IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v12y2024i16p2535-d1457852.html
   My bibliography  Save this article

NIGA: A Novel Method for Investigating the Attacker–Defender Model within Critical Infrastructure Networks

Author

Listed:
  • Jiaqi Ren

    (National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha 410073, China)

  • Jin Liu

    (National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha 410073, China)

  • Yibo Dong

    (National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha 410073, China)

  • Zhe Li

    (National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha 410073, China)

  • Weili Li

    (National Key Laboratory of Information Systems Engineering, National University of Defense Technology, Changsha 410073, China)

Abstract

The field of infrastructure security has garnered significant research attention. By integrating complex network theory with game theory, researchers have proposed many methods for studying the interactions between the attacker and the defender from a macroscopic viewpoint. We constructed a game model of infrastructure networks to analyze attacker-defender confrontations. To address the challenge of finding the Nash equilibrium, we developed a novel algorithm—node-incremental greedy algorithm (NIGA)—which uses less strategy space to solve the problem. The experiments performed further showed that NIGA has better optimization ability than other traditional algorithms. The optimal defense strategies under different conditions of initial strategy ratios and attacker-defender resources were analyzed in this study. Using intelligent computing to solve the Nash equilibrium is a new approach by which for researchers to analyze attacker-defender confrontations.

Suggested Citation

  • Jiaqi Ren & Jin Liu & Yibo Dong & Zhe Li & Weili Li, 2024. "NIGA: A Novel Method for Investigating the Attacker–Defender Model within Critical Infrastructure Networks," Mathematics, MDPI, vol. 12(16), pages 1-24, August.
  • Handle: RePEc:gam:jmathe:v:12:y:2024:i:16:p:2535-:d:1457852
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/12/16/2535/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/12/16/2535/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    2. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    3. J. Jiang & X. Liu, 2021. "Bayesian Stackelberg game model for water supply networks against interdictions with mixed strategies," International Journal of Production Research, Taylor & Francis Journals, vol. 59(8), pages 2537-2557, April.
    4. Saxena, Chandni & Doja, M.N. & Ahmad, Tanvir, 2018. "Group based centrality for immunization of complex networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 508(C), pages 35-47.
    5. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    6. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    7. Gerald G. Brown & Louis Anthony (Tony) Cox, Jr., 2011. "How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 196-204, February.
    8. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    2. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    3. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
    4. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    5. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    6. Han, Lin & Zhao, Xudong & Chen, Zhilong & Gong, Huadong & Hou, Benwei, 2021. "Assessing resilience of urban lifeline networks to intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    7. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    8. Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
    9. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    10. Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
    11. L. Elbakidze & Y. H. Jin, 2015. "Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1520-1535, August.
    12. Wu, Yipeng & Chen, Zhilong & Gong, Huadong & Feng, Qilin & Chen, Yicun & Tang, Haizhou, 2021. "Defender–attacker–operator: Tri-level game-theoretic interdiction analysis of urban water distribution networks," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    13. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    14. William M. Kroshl & Shahram Sarkani & Thomas A Mazzuchi, 2015. "Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent‐Based Simulation," Risk Analysis, John Wiley & Sons, vol. 35(9), pages 1690-1705, September.
    15. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    16. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
    17. E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
    18. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    19. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimization of time constrained N-version programming service components with competing task execution and version corruption processes," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    20. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:12:y:2024:i:16:p:2535-:d:1457852. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.