Applying the Stackelberg game to assess critical infrastructure vulnerability: Based on a general multi-layer network model

被引:0
|
作者
Li, Haitao [1 ,2 ]
Ji, Lixin [1 ,2 ]
Wang, Kai [1 ,2 ]
Liu, Shuo [1 ,2 ]
Liu, Shuxin [1 ,2 ]
机构
[1] Informat Engn Univ, Informat Technol Res Inst, Zhengzhou 450002, Peoples R China
[2] Natl Digital Switching Syst Engn & Technol Res Ctr, Zhengzhou 450002, Peoples R China
关键词
INTERNET; DYNAMICS; STRATEGY;
D O I
10.1063/5.0232563
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Critical infrastructure systems (CIS) are closely related to human life. Attacks against CIS occur frequently, making accurate and effective protection of CIS essential. Vulnerability assessment is the primary issue to achieving this goal. The interconnected characteristic of CIS means that it is best represented by a multi-layer network, but a uniform model is absent. Game theory offers a suitable framework for researching intelligent confrontation. Previous research combining game theory and network science mainly focuses on a single-layer network and lacks a comprehensive assessment that combines qualitative and quantitative aspects of vulnerability. In this paper, we apply the Stackelberg game to the multi-layer network and comprehensively assess vulnerability based on game equilibrium to realize accurate protection. We first present a method for constructing a general model of the multi-layer network and introduce a multi-layer weighted factor to extend topological attribute metrics. Then, we design a Stackelberg game model for the multi-layer network. Furthermore, we qualitatively analyze the impact of multi-layer network characteristics on vulnerability and propose a method to quantify vulnerability. Experiments show that the vulnerability of the multi-layer network is greatly influenced by the multi-layer weighted factor, single-layer network type, and inter-layer coupling method. The quantitative value of network vulnerability does not rely entirely on the topology attributes on which the attack and defense costs depend but also relates to the resources available. Our work provides an adaptive model for CIS and gives a new approach to developing accurate protection based on comprehensive vulnerability assessment, which deserves further study.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Dynamic Game Theoretic Model of Multi-Layer Infrastructure Networks
    PENGCHENG ZHANG
    SRINIVAS PEETA
    TERRY FRIESZ
    Networks and Spatial Economics, 2005, 5 : 147 - 178
  • [2] Dynamic game theoretic model of multi-layer infrastructure networks
    Zhang, P
    Peeta, S
    Friesz, T
    NETWORKS & SPATIAL ECONOMICS, 2005, 5 (02): : 147 - 178
  • [3] DQN for Multi-layer Game Based Mining Competition in VEC Network
    Li, Yijing
    Zhang, Xuefei
    Wu, Huici
    Liu, Junjie
    Tang, Dian
    Tao, Xiaofeng
    2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2019,
  • [4] A MULTI-LAYER TREE MODEL FOR ENTERPRISE VULNERABILITY MANAGEMENT
    Wu, Bin
    Wang, Andy Ju An
    ICEIS 2011: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 4, 2011, : 389 - 394
  • [5] Multi-Layer Network Formation via a Colonel Blotto Game
    Shahrivar, Ebrahim Moradi
    Sundaram, Shreyas
    2014 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2014, : 838 - 841
  • [6] Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective
    Zeng, Chengyi
    Ren, Baoan
    Li, Menglin
    Liu, Hongfu
    Chen, Jing
    CHAOS, 2019, 29 (08)
  • [7] Augmenting SDN by a Multi-Layer Network Model
    Farkas, Balazs
    Zsoka, Zoltan
    2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 215 - 219
  • [8] A Multi-layer GSM Network Design Model
    de Aguiar, Alexei Barbosa
    Pinheiro, Placido Rogerio
    Neto, Alvaro de Menezes S.
    Pinheiro, Rebecca F.
    Cunha, Ruddy P. P.
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 457 - 460
  • [9] VulTR: Software vulnerability detection model based on multi-layer key feature enhancement
    He, Haitao
    Wang, Sheng
    Wang, Yanmin
    Liu, Ke
    Yu, Lu
    COMPUTERS & SECURITY, 2025, 148
  • [10] Multi-layer Model for Network Fault Detection Based on Artificial Immune
    Tian, Yuling
    Yuan, Xingfang
    ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEM, PTS 1-6, 2011, 219-220 : 219 - 222