A Network Game with Attackers and a Defender: A Survey

نویسندگان

  • Marios Mavronicolas
  • Vicky Papadopoulou
  • Anna Philippou
  • Paul Spirakis
چکیده

We survey a research line recently initiated by Mavronicolas et al. [14, 15, 16], concerning a strategic game on a graph G(V,E) with two confronting classes of randomized players: ν attackers who choose vertices and wish to minimize the probability of being caught by the defender, who chooses edges and gains the expected number of attackers it catches. So, the defender captures system rationality. In a Nash equilibrium, no single player has an incentive to unilaterally deviate from its randomized strategy. The Price of Defense is the worst-case ratio, over all Nash equilibria, of the optimal gain of the defender (which is ν) over the gain of the defender at a Nash equilibrium. We present a comprehensive collection of trade-offs between the Price of Defense and the computational efficiency of Nash equilibria proved in [14, 15, 16]. • We present an algebraic characterization of (mixed) Nash equilibria. • No (non-trivial) instance of the graph-theoretic game has a pure Nash equilibrium. This is an immediate consequence of some covering properties proved for the supports of the players in all (mixed) Nash equilibria. • We present a reduction of the game to a Zero-Sum Two-Players Game that proves that a general Nash equilibrium can be computed via Linear Programming in polynomial time. However, the reduction does not provide any apparent guarantees on the Price of Defense. • To obtain guarantees on Price of Defense, we present an analysis of several structured Nash equilibria: – In a Matching Nash equilibrium, the support of the defender is an Edge Cover of the graph. Matching Nash equilibria are shown to still be computable in polynomial time, and that they incur a Price of Defense of α(G), the Independence Number of G. – In a Perfect Matching Nash equilibrium, the support of the defender is a Perfect Matching of the graph. Perfect Matching Nash equilibria are shown to be computable in computed in polynomial time, and that they incur a Price of Defense of |V | 2 . • We consider a generalization of the basic model with an increased power for the defender: it is able to scan a simple path of the network instead of a single edge. Deciding existence of a pure Nash equilibrium is shown to be an NP-complete problem for this model. This work was partially supported by the IST Program of the European Union under contract number IST-2004001907 (DELIS), and by research funds at University of Cyprus. Department of Computer Science, University of Cyprus, P.O. Box 20537, Nicosia CY-1678, Cyprus. Email: {mavronic,viki,annap}@ucy.ac.cy Research Academic Computer Technology Institute (RACTI), Rion, Patras 26500, Greece & Department of Computer Engineering and Informatics, University of Patras, Rion, Patras 26500, Greece. Email: [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy

Game theory has been researched extensively in network security demonstrating an advantage of modeling the interactions between attackers and defenders. Game theoretic defense solutions have continuously evolved in most recent years. One of the pressing issues in composing a game theoretic defense system is the development of consistent quantifiable metrics to select the best game theoretic def...

متن کامل

Defender Strategies In Domains Involving Frequent Adversary Interaction

Recently, there has been an increase in interest in applying game theoretic approaches to domains involving frequent adversary interactions, such as wildlife and fishery protection. In these domains, the law enforcement agency faces adversaries who repeatedly and frequently carry out illegal activities, and thus, do not have time for extensive surveillance before taking actions. This makes them...

متن کامل

Cyber War Game in Temporal Networks

In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with minimum effort. Given the system goal states of attackers and defenders, we study what strategies attackers or defenders can take to reach their respective system goal state (i...

متن کامل

A A Survey of Interdependent Information Security Games

Information security has traditionally been considered a strategic cat-and-mouse game between the defending party and “the attacker”. The goal of the attacker has been to compromise the defender’s systems and to profit from this unauthorized access, while the goal of the defender has been to prevent unauthorized access to and usage of resources. In this game, both the attacker and the defender ...

متن کامل

Geometric Security Games

There are many real world scenarios which can be modeled as a security game where there is one player, called the defender, trying to protect a set of potential targets from another player, called the attacker. Game-theoretic security approaches are currently used to set up traffic checkpoints and canine patrols at LAX airport [38, 37], to assign Federal Air Marshals to flights [43], and will s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006