Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma

被引:4
|
作者
Qi, Gaoxin [1 ]
Li, Jichao [1 ]
Xu, Chi [1 ]
Chen, Gang [1 ]
Yang, Kewei [1 ]
机构
[1] Natl Univ Def Technol, Coll Syst Engn, Changsha 410073, Peoples R China
基金
中国国家自然科学基金;
关键词
infrastructure networks protection; link hiding rule; Bayesian game; Harsanyi transformation; TRANSPORTATION NETWORK; STACKELBERG GAME; INFRASTRUCTURE; ALLOCATION; PROTECT;
D O I
10.3390/e25010057
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead to significant property damage and production stagnation. The game theory provides a suitable theoretical framework for solving the problem of infrastructure protection. Existing models consider only the beneficial effects that the defender obtains from information gaps. If the attacker's countermeasures are ignored, the defender will become passive. Herein, we consider that a proficient attacker with a probability in the game can fill information gaps in the network. First, we introduce the link-hiding rule and the information dilemma. Second, based on the Bayesian static game model, we establish an attack-defense game model with multiple types of attackers. In the game model, we consider resource-consistent and different types of distributions of the attacker. Then, we introduce the solution method of our model by combining the Harsanyi transformation and the bi-matrix game. Finally, we conduct experiments using a scale-free network. The result shows that the defender can be benefited by hiding some links when facing a normal attacker or by estimating the distribution of the attacker correctly. The defender will experience a loss if it ignores the proficient attacker or misestimates the distribution.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A Simplified Attack-Defense Game Model for NSSA
    Sun, Xueyan
    Liu, Xiaowu
    Zhang, Shuwen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 820 - 828
  • [2] Attack-defense game for critical infrastructure considering the cascade effect
    Fu Chaoqi
    Gao Yangjun
    Zhong Jilong
    Sun Yun
    Zhang Pengtao
    Wu Tao
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 216
  • [3] AN ATTACK-DEFENSE GAME WITH MATRIX STRATEGIES
    COHEN, ND
    NAVAL RESEARCH LOGISTICS QUARTERLY, 1966, 13 (04): : 391 - &
  • [4] An attack-defense game on interdependent networks
    Peng, Rui
    Wu, Di
    Sun, Mengyao
    Wu, Shaomin
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2021, 72 (10) : 2331 - 2341
  • [5] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [6] Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
    Zhao, Xuhua
    International Journal of Network Security, 2020, 22 (06) : 1037 - 1042
  • [7] Analysis Method based on Rough Attack-defense Bayes Game Model
    Zhang, Kai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 109 - 118
  • [8] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [9] An attack-defense game model in infrastructure networks under link hiding
    Qi, Gaoxin
    Li, Jichao
    Xu, Xueming
    Chen, Gang
    Yang, Kewei
    CHAOS, 2022, 32 (11)
  • [10] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141