Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information

被引:59
|
作者
Zhang, Chi [1 ]
Emmanuel Ramirez-Marquez, Jose [2 ]
机构
[1] Tsinghua Univ, Dept Ind Engn, Beijing 100084, Peoples R China
[2] Stevens Inst Technol, Hoboken, NJ 07030 USA
关键词
Critical infrastructure protection; two-stage game; incomplete information; multi-objective optimization; Pareto equilibrium; intentional attack; DETERMINISTIC NETWORK INTERDICTION; PROBABILISTIC SOLUTION DISCOVERY; RELIABILITY OPTIMIZATION; EVOLUTIONARY APPROACH; STRATEGIC ATTACKERS; PARALLEL SYSTEMS; DEFENSE STRATEGY; ALGORITHMS; ALLOCATION; COMPONENTS;
D O I
10.1080/0740817X.2012.676749
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
It is now paramount to protect critical infrastructures because of their significance for economic development and social well-being of modern societies. One of the main threats to these networked systems is from intentional attackers, who are resourceful and inventive in selecting time, target, and means of attack. Thus, attackers intelligence should be considered when developing intelligent and cost-effective protection strategies. In this research, critical infrastructures are modeled as networks and the development of network protection strategies is modeled as a two-stage game between a protector and an attacker with incomplete information. Due to the complexity of critical infrastructures, there are usually a large number of combinations of potential protection and attack strategies leading to a computational challenge to find the Pareto equilibrium solutions for the proposed game. To meet this challenge, this research develops an evolutionary algorithm to solve the proposed a transformation of the game into a multi-objective optimization model.
引用
收藏
页码:244 / 258
页数:15
相关论文
共 50 条
  • [41] The defalsif-AI project: protecting critical infrastructures against disinformation and fake news
    Schreiber, David
    Picus, Cristina
    Fischinger, David
    Boyer, Martin
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2021, 138 (07): : 480 - 484
  • [42] Two-Stage Query Segmentation for Information Retrieval
    Bendersky, Michael
    Croft, W. Bruce
    Smith, David A.
    PROCEEDINGS 32ND ANNUAL INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2009, : 810 - 811
  • [43] Game of the quality of two models of economic dynamics with incomplete information
    Malyukov, V.P.
    Kibernetika i Vychislitel'naya Tekhnika, 1992, (01): : 58 - 67
  • [44] A two-stage decision model for information filtering
    Li, Yuefeng
    Zhou, Xujuan
    Bruza, Peter
    Xu, Yue
    Lau, Raymond Y. K.
    DECISION SUPPORT SYSTEMS, 2012, 52 (03) : 706 - 716
  • [45] Information in a two-stage adaptive optimal design
    Lane, Adam
    Yao, Ping
    Flournoy, Nancy
    JOURNAL OF STATISTICAL PLANNING AND INFERENCE, 2014, 144 : 173 - 187
  • [46] Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures
    Ma, Zhendong
    Smith, Paul
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2013, 2013, 8328 : 142 - 154
  • [47] Protecting private geosocial networks against practical hybrid attacks with heterogeneous information
    Li, Yuechuan
    Li, Yidong
    Xu, Guandong
    NEUROCOMPUTING, 2016, 210 : 81 - 90
  • [48] THE ROLE OF E-TRAINING IN PROTECTING INFORMATION ASSETS AGAINST DECEPTION ATTACKS
    George, Joey F.
    Biros, David P.
    Burgoon, Judee K.
    Nunamaker, Jay F., Jr.
    Crews, Janna M.
    Cao, Jinwei
    Marret, Kent
    Adkins, Mark
    Kruse, John
    Lin, Ming
    MIS QUARTERLY EXECUTIVE, 2008, 7 (02) : 85 - 97
  • [49] Incentive Mechanism for Mobile Crowdsensing With Two-Stage Stackelberg Game
    Hu, Chih-Lin
    Lin, Kun-Yu
    Chang, Carl K.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 1904 - 1918
  • [50] A two-stage investment game in real option analysis on IS/IT projects
    Zhang, Lingying
    Zheng, Shuling
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 425 - +