Affiliation:
1. National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha 410073, China
Abstract
Recently, research interest in the field of infrastructure attack and defense scenarios has increased. Numerous methods have been proposed for studying strategy interactions that combine complex network theory and game theory. However, the unavoidable effect of constrained strategies in complex situations has not been considered in previous studies. This study introduces a novel approach to analyzing these interactions by including the effects of constrained strategies, a factor often neglected in traditional analyses. First, we introduce the rule of constraints on strategies, which depends on the average distance between selected nodes. As the average distance increases, the probability of choosing the corresponding strategy decreases. Second, we establish an attacker–defender game model with constrained strategies based on the above rule and using information theory to evaluate the uncertainty of these strategies. Finally, we present a method for solving this problem and conduct experiments based on a target network. The results highlight the unique characteristics of the Nash equilibrium when setting constraints, as these constraints influence decision makers’ Nash equilibria. When considering the constrained strategies, both the attacker and the defender tend to select strategies with lower average distances. The effect of the constraints on their strategies becomes less apparent as the number of attackable or defendable nodes increases. This research advances the field by introducing a novel framework for examining strategic interactions in infrastructure defense and attack scenarios. By incorporating strategy constraints, our work offers a new perspective on the critical area of infrastructure security.
Reference46 articles.
1. Brown, G.G., Carlyle, W.M., Salmeron, J., and Wood, K. (2005). Analyzing the vulnerability of critical infrastructure to attack and planning defenses. Emerging Theory, Methods, and Applications, Informs.
2. Critical infrastructure protection: Requirements and challenges for the 21st century;Alcaraz;Int. J. Crit. Infrastruct. Prot.,2015
3. Probabilistic risk analysis and terrorism risk;Ezell;Risk Anal.,2010
4. How probabilistic risk assessment can mislead terrorism risk analysts;Brown;Risk Anal.,2011
5. Nature plays with dice—Terrorists do not: Allocating resources to counter strategic versus probabilistic risks;Golany;Eur. J. Oper. Res.,2009