Application of hybrid strategies of complex network attack and defense games

被引:0
|
作者
Li, Zhe [1 ]
Liu, Jin [1 ]
Ren, Jiaqi [1 ]
Dong, Yibo [1 ]
Li, Weili [1 ]
机构
[1] Natl Univ Def Technol, Natl Key Lab Informat Syst Engn, Changsha 410073, Peoples R China
关键词
Attack and defense games; Critical infrastructure networks; Hybrid strategies; Non-uniform costs; IDENTIFYING INFLUENTIAL NODES; STACKELBERG GAME; INFRASTRUCTURES; CENTRALITY;
D O I
10.1016/j.chaos.2024.115662
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Critical infrastructure networks serve as the backbone of modern society's operations, and the application of game theory to safeguard these networks against deliberate attacks under resource constraints is of paramount importance. Regrettably, the existing body of research on hybrid attack and defense strategies for nodes and edges is notably scarce, despite the ubiquity of such strategies in practical contexts. Current understanding regarding the establishment of a cost constraint model within the framework of hybrid attack and defense strategies, the strategic inclinations of both adversarial and defensive parties under varying cost constraint coefficients, and the influence of resource allocation ratios on equilibrium outcomes remains limited. Consequently, this study constructs a game-theoretic model for the engagement of critical infrastructure networks under non-uniform cost constraints, incorporating hybrid attack and defense strategies for nodes and edges, and conducts an equilibrium analysis across a range of cost constraint coefficients and resource allocation ratios. The findings reveal that when resource availability is limited, both attackers and defenders are inclined towards a strategy of concentrated resource allocation; in contrast, under most circumstances, defenders exhibit a preference for an equitable distribution of resources.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Bargaining strategies for governance complex games
    Verdier, Daniel
    REVIEW OF INTERNATIONAL ORGANIZATIONS, 2022, 17 (02): : 349 - 371
  • [42] Bargaining strategies for governance complex games
    Daniel Verdier
    The Review of International Organizations, 2022, 17 : 349 - 371
  • [43] Stackelberg Strategies for Network Design Games
    Fanelli, Angelo
    Flammini, Michele
    Moscardelli, Luca
    INTERNET AND NETWORK ECONOMICS, 2010, 6484 : 222 - +
  • [44] Stackelberg Strategies for Network Design Games
    Fanelli, Angelo
    Flammini, Michele
    Moscardelli, Luca
    INTERNET MATHEMATICS, 2013, 9 (04) : 336 - 359
  • [45] Design Method for Virtual Network Attack and Defense Platform
    Wang Fangnian
    Peng Gang
    Che Wanfang
    Niu Cong
    Bai Yun
    Zhu Genbiao
    CONFERENCE ON MODELING, IDENTIFICATION AND CONTROL, 2012, 3 : 335 - 340
  • [46] Research on training effectiveness assessment of network attack and defense
    Zheng Yuanyuan
    Wang Tao
    Hou Zhiqi
    Proceedings of the First International Symposium on Test Automation & Instrumentation, Vols 1 - 3, 2006, : 165 - 168
  • [47] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [48] Research on Optimization Model of Network Attack Defense Game
    Yang, Sun
    Wei, Xiong
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 426 - 429
  • [49] Strategic Defense and Attack in Deception based Network Security
    Fraunholz, Daniel
    Schotten, Hans Dieter
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161
  • [50] Discussion on the Technology of Computer Network Hacker Attack and Defense
    Zhu, Xinliang
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 213 - 217