Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information

被引:56
|
作者
Zhang, Chi [1 ]
Emmanuel Ramirez-Marquez, Jose [2 ]
机构
[1] Tsinghua Univ, Dept Ind Engn, Beijing 100084, Peoples R China
[2] Stevens Inst Technol, Hoboken, NJ 07030 USA
关键词
Critical infrastructure protection; two-stage game; incomplete information; multi-objective optimization; Pareto equilibrium; intentional attack; DETERMINISTIC NETWORK INTERDICTION; PROBABILISTIC SOLUTION DISCOVERY; RELIABILITY OPTIMIZATION; EVOLUTIONARY APPROACH; STRATEGIC ATTACKERS; PARALLEL SYSTEMS; DEFENSE STRATEGY; ALGORITHMS; ALLOCATION; COMPONENTS;
D O I
10.1080/0740817X.2012.676749
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
It is now paramount to protect critical infrastructures because of their significance for economic development and social well-being of modern societies. One of the main threats to these networked systems is from intentional attackers, who are resourceful and inventive in selecting time, target, and means of attack. Thus, attackers intelligence should be considered when developing intelligent and cost-effective protection strategies. In this research, critical infrastructures are modeled as networks and the development of network protection strategies is modeled as a two-stage game between a protector and an attacker with incomplete information. Due to the complexity of critical infrastructures, there are usually a large number of combinations of potential protection and attack strategies leading to a computational challenge to find the Pareto equilibrium solutions for the proposed game. To meet this challenge, this research develops an evolutionary algorithm to solve the proposed a transformation of the game into a multi-objective optimization model.
引用
下载
收藏
页码:244 / 258
页数:15
相关论文
共 50 条
  • [11] Two-Stage Network Formation Game with Heterogeneous Players and Private Information
    Sun, Ping
    Parilina, Elena
    CONTRIBUTIONS TO GAME THEORY AND MANAGEMENT, VOL XII, 2019, 12 : 316 - 324
  • [12] NAPOLI FUTURA: Novel Approaches for Protecting Critical Infrastructures from Cyber Attacks
    Avallone, Stefano
    Carrozza, Gabriella
    Cinque, Marcello
    Della Corte, Raffaele
    Marotta, Antonio
    Pecchia, Antonio
    Savignano, Agostino
    2014 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2014, : 33 - 36
  • [13] A Methodology for Evaluation of Energy Critical Infrastructures against Cyber Attacks
    Leite, Sergio Ribeiro
    Favacho de Araujo, Aleteia Patricia
    von Paumgartten Junior, Paulo Franklin
    2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2015,
  • [14] COMMUNICATION AND COORDINATION IN A TWO-STAGE GAME
    Bjedov, Tjasa
    Madies, Thierry
    Villeval, Marie Claire
    ECONOMIC INQUIRY, 2016, 54 (03) : 1519 - 1540
  • [15] A Stochastic Bayesian Game for Securing Secondary Frequency Control of Microgrids Against Spoofing Attacks with Incomplete Information
    Li, Yang
    Liu, Shichao
    Zhu, Li
    IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2 : 118 - 129
  • [16] Two-stage stochastic programming with imperfect information update: Value evaluation and information acquisition game
    Wang, Chang-Jun
    Gao, Zi-Jian
    AIMS MATHEMATICS, 2023, 8 (02): : 4524 - 4550
  • [17] Game Theoretic Study of Protecting MIMO Transmissions Against Smart Attacks
    Li, Yanda
    Xiao, Liang
    Dai, Huaiyu
    Poor, H. Vincent
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [18] Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks
    Chen, Zitao
    Dash, Pritam
    Pattabiraman, Karthik
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 689 - 703
  • [19] Protecting shared information in networks: A network security game with strategic attacks
    de Witte, Bram
    Frasca, Paolo
    Overvest, Bastiaan
    Timmer, Judith
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4255 - 4277
  • [20] An Achilles heel: denial of service attacks on Australian critical information infrastructures
    Christensen, Sharon
    Caelli, William
    Duncan, William
    Georgiades, Eugenia
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2010, 19 (01) : 61 - 85