Abstract

Most critical infrastructure networks often suffer malicious attacks, which may result in network failures. Therefore, how to design more robust defense measures to minimize the loss is a great challenge. In recent years, defense strategies for enhancing the robustness of the networks are developed based on the game theory. However, the aforementioned method cannot effectively solve the defending problem on large-scale networks with a full strategy space. In this study, we achieve the purpose of protecting the infrastructure networks by allocating limited resources to monitor the targets. Based on the existing two-person zero-sum game model and the Double Oracle framework, we propose the EMSL algorithm which is an approximation algorithm based on a greedy search to compute effective mixed strategies for protecting large-scale networks. The improvement of our approximation algorithm to other algorithms is discussed. Experimental results show that our approximation algorithm can efficiently compute the mixed strategies on actual large-scale networks with a full strategy space, and the mixed defense strategies bring the highest utility to a defender on different networks when dealing with different attacks.

Highlights

  • In recent years, malicious activities against the critical infrastructures lead to new challenges to the world’s security, which have inflicted enormous economic losses and threatened public safety

  • Prior works have designed methods to protect the critical infrastructure networks against malicious attacks, and we summarize them into three classes

  • 2) Second, we propose the effective mixed strategies for largescale networks (EMSL) algorithm, which is based on greed under the Double Oracle framework to obtain an effective defense solution

Read more

Summary

Introduction

Malicious activities against the critical infrastructures lead to new challenges to the world’s security, which have inflicted enormous economic losses and threatened public safety. Analyzing the robustness of the critical infrastructure networks against the malicious attacks and improving the efficiency of defending the targets with limited resources remain major problems. The first class comes up with adding nodes (e.g., adding additional base stations), adding edges (e.g., adding additional power lines), or swapping edges (e.g., rewiring power lines) to enhance the network robustness [3,4,5]. These methods will change the network structure, while the structure of a network is a defining characteristic that can identify its functionality and should remain unchanged.

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.