Simulating attacker and defender strategies within a dynamic game on network topology

被引:5
|
作者
Nystrom, Jared K. [1 ]
Robbins, Matthew J. [1 ]
Deckro, Richard F. [1 ]
Morris, James F. [1 ]
机构
[1] Air Force Inst Technol, Dept Operat Sci, Wright Patterson AFB, OH 45433 USA
关键词
Military; simulation; dynamic game; social networks; CENTRALITY;
D O I
10.1057/s41273-017-0054-0
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Successful military counterinsurgency operations increasingly rely upon an advanced understanding of relevant networks and their topologies. This paper evaluates, via simulations, various attacker and defender strategies within a dynamic game on network topology. The simulation is designed to provide insight into the effectiveness of offensive targeting strategies as determined by various centrality measures, given limited states of information and varying network topologies. Improved modeling of complex social behaviors is accomplished through incorporation of a distance-based utility function. Moreover, insights into effective defensive strategies are gained through incorporation of a hybrid model of network regeneration. Two designed experiments investigate the impact of game features on the superlative offensive and defensive strategies. Results indicate that degree centrality, proximal target centrality, and closeness centrality outperform other measures as targeting criteria given varying network topologies and defensive regeneration methods. Furthermore, the attacker state of information is only significant given a topology conducive to defense. The costs of direct relationships significantly impact effective regeneration methods, whereas restructuring methods are insignificant. These results offer preliminary insight into practical attack and defense strategies utilizing a simulation that can be easily adapted for operational applications.
引用
收藏
页码:307 / 331
页数:25
相关论文
共 50 条
  • [31] A network game with attackers and a defender
    Mavronicolas, Marios
    Papadopoulou, Vicky
    Philippou, Anna
    Spirakis, Paul
    ALGORITHMICA, 2008, 51 (03) : 315 - 341
  • [32] Network Defence Using Attacker-Defender Interaction Modelling
    Medkova, Jana
    Celeda, Pavel
    MANAGEMENT AND SECURITY IN THE AGE OF HYPERCONNECTIVITY, AIMS 2016, 2016, 9701 : 127 - 131
  • [33] Multi-agent Target Defense Game with Learned Defender to Attacker Assignment
    Manoharan, Amith
    Thakur, Prajwal
    Singh, Arun Kumar
    2023 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS, ICUAS, 2023, : 297 - 304
  • [34] Modeling and mitigating the effects of supply chain disruption in a defender-attacker game
    Xu, Jie
    Zhuang, Jun
    Liu, Zigeng
    ANNALS OF OPERATIONS RESEARCH, 2016, 236 (01) : 255 - 270
  • [35] A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,
  • [36] Network game with attacker and protector entities
    Mavronicolas, M
    Papadopoulou, V
    Philippou, A
    Spirakis, P
    ALGORITHMS AND COMPUTATION, 2005, 3827 : 288 - 297
  • [37] A Methodology for Assessing Transportation Network Terrorism Risk with Attacker and Defender Interactions
    Murray-Tuite, Pamela M.
    Fei, Xiang
    COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING, 2010, 25 (06) : 396 - 410
  • [38] Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    Zhuang, Jun
    Bier, Vicki M.
    Alagoz, Oguzhan
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2010, 203 (02) : 409 - 418
  • [39] Modeling a multi-target attacker-defender game with multiple attack types
    Zhang, Jing
    Zhuang, Jun
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2019, 185 : 465 - 475
  • [40] A Pilot Contamination Attacker-Defender Model for Wireless Networks Under Stackelberg Game
    Wang, Zhangnan
    Wang, Yichen
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,