Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information

被引:56
|
作者
Zhang, Chi [1 ]
Emmanuel Ramirez-Marquez, Jose [2 ]
机构
[1] Tsinghua Univ, Dept Ind Engn, Beijing 100084, Peoples R China
[2] Stevens Inst Technol, Hoboken, NJ 07030 USA
关键词
Critical infrastructure protection; two-stage game; incomplete information; multi-objective optimization; Pareto equilibrium; intentional attack; DETERMINISTIC NETWORK INTERDICTION; PROBABILISTIC SOLUTION DISCOVERY; RELIABILITY OPTIMIZATION; EVOLUTIONARY APPROACH; STRATEGIC ATTACKERS; PARALLEL SYSTEMS; DEFENSE STRATEGY; ALGORITHMS; ALLOCATION; COMPONENTS;
D O I
10.1080/0740817X.2012.676749
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
It is now paramount to protect critical infrastructures because of their significance for economic development and social well-being of modern societies. One of the main threats to these networked systems is from intentional attackers, who are resourceful and inventive in selecting time, target, and means of attack. Thus, attackers intelligence should be considered when developing intelligent and cost-effective protection strategies. In this research, critical infrastructures are modeled as networks and the development of network protection strategies is modeled as a two-stage game between a protector and an attacker with incomplete information. Due to the complexity of critical infrastructures, there are usually a large number of combinations of potential protection and attack strategies leading to a computational challenge to find the Pareto equilibrium solutions for the proposed game. To meet this challenge, this research develops an evolutionary algorithm to solve the proposed a transformation of the game into a multi-objective optimization model.
引用
下载
收藏
页码:244 / 258
页数:15
相关论文
共 50 条
  • [21] Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures
    Min, Byungho
    Varadharajan, Vijay
    2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 59 - 68
  • [22] A Mathematical Framework to Optimize Critical Infrastructure Resilience against Intentional Attacks
    Ouyang, Min
    Fang, Yiping
    COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING, 2017, 32 (11) : 909 - 929
  • [23] Protecting individual information against inference attacks in data publishing
    Li, Chen
    Shirani-Mehr, Houtan
    Yang, Xiaochun
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 422 - +
  • [24] A two-stage Bertrand-Edgeworth game
    Tasnádi, A
    ECONOMICS LETTERS, 1999, 65 (03) : 353 - 358
  • [25] A Two-Stage Deception Game for Network Defense
    Wang, Wei
    Zeng, Bo
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 569 - 582
  • [26] TSINIT: A Two-Stage Inpainting Network for Incomplete Text
    Sun, Jiande
    Xue, Fanfu
    Li, Jing
    Zhu, Lei
    Zhang, Huaxiang
    Zhang, Jia
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 5166 - 5177
  • [27] Solution for One-Stage Bidding Game with Incomplete Information
    Sandomirskaia, Marina S.
    Domansky, Victor C.
    CONTRIBUTIONS TO GAME THEORY AND MANAGEMENT, VOL V, 2012, 5 : 268 - 285
  • [28] Two-Stage Contests with Private Information
    Kubitz, Greg
    AMERICAN ECONOMIC JOURNAL-MICROECONOMICS, 2023, 15 (01) : 239 - 287
  • [29] Revisiting a game theoretic framework for the robust railway network design against intentional attacks
    Perea, Federico
    Puerto, Justo
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2013, 226 (02) : 286 - 292
  • [30] Defending Link Flooding Attacks under Incomplete Information: A Bayesian Game Approach
    Chen, Xu
    Feng, Wei
    Ge, Ning
    Wang, Xianbin
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,