Application of hybrid strategies of complex network attack and defense games

被引:0
|
作者
Li, Zhe [1 ]
Liu, Jin [1 ]
Ren, Jiaqi [1 ]
Dong, Yibo [1 ]
Li, Weili [1 ]
机构
[1] Natl Univ Def Technol, Natl Key Lab Informat Syst Engn, Changsha 410073, Peoples R China
关键词
Attack and defense games; Critical infrastructure networks; Hybrid strategies; Non-uniform costs; IDENTIFYING INFLUENTIAL NODES; STACKELBERG GAME; INFRASTRUCTURES; CENTRALITY;
D O I
10.1016/j.chaos.2024.115662
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Critical infrastructure networks serve as the backbone of modern society's operations, and the application of game theory to safeguard these networks against deliberate attacks under resource constraints is of paramount importance. Regrettably, the existing body of research on hybrid attack and defense strategies for nodes and edges is notably scarce, despite the ubiquity of such strategies in practical contexts. Current understanding regarding the establishment of a cost constraint model within the framework of hybrid attack and defense strategies, the strategic inclinations of both adversarial and defensive parties under varying cost constraint coefficients, and the influence of resource allocation ratios on equilibrium outcomes remains limited. Consequently, this study constructs a game-theoretic model for the engagement of critical infrastructure networks under non-uniform cost constraints, incorporating hybrid attack and defense strategies for nodes and edges, and conducts an equilibrium analysis across a range of cost constraint coefficients and resource allocation ratios. The findings reveal that when resource availability is limited, both attackers and defenders are inclined towards a strategy of concentrated resource allocation; in contrast, under most circumstances, defenders exhibit a preference for an equitable distribution of resources.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Analysis of ARP Spoofing Attack and Defense Strategies
    Xu, Shuxin
    Zhang, Weigang
    ASIA-PACIFIC MANAGEMENT AND ENGINEERING CONFERENCE (APME 2014), 2014, : 193 - 198
  • [22] Attack strategies on complex networks
    Gallos, Lazaros K.
    Cohen, Reuven
    Liljeros, Fredrik
    Argyrakis, Panos
    Bunde, Armin
    Havlin, Shlomo
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 3, PROCEEDINGS, 2006, 3993 : 1048 - 1055
  • [23] Construction of Barrier Surfaces in Mutual Attack-Defense Games
    Xu, Jingwen
    He, Qiyong
    Meng, Min
    Li, Xiuxian
    2024 3RD CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, FASTA 2024, 2024, : 265 - 270
  • [24] Defense and Attack Game Strategies of Dual-Network Coupled CPPS with Communication Edge Failures
    Zhu, Guopeng
    Yu, Qiusheng
    Xiao, Shenyang
    Qian, Shaobo
    Han, Guangming
    Zhang, Yan
    Ma, Piming
    ELECTRONICS, 2023, 12 (14)
  • [25] Network Games with Quantum Strategies
    Scarpa, Giannicola
    QUANTUM COMMUNICATION AND QUANTUM NETWORKING, 2010, 36 : 74 - 81
  • [26] Automated benchmark network diversification for realistic attack simulation with application to moving target defense
    Alexander Bajic
    Georg T. Becker
    International Journal of Information Security, 2022, 21 : 253 - 278
  • [27] Automated benchmark network diversification for realistic attack simulation with application to moving target defense
    Bajic, Alexander
    Becker, Georg T.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (02) : 253 - 278
  • [28] Research and Application of ARP Protocol Vulnerability Attack and Defense Technology Based on Trusted Network
    Xi, Huixing
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS I, 2017, 1820
  • [29] Adversarial organization modeling for network attack/defense
    Wu, Ji
    Ye, Chaoqun
    Jin, Shiyao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 90 - 99
  • [30] Common Network Attack Types and Defense Mechanisms
    Das, Resul
    Karabade, Abubakar
    Tuna, Gurkan
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2658 - 2661