Simulating attacker and defender strategies within a dynamic game on network topology

被引:5
|
作者
Nystrom, Jared K. [1 ]
Robbins, Matthew J. [1 ]
Deckro, Richard F. [1 ]
Morris, James F. [1 ]
机构
[1] Air Force Inst Technol, Dept Operat Sci, Wright Patterson AFB, OH 45433 USA
关键词
Military; simulation; dynamic game; social networks; CENTRALITY;
D O I
10.1057/s41273-017-0054-0
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Successful military counterinsurgency operations increasingly rely upon an advanced understanding of relevant networks and their topologies. This paper evaluates, via simulations, various attacker and defender strategies within a dynamic game on network topology. The simulation is designed to provide insight into the effectiveness of offensive targeting strategies as determined by various centrality measures, given limited states of information and varying network topologies. Improved modeling of complex social behaviors is accomplished through incorporation of a distance-based utility function. Moreover, insights into effective defensive strategies are gained through incorporation of a hybrid model of network regeneration. Two designed experiments investigate the impact of game features on the superlative offensive and defensive strategies. Results indicate that degree centrality, proximal target centrality, and closeness centrality outperform other measures as targeting criteria given varying network topologies and defensive regeneration methods. Furthermore, the attacker state of information is only significant given a topology conducive to defense. The costs of direct relationships significantly impact effective regeneration methods, whereas restructuring methods are insignificant. These results offer preliminary insight into practical attack and defense strategies utilizing a simulation that can be easily adapted for operational applications.
引用
收藏
页码:307 / 331
页数:25
相关论文
共 50 条
  • [1] Dynamic Defender-Attacker Blotto Game
    Shishika, Daigo
    Guan, Yue
    Dorothy, Michael
    Kumar, Vijay
    2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4422 - 4428
  • [2] An Attacker-Defender Game Model with Constrained Strategies
    Ren, Jiaqi
    Liu, Jin
    Dong, Yibo
    Li, Zhe
    Li, Weili
    ENTROPY, 2024, 26 (08)
  • [3] DGM approach to network attacker and defender strategies
    Kayode, Alese Boniface
    Babatunde, Iwasokun Gabriel
    Israel, Haruna Danjuma
    2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, 2013, : 313 - 320
  • [4] DGM Approach to Network Attacker and Defender Strategies
    Alese, Boniface Kayode
    Babatunde, Iwasokun Gabriel
    Israel, Haruna Danjuma
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 313 - 320
  • [5] Attacker-defender game from a network science perspective
    Li, Ya-Peng
    Tan, Suo-Yi
    Deng, Ye
    Wu, Jun
    CHAOS, 2018, 28 (05)
  • [6] An Attacker-Defender Game for Honeynets
    Cai, Jin-Yi
    Yegneswaran, Vinod
    Alfeld, Chris
    Barford, Paul
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 7 - +
  • [7] Optimal Target Capture Strategies in the Target-Attacker-Defender Differential Game
    Garcia, Eloy
    Casbeer, David W.
    Pachter, Meir
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 68 - 73
  • [8] Cyber security based on mean field game model of the defender: Attacker strategies
    Miao, Li
    Li, Shuai
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (10): : 1 - 8
  • [9] A Temporal Model for the Prisoner's Dilemma and an Iterated Attacker-Defender Network Game
    Kovach, Nicholas
    Lamont, Gary
    PROCEEDINGS OF THE 2021 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2021, : 261 - 268
  • [10] Cost-effective power grid protection through defender–attacker–defender model with corrective network topology control
    Wei Yuan
    Bo Zeng
    Energy Systems, 2020, 11 : 811 - 837