Artykuł w czasopiśmie
Brak miniatury
Licencja

ClosedAccessDostęp zamknięty
 

Strategic Attack & Defense in Security Diffusion Games

Uproszczony widok
cris.lastimport.scopus2024-02-12T19:51:56Z
dc.abstract.enSecurity games model the confrontation between a defender protecting a set of targets and an attacker who tries to capture them. A variant of these games assumes security interdependence between targets, facilitating contagion of an attack. So far, only stochastic spread of an attack has been considered. In this work, we introduce a version of security games, where the attacker strategically drives the entire spread of attack and where interconnections between nodes affect their susceptibility to be captured. We find that the strategies effective in the settings without contagion or with stochastic contagion are no longer feasible when spread of attack is strategic. While in the former settings it was possible to efficiently find optimal strategies of the attacker, doing so in the latter setting turns out to be an NP-complete problem for an arbitrary network. However, for some simpler network structures, such as cliques, stars, and trees, we show that it is possible to efficiently find optimal strategies of both players. For arbitrary networks, we study and compare the efficiency of various heuristic strategies. As opposed to previous works with no or stochastic contagion, we find that centrality-based defense is often effective when spread of attack is strategic, particularly for centrality measures based on the Shapley value.
dc.affiliationUniwersytet Warszawski
dc.contributor.authorWaniek, Marcin
dc.contributor.authorAlshamsi, Aamena
dc.contributor.authorMichalak, Tomasz
dc.date.accessioned2024-01-26T08:19:37Z
dc.date.available2024-01-26T08:19:37Z
dc.date.issued2020
dc.description.financePublikacja bezkosztowa
dc.description.number1
dc.description.volume11
dc.identifier.doi10.1145/3357605
dc.identifier.issn2157-6904
dc.identifier.urihttps://repozytorium.uw.edu.pl//handle/item/120786
dc.identifier.weblinkhttps://dl.acm.org/doi/pdf/10.1145/3357605
dc.languageeng
dc.pbn.affiliationcomputer and information sciences
dc.relation.ispartofACM Transactions on Intelligent Systems and Technology
dc.relation.pages1-35
dc.rightsClosedAccess
dc.sciencecloudnosend
dc.titleStrategic Attack & Defense in Security Diffusion Games
dc.typeJournalArticle
dspace.entity.typePublication