Simulating attacker and defender strategies within a dynamic game on network topology

被引:7
|
作者
Nystrom, Jared K. [1 ]
Robbins, Matthew J. [1 ]
Deckro, Richard F. [1 ]
Morris, James F. [1 ]
机构
[1] Air Force Inst Technol, Dept Operat Sci, Wright Patterson AFB, OH 45433 USA
关键词
Military; simulation; dynamic game; social networks; CENTRALITY;
D O I
10.1057/s41273-017-0054-0
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Successful military counterinsurgency operations increasingly rely upon an advanced understanding of relevant networks and their topologies. This paper evaluates, via simulations, various attacker and defender strategies within a dynamic game on network topology. The simulation is designed to provide insight into the effectiveness of offensive targeting strategies as determined by various centrality measures, given limited states of information and varying network topologies. Improved modeling of complex social behaviors is accomplished through incorporation of a distance-based utility function. Moreover, insights into effective defensive strategies are gained through incorporation of a hybrid model of network regeneration. Two designed experiments investigate the impact of game features on the superlative offensive and defensive strategies. Results indicate that degree centrality, proximal target centrality, and closeness centrality outperform other measures as targeting criteria given varying network topologies and defensive regeneration methods. Furthermore, the attacker state of information is only significant given a topology conducive to defense. The costs of direct relationships significantly impact effective regeneration methods, whereas restructuring methods are insignificant. These results offer preliminary insight into practical attack and defense strategies utilizing a simulation that can be easily adapted for operational applications.
引用
收藏
页码:307 / 331
页数:25
相关论文
共 50 条
  • [21] An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects
    Al Aziz, Ridwan
    He, Meilin
    Zhuang, Jun
    RISK ANALYSIS, 2020, 40 (07) : 1481 - 1506
  • [22] Defending a single object in a defender-attacker game considering time
    Zhang, Xiaoxiong
    Li, Xin
    Yuan, Zhen
    2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2019, : 506 - 510
  • [23] A zero-sum game of resource allocation: Attacker against defender
    Morozov, V. V.
    Shalbuzov, K. D.
    AUTOMATION AND REMOTE CONTROL, 2015, 76 (11) : 2045 - 2055
  • [24] A zero-sum game of resource allocation: Attacker against defender
    V. V. Morozov
    K. D. Shalbuzov
    Automation and Remote Control, 2015, 76 : 2045 - 2055
  • [25] A defender-attacker-defender approach to the optimal fortification of a rail intermodal terminal network
    Sarhadi H.
    Tulett D.M.
    Verma M.
    Journal of Transportation Security, 2015, 8 (1-2) : 17 - 32
  • [26] Nash-equilibrium strategies of orbital Target-Attacker-Defender game with a non-maneuvering target
    Li, Yifeng
    Liang, Xi
    Dang, Zhaohui
    CHINESE JOURNAL OF AERONAUTICS, 2024, 37 (10) : 365 - 379
  • [27] Nash-equilibrium strategies of orbital Target-Attacker-Defender game with a non-maneuvering target
    LI, Yifeng
    LIANG, Xi
    DANG, Zhaohui
    Chinese Journal of Aeronautics, 1600, 37 (10): : 365 - 379
  • [28] Nash-equilibrium strategies of orbital Target-Attacker-Defender game with a non-maneuvering target
    Yifeng LI
    Xi LIANG
    Zhaohui DANG
    Chinese Journal of Aeronautics, 2024, 37 (10) : 365 - 379
  • [29] Modeling costly learning and counter-learning in a defender-attacker game with private defender information
    Jie Xu
    Jun Zhuang
    Annals of Operations Research, 2016, 236 : 271 - 289
  • [30] Modeling costly learning and counter-learning in a defender-attacker game with private defender information
    Xu, Jie
    Zhuang, Jun
    ANNALS OF OPERATIONS RESEARCH, 2016, 236 (01) : 271 - 289