Stackelberg game in critical infrastructures from a network science perspective

Abstract Defending critical infrastructures has received enormous attentions by security agencies. Many infrastructures function as networks such as transportation and communication systems. It is necessary for us to protect them from a network science perspective. In many real-world scenarios, the attacker can observe the defender’s action and then choose its best strategy accordingly. Therefore, we propose a Stackelberg game where the defender commits to a strategy, either a pure strategy or a mixed one, and the attacker makes its choice after knowing the defender’s action. The strategies and payoffs in this game are defined on the basis of the topology structure of the network. For the convenience of analysis, only two attack and defense strategies, namely, targeted strategy and random strategy, are considered in this paper. The simulation results reveal that in infrastructures with a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender commits to a mixed strategy and the attacker’s best response is to attack hub nodes with the largest degrees. When the cost-sensitive parameter exceeds a threshold, both the defender and the attacker switch to the random strategy. We also implement experiments with different cost-sensitive parameters and find that the attack-cost-sensitive parameter is the key factor influencing the equilibrium strategies. Our work is a rudimentary attempt to analyze the Stackelberg game in protecting networked infrastructures and it is worth further study.

[1]  Xiaojun Shan,et al.  Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..

[2]  Jun Wu,et al.  Attacker-defender game from a network science perspective. , 2018, Chaos.

[3]  Jose Emmanuel Ramirez-Marquez,et al.  Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .

[4]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[5]  Sarit Kraus,et al.  Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..

[6]  Gerald G. Brown,et al.  How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[7]  Dan Kovenock,et al.  Weakest‐link attacker‐defender games with multiple attack technologies , 2012 .

[8]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[9]  David K. Y. Yau,et al.  Defense Strategies for Asymmetric Networked Systems with Discrete Components , 2018, Sensors.

[10]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[11]  Jing Zhang,et al.  Stochastic shortest path network interdiction with a case study of Arizona-Mexico border , 2017, Reliab. Eng. Syst. Saf..

[12]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[13]  C. F. Larry Heimann,et al.  Simulation and Game-Theoretic Analysis of an Attacker-Defender Game , 2012, GameSec.

[14]  John A. Sokolowski,et al.  Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[15]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[16]  Claudio M. Rocco Sanseverino,et al.  A holistic method for reliability performance assessment and critical components detection in complex networks , 2011 .

[17]  Jun Zhuang,et al.  Modeling a Multitarget Attacker-Defender Game with Budget Constraints , 2017, Decis. Anal..

[18]  Qing Li,et al.  Locating and protecting facilities from intentional attacks using secrecy , 2018, Reliab. Eng. Syst. Saf..

[19]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[20]  Chi Zhang,et al.  Critical infrastructure protection using secrecy - A discrete simultaneous game , 2015, Eur. J. Oper. Res..

[21]  Sarit Kraus,et al.  An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.

[22]  Min Ouyang,et al.  An integrated tri-level model for enhancing the resilience of facilities against intentional attacks , 2019, Ann. Oper. Res..

[23]  J. Salmeron,et al.  Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.

[24]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[25]  Jun Zhuang,et al.  Modelling ‘contracts’ between a terrorist group and a government in a sequential game , 2012, J. Oper. Res. Soc..

[26]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[27]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[28]  Min Ouyang,et al.  Mitigating electric power system vulnerability to worst-case spatially localized attacks , 2017, Reliab. Eng. Syst. Saf..

[29]  Min Ouyang,et al.  A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks , 2017, Eur. J. Oper. Res..

[30]  Vineet M. Payyappalli,et al.  Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts , 2017, Risk analysis : an official publication of the Society for Risk Analysis.

[31]  David K. Y. Yau,et al.  Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[32]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[33]  Gerald G. Brown,et al.  Solving Defender-Attacker-Defender Models for Infrastructure Defense , 2011, ICS 2011.

[34]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..