4 research outputs found
An attack-defense game on interdependent networks
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game on a network consisting of interdependent subnetworks. The defender moves first and allocates its resource to protect the network nodes. The attacker then moves and allocates its resources to attack the network nodes. The binary decision diagram is employed to obtain all potential states of the network system after attack. Considering each of its opponent’s strategies, the game player tries to maximize its own cumulative prospect value. The backward induction method is employed to obtain the game players’ optimal strategies, respectively. Different resource relationships are analyzed to testify the robustness of the main conclusions and players’ risk attitudes are also investigated. Numerical examples are used to illustrate the analysis
Optimal defence-attack strategies between one defender and two attackers
This paper analyses the optimal strategies for one defender and two attackers in a defence-attack game, where a) the defender allocates its resource into defending against and attacking the two attackers, and b) the two attackers, after observing the action of the defender, allocate their resources into attacking and defending against the defender, on either a cooperative or non-cooperative basis. On a cooperative basis, for each of the defender’s given strategies, the two attackers work together to maximise the sum of their cumulative prospect values while anticipating the eight possible game outcomes. On a non-cooperative basis, for each of the defender’s given strategies, each attacker simultaneously yet independently tries to maximise their own cumulative prospect value. In both cases, the defender maximises its cumulative prospect value while anticipating the attackers’ actions. Backward induction is employed to obtain the optimal defence and attack strategies for all scenarios. Numerical examples are performed to illustrate the applications of the strategies. In general, we find two opposing effects considering the attackers’ strategies and analyse the alteration of strategies for the participants under two different risk preferences: risk-averse and risk seeking. The reasons for the alteration are also performed to illustrate the practical applications
Recommended from our members
A Modelling approach for evaluating the ranking capability of Situational Awareness System in real time operation. Modelling, evaluating and quantifying different situational assessment in real time operation, using an analytical approach for measuring the ranking capability of SWA system
In a dynamically monitored environment the analyst team need timely and accurate
information to conduct proactive action over complex situations. Typically, there are
thousands of reported activities in a real time operation, therefore steps are taken
to direct the analyst’s attention to the most important activity. The data fusion
community have introduced the information fusion model, with multiple situational
assessments. Each process lends itself to ranking the most important activities into a
predetermined order.
Unfortunately, the capability of a real time system can be hindered by the knowledge
limitation problem, particularly when the underlying system is processing multiple
sensor information. Consequently, the situational awareness domains may not rank
the identified situation as perfect, as desired by the decision-making resources. This thesis presents advanced research carried out to evaluate the ranking capability of
information from the situational awareness domains: perception, comprehension and
projection. The Ranking Capability Score (RCS) has been designed for evaluating
the prioritisation process. The enhanced (RCS) has been designed for addressing
the knowledge representation problem in the user system relation under a situational
assessment where the proposed number of tracking activities are dynamically shifted.
Finally, the Scheduling Capability Score was designed for evaluating the scheduling
capability of the situational awareness system.
The proposed performance metrics have been successful in fulfilling their objectives.
Furthermore, they have been validated and evaluated using an analytical approach,
through conducting a rigorous analysis of the prioritisation and scheduling processes,
despite any constraints related to a domain-specific configuration