Modeling Attacker-Defender Interaction as a Zero-Sum Stochastic Game

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling a Multitarget Attacker-Defender Game with Budget Constraints

Copyright: © 2017 INFORMS Abstract. Though the choices of terrorists’ attack targets are vast, their resources are limited. In this paper, a game-theoretical model is proposed to study both the defender’s (government) and the attacker’s (terrorist) expenditures among multiple targets under budget constraints to guide investment in defense. We study how the defender’s and the attacker’s equilibr...

متن کامل

Modeling costly learning and counter-learning in a defender-attacker game with private defender information

In asymmetric war scenarios (e.g., counter-terrorism), the adversary usually invests a significant time to learn the system structure and identify vulnerable components, before launching attacks. Traditional game-theoretic defender-attacker models either ignore such learning periods or the entailed costs. This paper fills the gap by analyzing the strategic interactions of the terrorist’s costly...

متن کامل

Security of Transportation Networks: Modeling Attacker-Defender Interaction

Transportation networks are increasingly facing new security threats due to the vulnerabilities of cyber-physical components that support their operation. In this article, we aim to understand how the network operator (defender) should prioritize the investment in securing a set of facilities in order to limit the impact of a strategic adversary (attacker) who can target a facility to increase ...

متن کامل

An Attacker-Defender Game for Honeynets

A honeynet is a portion of routed but otherwise unused address space that is instrumented for network traffic monitoring. It is an invaluable tool for understanding unwanted Internet traffic and malicious attacks. We formalize the problem of defending honeynets from systematic mapping (a serious threat to their viability) as a simple two-person game. The objective of the Attacker is to identify...

متن کامل

Modeling secrecy and deception in a multiple-period attacker-defender signaling game

In this paper, we apply game theory to model strategies of secrecy and deception in a multiple-period attacker–defender resource-allocation and signaling game with incomplete information. At each period, we allow one of the three possible types of defender signals—truthful disclosure, secrecy, and deception. We also allow two types of information updating—the attacker updates his knowledge abou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Sciences and Applications

سال: 2013

ISSN: 2328-7268

DOI: 10.12691/jcsa-1-2-3