Technical Papers
Jun 24, 2023

Attack–Defense Game in Interdependent Networks: A Functional Perspective

Publication: Journal of Infrastructure Systems
Volume 29, Issue 3

Abstract

The normal operation of critical infrastructure is related to the stability of society and a country’s development. Based on game theory and network science, this paper analyzes the attack–defense issues of critical infrastructure, proposing a network attack–defense game model based on virtual flow. Five coupling methods are established according to the complex interdependent characteristics and important evaluation indicators (the degree value and betweenness value) in the network. Considering the network’s information transmission, redistribution, and cascading failures, a cascading failure model based on betweenness virtual flow is established. A two-player game is adopted, in which the attacker and the defender act simultaneously. The scale-free, small-world, and random networks are related using these five coupling methods. Simulation and theoretical analyses are carried out on the interdependent network game scenario under different coupling modes. The game equilibrium under different network coupling conditions and coupling methods is simulated, and the preferences of the game participants are determined. In addition, a sensitivity analysis of the game parameters is conducted, facilitating the identification of certain effective strategies that can support decision-makers.

Practical Applications

Critical infrastructure networks play an important role in maintaining social stability. Based on game theory and network science, this paper analyzed the attack–defense problems of critical infrastructures and proposed an attacker–defender game model based on the betweenness virtual flow. The attack–defense game in the interdependent network is analyzed in terms of coupling modes, network types, and tolerance coefficient. A sensitivity analysis of the game parameters is also conducted. The results show that the interdependent networks under random coupling and reverse coupling strategies are more vulnerable to attack. In addition, the cost-sensitive parameter is a key factor affecting the game equilibrium. Even if the two subnetworks in the interdependent network are the same, the payoffs and the robustness will be different when the order of removing nodes is different. This paper provides decision support for actual infrastructure protection.

Get full access to this article

View all available purchase options and get full access to this article.

Data Availability Statement

All data, models, and code generated or used during the study appear in the published article.

Acknowledgments

This work is jointly supported by National Natural Science Foundations of China (61801197 and 61503166).

