Application of hybrid strategies of complex network attack and defense games

被引:0
|
作者
Li, Zhe [1 ]
Liu, Jin [1 ]
Ren, Jiaqi [1 ]
Dong, Yibo [1 ]
Li, Weili [1 ]
机构
[1] Natl Univ Def Technol, Natl Key Lab Informat Syst Engn, Changsha 410073, Peoples R China
关键词
Attack and defense games; Critical infrastructure networks; Hybrid strategies; Non-uniform costs; IDENTIFYING INFLUENTIAL NODES; STACKELBERG GAME; INFRASTRUCTURES; CENTRALITY;
D O I
10.1016/j.chaos.2024.115662
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Critical infrastructure networks serve as the backbone of modern society's operations, and the application of game theory to safeguard these networks against deliberate attacks under resource constraints is of paramount importance. Regrettably, the existing body of research on hybrid attack and defense strategies for nodes and edges is notably scarce, despite the ubiquity of such strategies in practical contexts. Current understanding regarding the establishment of a cost constraint model within the framework of hybrid attack and defense strategies, the strategic inclinations of both adversarial and defensive parties under varying cost constraint coefficients, and the influence of resource allocation ratios on equilibrium outcomes remains limited. Consequently, this study constructs a game-theoretic model for the engagement of critical infrastructure networks under non-uniform cost constraints, incorporating hybrid attack and defense strategies for nodes and edges, and conducts an equilibrium analysis across a range of cost constraint coefficients and resource allocation ratios. The findings reveal that when resource availability is limited, both attackers and defenders are inclined towards a strategy of concentrated resource allocation; in contrast, under most circumstances, defenders exhibit a preference for an equitable distribution of resources.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Application of network cybernetics in network attack and Defense
    He, Ning
    Lu, Yu
    Wang, Lei
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1967 - 1971
  • [2] Case Studies of Network Defense with Attack Graph Games
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    Pechoucek, Michal
    IEEE INTELLIGENT SYSTEMS, 2016, 31 (05) : 24 - 30
  • [3] Analysis of Attack and Defense Strategies on Complex Networks
    Jiang Yu
    Wang Yubo
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 58 - 62
  • [4] The attack and defense games
    Sheremeta, Roman M.
    BEHAVIORAL AND BRAIN SCIENCES, 2019, 42
  • [5] Attack and Defense Strategies in Complex Networks Based on Game Theory
    LI Yapeng
    DENG Ye
    XIAO Yu
    WU Jun
    JournalofSystemsScience&Complexity, 2019, 32 (06) : 1630 - 1640
  • [6] Attack and Defense Strategies in Complex Networks Based on Game Theory
    Li, Yapeng
    Deng, Ye
    Xiao, Yu
    Wu, Jun
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2019, 32 (06) : 1630 - 1640
  • [7] Attack and Defense Strategies in Complex Networks Based on Game Theory
    Yapeng Li
    Ye Deng
    Yu Xiao
    Jun Wu
    Journal of Systems Science and Complexity, 2019, 32 : 1630 - 1640
  • [8] Application and Design of Attack and Defense Algorithms in WTN Chess of Computer Games
    Jun, Tao
    Gui, Wu
    2015 27TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2015, : 5803 - 5806
  • [9] Analysis of Network Attack and Defense Strategies Based on Pareto Optimum
    Sun, Yang
    Xiong, Wei
    Yao, Zhonghua
    Moniz, Krishna
    Zahir, Ahmed
    ELECTRONICS, 2018, 7 (03):
  • [10] Strategic Attack & Defense in Security Diffusion Games
    Waniek, Marcin
    Michalak, Tomasz P.
    Alshamsi, Aamena
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2020, 11 (01)