our proposed results provide a theoretical guide for both making attack-defense strength allocation strategies and assessing confrontation actions.
引用
收藏
页码:3219 / 3236
页数:18
相关论文
共 50 条
  • [21] Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    2019 IEEE 14TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEM (ISADS), 2019, : 37 - 42
  • [22] A Methodology of Security Pattern Classification and of Attack-Defense Tree Generation
    Regainia, Loukmen
    Salva, Sebastien
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 136 - 146
  • [23] Research on the game of network security attack-defense confrontation through the optimal defense strategy
    Liu, Fei
    Gao, Hongyan
    Wei, Zegang
    SECURITY AND PRIVACY, 2021, 4 (01):
  • [24] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [25] An attack-defense game model in infrastructure networks under link hiding
    Qi, Gaoxin
    Li, Jichao
    Xu, Xueming
    Chen, Gang
    Yang, Kewei
    CHAOS, 2022, 32 (11)
  • [26] State Grid Network Attack-defense Graph Generation Method
    Zhou, Cheng
    Fei, Jia-xuan
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 389 - 398
  • [27] Impersonation Attack-Defense Tree
    Rosmansyah, Yusep
    Hendarto, Ignatius Leo Sri
    Pratama, Demby
    INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2020, 15 (19) : 239 - 246
  • [28] Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model
    Tan, Jing-lei
    Zhang, Heng-wei
    Zhang, Hong-qi
    Lei, Cheng
    Jin, Hui
    Li, Bo-wen
    Hu, Hao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [29] An attack-defense game based reliability analysis approach for wireless sensor networks
    Jiang, Wen
    Ma, Zeyu
    Deng, Xinyang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [30] Multilayered Attack-Defense Model on Networks
    Perevozchikov, A. G.
    Reshetov, V. Yu
    Yanochkin, I. E.
    COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2019, 59 (08) : 1389 - 1397