References

Ali, G. G., I. H. El-adaway, C. Sims, J. S. Holladay, and C.-F. Chen. 2022. “Policies and incentives for promoting distributed solar generation: Impact on electric power infrastructure.” J. Infrastruct. Syst. 28 (4): 04022034. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000714.
Barabasi, A. L., and R. Albert. 1999. “Emergence of scaling in random networks.” Science 286 (5439): 509–512. https://doi.org/10.1126/science.286.5439.509.
Barabasi, A. L., and E. Bonabeau. 2003. “Scale-free networks.” Sci. Am. 288 (5): 60–69. https://doi.org/10.1038/scientificamerican0503-60.
Beriro, D., et al. 2022. “A decision support system to assess the feasibility of onshore renewable energy infrastructure.” Renewable Sustainable Energy Rev. 168 (Oct): 112771. https://doi.org/10.1016/j.rser.2022.112771.
Burkhalter, M., and B. T. Adey. 2022. “Digitalizing the determination of railway infrastructure intervention programs: A network optimization model.” J. Infrastruct. Syst. 28 (2): 04022012. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000681.
Case, D. U. 2016. “Analysis of the cyber attack on the Ukrainian power grid.” Electr. Inf. Sharing Anal. Center 388 (Mar): 1–29.
Chen, J., C. Y. Wu, M. Li, and M. B. Hu. 2019. “Hybrid traffic dynamics on coupled networks.” Phys. A 516 (Feb): 98–104. https://doi.org/10.1016/j.physa.2018.10.016.
Chen, L. 2022. “The coevolving behavior of games and strategies under different network structures.” Int. J. Mod. Phys. C 34 (1): 1–14. https://doi.org/10.1142/S0129183123500067.
Crucitti, P., V. Latora, and M. Marchiori. 2004. “Model for cascading failures in complex networks.” Phys. Rev. E 69 (4): 045104. https://doi.org/10.1103/PhysRevE.69.045104.
Deng, Y., J. Wu, and Y. J. Tan. 2016. “Optimal attack strategy of complex networks based on Tabu search.” Phys. A 442 (Feb): 74–81. https://doi.org/10.1016/j.physa.2015.08.043.
Dong, Z. C., M. Tian, and Y. J. Fang. 2018. “Impact of local coupling on the vulnerability of 2D spatially embedded interdependent networks.” Phys. Lett. A 382 (36): 2544–2550. https://doi.org/10.1016/j.physleta.2018.07.003.
Dui, H. Y., X. Y. Meng, H. Xiao, and J. J. Guo. 2020. “Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game.” Reliab. Eng. Syst. Saf. 199 (Jul): 106919. https://doi.org/10.1016/j.ress.2020.106919.
Fu, C. Q., Y. J. Gao, J. L. Zhong, Y. Sun, P. T. Zhang, and T. Wu. 2021. “Attack-defense game for critical infrastructure considering the cascade effect.” Reliab. Eng. Syst. Saf. 216 (Dec): 107958. https://doi.org/10.1016/j.ress.2021.107958.
Gjorgiev, B., and G. Sansavini. 2022. “Identifying and assessing power system vulnerabilities to transmission asset outages via cascading failure analysis.” Reliab. Eng. Syst. Saf. 217 (Jan): 108085. https://doi.org/10.1016/j.ress.2021.108085.
Goforth, E., W. El-Dakhakhni, and L. Wiebe. 2022. “Network analytics for infrastructure asset management systemic risk assessment.” J. Infrastruct. Syst. 28 (2): 04022006. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000667.
Guo, P. L., and C. D. Han. 2021. “Nash equilibrium and group strategy consensus of networked evolutionary game with coupled social groups.” Appl. Math. Comput. 409 (Nov): 126380. https://doi.org/10.1016/j.amc.2021.126380.
Hao, Y. C., L. M. Jia, and Y. H. Wang. 2020. “Edge attack strategies in interdependent scale-free networks.” Phys. A 540 (Feb): 122759. https://doi.org/10.1016/j.physa.2019.122759.
Hausken, K. 2017. “Defense and attack for interdependent systems.” Eur. J. Oper. Res. 256 (2): 582–591. https://doi.org/10.1016/j.ejor.2016.06.033.
Hausken, K., and G. Levitin. 2009. “Minmax defense strategy for complex multi-state systems.” Reliab. Eng. Syst. Saf. 94 (2): 577–587. https://doi.org/10.1016/j.ress.2008.06.005.
Huang, Y., J. Wu, K. T. Chi, and Z. Zheng. 2021. “Sequential attacker–defender game on complex networks considering the cascading failure process.” IEEE Trans. Comput. Social Syst. 9 (2): 518–529. https://doi.org/10.1109/TCSS.2021.3099718.
