An Attacker-Defender Game Model with Constrained Strategies

被引:0
|
作者
Ren, Jiaqi [1 ]
Liu, Jin [1 ]
Dong, Yibo [1 ]
Li, Zhe [1 ]
Li, Weili [1 ]
机构
[1] Natl Univ Def Technol, Natl Key Lab Informat Syst Engn, Changsha 410073, Peoples R China
关键词
infrastructure attack and defense scenarios; complex networks; game theory; constrained strategies; information theory; CRITICAL INFRASTRUCTURES; PROBABILISTIC RISK; NETWORKS; CENTRALITY; RESOURCES;
D O I
10.3390/e26080624
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, research interest in the field of infrastructure attack and defense scenarios has increased. Numerous methods have been proposed for studying strategy interactions that combine complex network theory and game theory. However, the unavoidable effect of constrained strategies in complex situations has not been considered in previous studies. This study introduces a novel approach to analyzing these interactions by including the effects of constrained strategies, a factor often neglected in traditional analyses. First, we introduce the rule of constraints on strategies, which depends on the average distance between selected nodes. As the average distance increases, the probability of choosing the corresponding strategy decreases. Second, we establish an attacker-defender game model with constrained strategies based on the above rule and using information theory to evaluate the uncertainty of these strategies. Finally, we present a method for solving this problem and conduct experiments based on a target network. The results highlight the unique characteristics of the Nash equilibrium when setting constraints, as these constraints influence decision makers' Nash equilibria. When considering the constrained strategies, both the attacker and the defender tend to select strategies with lower average distances. The effect of the constraints on their strategies becomes less apparent as the number of attackable or defendable nodes increases. This research advances the field by introducing a novel framework for examining strategic interactions in infrastructure defense and attack scenarios. By incorporating strategy constraints, our work offers a new perspective on the critical area of infrastructure security.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF
    Guan, Peiqiu
    Zhuang, Jun
    RISK ANALYSIS, 2016, 36 (04) : 776 - 791
  • [42] Optimal Target Capture Strategies in the Target-Attacker-Defender Differential Game
    Garcia, Eloy
    Casbeer, David W.
    Pachter, Meir
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 68 - 73
  • [43] Weakest-link attacker-defender games with multiple attack technologies
    Arce, Daniel G.
    Kovenock, Dan
    Roberson, Brian
    NAVAL RESEARCH LOGISTICS, 2012, 59 (06) : 457 - 469
  • [44] Cooperative defense of a territorial-constrained target in a target-attacker-defender game
    Dong, Gangqi
    Xing, Yahong
    Mi, Qianbao
    ROBOTICA, 2024,
  • [45] Dynamic Defender-Attacker Blotto Game
    Shishika, Daigo
    Guan, Yue
    Dorothy, Michael
    Kumar, Vijay
    2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4422 - 4428
  • [46] Attacker-defender model against quantal response adversaries for cyber security in logistics management: An introductory study
    Cheung, Kam-Fung
    Bell, Michael G. H.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (02) : 471 - 481
  • [47] Information-governing dynamics of attacker-defender interactions in youth rugby union
    Passos, Pedro
    Araujo, Duarte
    Davids, Keith
    Gouveia, Luis
    Milho, Joao
    Serpa, Sidonio
    JOURNAL OF SPORTS SCIENCES, 2008, 26 (13) : 1421 - 1429
  • [48] A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under H2 Performance Metric
    Pirani, Mohammad
    Nekouei, Ehsan
    Sandberg, Henrik
    Johansson, Karl Henrik
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 1991 - 2000
  • [49] A Quantal Response Analysis of Simultaneous Multi-Target Attacker-Defender Security Games
    Azim, Md Reya Shad
    Abdallah, Mustafa
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [50] DGM approach to network attacker and defender strategies
    Kayode, Alese Boniface
    Babatunde, Iwasokun Gabriel
    Israel, Haruna Danjuma
    2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, 2013, : 313 - 320