2022
DOI: 10.1063/5.0112907
|View full text |Cite
|
Sign up to set email alerts
|

An attack–defense game model in infrastructure networks under link hiding

Abstract: Our increasing dependence on infrastructure networks leads to growing concerns over the protection of these networks. Many methods have been proposed to select protective strategies by combining complex network theory and game theory. However, the misleading effect of hidden links is not considered in previous methods. This work creates an information gap between attackers and defenders by partly hiding network links to mislead the attacker in the game. We first introduce the rule of link hiding that depends o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…Fu et al [20] established a Stackelberg game model based on camouflage strategies and proposed an evolutionary rule to optimize these strategies. Qi et al [21,22] proposed a link-hiding rule and analyzed its impact in terms of optimization within the context of dynamic attack and defense games played out on complex networks. Liu et al [23] established an attack-defensive game model based on a Stackelberg game under asymmetric information, obtaining a defensive resource allocation strategy to optimize the network robustness.…”
Section: Introductionmentioning
confidence: 99%
“…Fu et al [20] established a Stackelberg game model based on camouflage strategies and proposed an evolutionary rule to optimize these strategies. Qi et al [21,22] proposed a link-hiding rule and analyzed its impact in terms of optimization within the context of dynamic attack and defense games played out on complex networks. Liu et al [23] established an attack-defensive game model based on a Stackelberg game under asymmetric information, obtaining a defensive resource allocation strategy to optimize the network robustness.…”
Section: Introductionmentioning
confidence: 99%