Kabir, K. A., K. Kuga, and J. Tanimoto. 2020. “The impact of information spreading on epidemic vaccination game dynamics in a heterogeneous complex network-a theoretical approach.” Chaos Solitons Fractals 132 (Mar): 109548. https://doi.org/10.1016/j.chaos.2019.109548.
Lemke, C. E., and J. T. Howson Jr. 1964. “Equilibrium points of bimatrix games.” J. Soc. Ind. Appl. Math. 12 (2): 413–423. https://doi.org/10.1137/0112033.
Li, Y. L., J. Lin, C. Zhang, H. X. Zhu, S. X. Zeng, and C. S. Sun. 2022. “Joint optimization of structure and protection of interdependent infrastructure networks.” Reliab. Eng. Syst. Saf. 218 (Feb): 108163. https://doi.org/10.1016/j.ress.2021.108163.
Li, Y. P., S. Qiao, Y. Deng, and J. Wu. 2019. “Stackelberg game in critical infrastructures from a network science perspective.” Phys. A 521 (Mar): 705–714. https://doi.org/10.1016/j.physa.2019.01.119.
Li, Y. P., S. Y. Tan, Y. Deng, and J. Wu. 2018. “Attacker-defender game from a network science perspective.” Chaos 28 (5): 051102. https://doi.org/10.1063/1.5029343.
Lin, C., H. Xiao, R. Peng, and Y. S. Xiang. 2021. “Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory.” Reliab. Eng. Syst. Saf. 210 (Jun): 107510. https://doi.org/10.1016/j.ress.2021.107510.
Liu, L., L. Zhang, S. Liao, J. Y. Liu, and Z. X. Wang. 2021. “A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense.” Inf. Sci. 577 (Aug): 245–264. https://doi.org/10.1016/j.ins.2021.06.078.
Mavronicolas, M., V. Papadopoulou, A. Philippou, and P. Spirakis. 2008. “A network game with attackers and a defender.” Algorithmica 51 (3): 315–341. https://doi.org/10.1007/s00453-007-9109-3.
Nash, J. F., Jr. 1950. “Equilibrium points in n-person games.” Proc. Natl. Acad. Sci. U.S.A. 36 (1): 48–49. https://doi.org/10.1073/pnas.36.1.48.
Ouyang, M. 2013. “Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability.” Chaos 23 (2): 023114. https://doi.org/10.1063/1.4807478.
Peng, R., D. Wu, M. Y. Sun, and S. M. Wu. 2021. “An attack-defense game on interdependent networks.” J. Oper. Res. Soc. 72 (10): 2331–2341. https://doi.org/10.1080/01605682.2020.1784048.
Porter, R., E. Nudelman, Y. J. G. Shoham, and E. Behavior. 2008. “Simple search methods for finding a Nash equilibrium.” Games Econ. Behav. 63 (2): 642–662. https://doi.org/10.1016/j.geb.2006.03.015.
Rinaldi, S. M., J. P. Peerenboom, and T. K. Kelly. 2001. “Identifying, understanding, and analyzing critical infrastructure interdependencies.” IEEE Control Syst. Mag. 21 (6): 11–25. https://doi.org/10.1109/37.969131.
Rocco, C. M., K. Barker, J. Moronta, and J. E. Ramirez-Marquez. 2018. “Multiobjective formulation for protection allocation in interdependent infrastructure networks using an attack-diffusion model.” J. Infrastruct. Syst. 24 (1): 04018002. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000415.
Shi, C. X., and G. H. Yang. 2019. “Nash equilibrium computation in two-network zero-sum games: An incremental algorithm.” Neurocomputing 359 (Mar): 114–121. https://doi.org/10.1016/j.neucom.2019.05.076.
Sun, C. B., C. Luo, and J. Q. Li. 2020. “Aspiration-based co-evolution of cooperation with resource allocation on interdependent networks.” Chaos Solitons Fractals 135 (Jun): 109769. https://doi.org/10.1016/j.chaos.2020.109769.
Tardos, É., and V. Vazirani. 2007. “Basic solution concepts and computational issues.” In Algorithmic game theory, edited by N. Nisan, T. Roughgarden, E. Tardos, and V. Vazirani, 3–28. Cambridge: Cambridge University Press.
Ugwu, I. A., B. Salarieh, A. M. Salman, L. Petnga, and M. Y. Williams. 2022. “Postdisaster recovery planning for interdependent infrastructure systems prioritizing the functionality of healthcare facilities.” J. Infrastruct. Syst. 28 (4): 04022038. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000719.
Wang, J., H. Y. Fang, and X. L. Qin. 2019. “Cascading failures on correlated interdependent networks with dependency groups.” Phys. A 530 (Sep): 121355. https://doi.org/10.1016/j.physa.2019.121355.
