Interdependent defense games: modeling interdependent security under deliberate attacks

作者: Hau Chan , Luis E. Ortiz , Michael Ceyko

DOI:

关键词:

摘要: We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence risk and security in multi-agent systems under deliberate external attacks. Our model builds upon (IDS) due Heal Kunreuther that considers source be result fixed randomized-strategy. adapt IDS games attacker's behavior. define pure-strategy space utility function derive appropriate cost functions for defenders. provide complete characterization mixed-strategy Nash equilibria (MSNE), design simple polynomial-time algorithm computing all them, an important subclass IDD games. In addition, we random-instance generator (general) based on version real-world Internet-derived Autonomous Systems (AS) graph (with around 27K nodes 100K edges), present promising empirical results using learning heuristics compute (approximate) MSNE such

参考文章(27)
Vincent Conitzer, Michal Pěchouček, Dmytro Korzhyk, Ondřej Vaněk, Milind Tambe, Manish Jain, A double oracle algorithm for zero-sum security games on graphs adaptive agents and multi-agents systems. pp. 327- 334 ,(2011) , 10.5555/2030470.2030518
Vincent Conitzer, Dmytro Korzhyk, Ronald Parr, Solving Stackelberg games with uncertain observability adaptive agents and multi-agents systems. pp. 1013- 1020 ,(2011) , 10.5555/2034396.2034413
Vincent Conitzer, Dmytro Korzhyk, Ronald Parr, Security games with multiple attacker resources international joint conference on artificial intelligence. pp. 273- 279 ,(2011) , 10.5591/978-1-57735-516-8/IJCAI11-056
Vicki M Bier, M Naceur Azaiez, Game theoretic risk analysis of security threats Springer US. ,(2009) , 10.1007/978-0-387-87767-9
Jens Grossklags, Benjamin Johnson, John Chuang, Nicolas Christin, Uncertainty in interdependent security games decision and game theory for security. pp. 234- 244 ,(2010) , 10.5555/1947915.1947937
Hau Chan, Luis E. Ortiz, Michael Ceyko, Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks arXiv: Computer Science and Game Theory. ,(2012)
Drew Fudenberg, David Knudsen Levine, The Theory of Learning in Games ,(1998)
M Kearns, Y Mansour, S Singh, Nash convergence of gradient dynamics in general-sum games uncertainty in artificial intelligence. pp. 541- 548 ,(2000)
Vincent Conitzer, Dmytro Korzhyk, Ronald Parr, Complexity of computing optimal stackelberg strategies in security resource allocation games national conference on artificial intelligence. pp. 805- 810 ,(2010)
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu, A Survey of Game Theory as Applied to Network Security hawaii international conference on system sciences. pp. 1- 10 ,(2010) , 10.1109/HICSS.2010.35