Security of Transportation Networks: Modeling Attacker-Defender Interaction
نویسندگان
چکیده
Transportation networks are increasingly facing new security threats due to the vulnerabilities of cyber-physical components that support their operation. In this article, we aim to understand how the network operator (defender) should prioritize the investment in securing a set of facilities in order to limit the impact of a strategic adversary (attacker) who can target a facility to increase the overall network cost. We adopt a game-theoretic approach to model the defender-attacker interaction and study two models: normal-form game – where both players move simultaneously; and sequential game – where attacker moves after observing the defender’s strategy. For each model, we provide a complete characterization of how the set of facilities that are secured by the defender in equilibrium vary with the cost of attack and per-facility defense cost. We also identify the set of vulnerable facilities; i.e., the facilities in the support set of attacker’s equilibrium strategy. Importantly, our analysis provides sharp conditions relating the cost of attack and defense cost for which the defender has the first mover advantage. In particular, by securing all vulnerable facilities at an appropriate level of effort in a proactive manner, the defender is able to fully deter the attacker from targeting any facility.
منابع مشابه
Optimal Escape Interdiction on Transportation Networks
Preventing crimes or terrorist attacks in urban areas is challenging. Law enforcement officers need to respond quickly to catch the attacker on his escape route, which is subject to time-dependent traffic conditions on transportation networks. The attacker can strategically choose his escape path and driving speed to avoid being captured. Existing work on security resource allocation has not co...
متن کاملAn attack-and-defence game for security assessment in vehicular ad hoc networks
Recently, there is an increasing interest in Security and Privacy issues in Vehicular ad hoc networks (or VANETs). However, the existing security solutions mainly focus on the preventive solutions while lack a comprehensive security analysis. The existing risk analysis solutions may not work well to evaluate the security threats in vehicular networks since they fail to consider the attack and d...
متن کاملStrategic guard placement for optimal response toalarms in security games
We introduce a Security Game with a single static guard that is supported by a number of spatially imperfect alarms. We model this setting with two non–cooperative games modeling two different strategic interactions between a Defender and an Attacker. In the first one the Defender has to respond to an activated alarm given its current position (Alarm–Response Game). In the second one, the Defen...
متن کاملAdaptive Attacker Strategy Development Against Moving Target Cyber Defenses
A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-da...
متن کاملGeometric Security Games
There are many real world scenarios which can be modeled as a security game where there is one player, called the defender, trying to protect a set of potential targets from another player, called the attacker. Game-theoretic security approaches are currently used to set up traffic checkpoints and canine patrols at LAX airport [38, 37], to assign Federal Air Marshals to flights [43], and will s...
متن کامل