Wang, K., J. Liu, L. Tian, X. Tan, G. Peng, T. Qin, J. J. R. E. Wu, and S. Safety. 2022. “Analyzing vulnerability of optical fiber network considering recoverability.” Reliab. Eng. Syst. Saf. 221 (May): 108308. https://doi.org/10.1016/j.ress.2021.108308.
Wang, N., Z. Y. Jin, and J. Zhao. 2021a. “Cascading failures of overload behaviors on interdependent networks.” Phys. A 574 (Jul): 125989. https://doi.org/10.1016/j.physa.2021.125989.
Wang, Y., and G. Xiao. 2011. “Effects of interconnections on epidemics in network of networks.” In Proc., 7th Int. Conf. on Wireless Communications, Networking and Mobile Computing, 1–4. New York: IEEE.
Wang, Z., C. F. Li, X. Jin, H. Ding, G. H. Cui, and L. P. Yu. 2021b. “Evolutionary dynamics of the interdependent security games on complex network.” Appl. Math. Comput. 399 (Jun): 126051. https://doi.org/10.1016/j.amc.2021.126051.
Watts, D. J., and S. H. Strogatz. 1998. “Collective dynamics of ‘small-world’ networks.” Nature 393 (6684): 440–442. https://doi.org/10.1038/30918.
Wu, B. C., A. P. Tang, and J. Wu. 2016. “Modeling cascading failures in interdependent infrastructures under terrorist attacks.” Reliab. Eng. Syst. Saf. 147 (May): 1–8. https://doi.org/10.1016/j.ress.2015.10.019.
Wu, D., H. Xiao, and R. Peng. 2018. “Object defense with preventive strike and false targets.” Reliab. Eng. Syst. Saf. 169 (Feb): 76–80. https://doi.org/10.1016/j.ress.2017.08.006.
Wu, F. Z., J. Yang, H. Jiang, X. P. Zhan, S. Y. Liao, J. Xu, H. Fan, and J. F. Liang. 2022. “Cascading failure in coupled networks of transportation and power grid.” Int. J. Electr. Power 140 (Sep): 108058. https://doi.org/10.1016/j.ijepes.2022.108058.
Xiao, F., J. Li, and B. Wei. 2022. “Cascading failure analysis and critical node identification in complex networks.” Phys. A 596 (Jun): 127117. https://doi.org/10.1016/j.physa.2022.127117.
Yao, J., W. Yi, H. Wang, L. Zhen, and Y. J. Liu. 2022. “Stackelberg game model for construction waste disposal network design.” Autom. Constr. 144 (Dec): 104573. https://doi.org/10.1016/j.autcon.2022.104573.
Zeng, C. Y., B. A. Ren, M. L. Li, H. F. Liu, and J. Chen. 2019. “Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective.” Chaos 29 (8): 083129. https://doi.org/10.1063/1.5100849.
Zhang, C., J. E. Ramirez-Marquez, and J. H. Wang. 2015. “Critical infrastructure protection using secrecy—A discrete simultaneous game.” Eur. J. Oper. Res. 242 (1): 212–221. https://doi.org/10.1016/j.ejor.2014.10.001.
Zhang, X. X., S. Ding, B. F. Ge, B. Y. Xia, and W. Pedrycz. 2021. “Resource allocation among multiple targets for a defender-attacker game with false targets consideration.” Reliab. Eng. Syst. Saf. 211 (Jul): 107617. https://doi.org/10.1016/j.ress.2021.107617.
Zhang, Y. R., A. Arenas, and O. Yagan. 2018. “Cascading failures in interdependent systems under a flow redistribution model.” Phys. Rev. E 97 (2): 022307. https://doi.org/10.1103/PhysRevE.97.022307.
Zhao, Y. Y., J. Zhou, Y. Zou, S. G. Guan, and Y. L. Gao. 2022. “Characteristics of edge-based interdependent networks.” Chaos Soliton Fractals 156 (Mar): 111819. https://doi.org/10.1016/j.chaos.2022.111819.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 29Issue 3September 2023

History

Received: Oct 7, 2022
Accepted: Apr 13, 2023
Published online: Jun 24, 2023
Published in print: Sep 1, 2023
Discussion open until: Nov 24, 2023

Permissions

Request permissions for this article.

ASCE Technical Topics:

Authors

Affiliations

Graduate Student, Dept. of Electrical Engineering and Automation, Jiangsu Normal Univ., Xuzhou 221116, China. Email: [email protected]
Shuliang Wang [email protected]
Professor, Dept. of Electrical Engineering and Automation, Jiangsu Normal Univ., Xuzhou 221116, China (corresponding author). Email: [email protected]
Jianhua Zhang [email protected]
Associate Professor, Dept. of Electrical Engineering and Automation, Jiangsu Normal Univ., Xuzhou 221116, China. Email: [email protected]
Graduate Student, Dept. of Electrical Engineering and Automation, Jiangsu Normal Univ., Xuzhou 221116, China. Email: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share