Attack-defense differential game to strength allocation strategies generation

被引:0
|
作者
Li, Lingwei [1 ]
Xiao, Bing [1 ,2 ]
Su, Shihong [1 ]
Zhang, Haichao [1 ]
Wu, Xiwei [1 ]
Guo, Yiming [1 ]
机构
[1] Northwestern Polytech Univ, Sch Automat, Xian, Peoples R China
[2] Northwestern Polytech Univ, Sch Automat, 127 West Youyi Rd, Xian 710129, Shaanxi, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
complicated attack-defense process; differential game; numerical method; simultaneous orthogonal collocation decomposition; strength allocation strategies; NUMERICAL-SOLUTION; COMBAT;
D O I
10.1002/oca.3035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses a difficult problem of strength allocation strategies generation with various adversaries and complex factors. Firstly, to investigate the strength allocation strategies generation problem, an attack-defense differential game problem is formulated based on an improved Lanchester equation. Secondly, a numerical method, multi-intervals simultaneous orthogonal collocation decomposition (MISOCD) method, is proposed to obtain the strength allocation strategies from the constructed model. Compared with the analytical method, MISOCD does not need to derive the necessary conditions. Thirdly, this study designs an approximated solution generation strategy based on adaptive learning pigeon-inspired optimization algorithm to pregenerate the approximated strength allocation strategies in order to solve the initial value sensitivity problem. The approximated strategies are then used as the initial value guess of MISOCD method to generate optimal strength allocation strategies. Finally, two attack-defense numerical simulations verify the effectiveness of strength allocation strategies generated by the proposed approach. Our proposed results provide a theoretical guide for both making attack-defense strength allocation strategies and assessing confrontation actions.
引用
收藏
页码:3219 / 3236
页数:18
相关论文
共 50 条
  • [41] Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design
    Sun, Siyu
    Fan, Xiaoxuan
    Xia, Yunzhi
    Zhu, Chenlu
    Liu, Shenghao
    Yi, Lingzhi
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 74 - 82
  • [42] Electric Grid Vulnerability Assessment under Attack-Defense Scenario Based on Game Theory
    Jian, Zhou
    Shi, Libao
    Yao, Liangzhong
    Masoud, Bazargan
    2013 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2013,
  • [43] Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack-Defense Game Model
    Liu, Guiyun
    Peng, Baihao
    Zhong, Xiaojing
    SENSORS, 2021, 21 (02) : 1 - 25
  • [44] Cyber Attack-Defense Analysis for Automatic Generation Control with Renewable Energy Sources
    Sarangan, Srikrishna
    Singh, Vivek Kumar
    Govindarasu, Manimaran
    2018 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2018,
  • [45] A method for analyzing Stackelberg attack-defense game model in 5G by tCPSO
    Liu, Ning
    Liu, Shangkun
    Chai, Qing-Wei
    Zheng, Wei-Min
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 228
  • [46] CLOSURE: A cloud scientific workflow scheduling algorithm based on attack-defense game model
    Wang, Yawen
    Guo, Yunfei
    Guo, Zehua
    Baker, Thar
    Liu, Wenyan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 460 - 474
  • [47] Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design
    Wang, Ding-Chau
    Chen, Ing-Ray
    Al-Hamadi, Hamid
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (01) : 188 - 199
  • [48] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [49] Stochastic Game Analysis for Attack-Defense of the CBTC Handover Process under Jamming Attacks
    Wang, Xuan
    Xiong, Han
    Wang, Xi
    2019 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2019, : 2515 - 2520
  • [50] Expected Cost Analysis of Attack-Defense Trees
    Eisentraut, Julia
    Kretinsky, Jan
    QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 203 - 221