Attack–Defense Game in Interdependent Networks: A Functional Perspective
Publication: Journal of Infrastructure Systems
Volume 29, Issue 3
Abstract
The normal operation of critical infrastructure is related to the stability of society and a country’s development. Based on game theory and network science, this paper analyzes the attack–defense issues of critical infrastructure, proposing a network attack–defense game model based on virtual flow. Five coupling methods are established according to the complex interdependent characteristics and important evaluation indicators (the degree value and betweenness value) in the network. Considering the network’s information transmission, redistribution, and cascading failures, a cascading failure model based on betweenness virtual flow is established. A two-player game is adopted, in which the attacker and the defender act simultaneously. The scale-free, small-world, and random networks are related using these five coupling methods. Simulation and theoretical analyses are carried out on the interdependent network game scenario under different coupling modes. The game equilibrium under different network coupling conditions and coupling methods is simulated, and the preferences of the game participants are determined. In addition, a sensitivity analysis of the game parameters is conducted, facilitating the identification of certain effective strategies that can support decision-makers.
Practical Applications
Critical infrastructure networks play an important role in maintaining social stability. Based on game theory and network science, this paper analyzed the attack–defense problems of critical infrastructures and proposed an attacker–defender game model based on the betweenness virtual flow. The attack–defense game in the interdependent network is analyzed in terms of coupling modes, network types, and tolerance coefficient. A sensitivity analysis of the game parameters is also conducted. The results show that the interdependent networks under random coupling and reverse coupling strategies are more vulnerable to attack. In addition, the cost-sensitive parameter is a key factor affecting the game equilibrium. Even if the two subnetworks in the interdependent network are the same, the payoffs and the robustness will be different when the order of removing nodes is different. This paper provides decision support for actual infrastructure protection.
Get full access to this article
View all available purchase options and get full access to this article.
Data Availability Statement
All data, models, and code generated or used during the study appear in the published article.
Acknowledgments
This work is jointly supported by National Natural Science Foundations of China (61801197 and 61503166).
References
Ali, G. G., I. H. El-adaway, C. Sims, J. S. Holladay, and C.-F. Chen. 2022. “Policies and incentives for promoting distributed solar generation: Impact on electric power infrastructure.” J. Infrastruct. Syst. 28 (4): 04022034. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000714.
Barabasi, A. L., and R. Albert. 1999. “Emergence of scaling in random networks.” Science 286 (5439): 509–512. https://doi.org/10.1126/science.286.5439.509.
Barabasi, A. L., and E. Bonabeau. 2003. “Scale-free networks.” Sci. Am. 288 (5): 60–69. https://doi.org/10.1038/scientificamerican0503-60.
Beriro, D., et al. 2022. “A decision support system to assess the feasibility of onshore renewable energy infrastructure.” Renewable Sustainable Energy Rev. 168 (Oct): 112771. https://doi.org/10.1016/j.rser.2022.112771.
Burkhalter, M., and B. T. Adey. 2022. “Digitalizing the determination of railway infrastructure intervention programs: A network optimization model.” J. Infrastruct. Syst. 28 (2): 04022012. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000681.
Case, D. U. 2016. “Analysis of the cyber attack on the Ukrainian power grid.” Electr. Inf. Sharing Anal. Center 388 (Mar): 1–29.
Chen, J., C. Y. Wu, M. Li, and M. B. Hu. 2019. “Hybrid traffic dynamics on coupled networks.” Phys. A 516 (Feb): 98–104. https://doi.org/10.1016/j.physa.2018.10.016.
Chen, L. 2022. “The coevolving behavior of games and strategies under different network structures.” Int. J. Mod. Phys. C 34 (1): 1–14. https://doi.org/10.1142/S0129183123500067.
Crucitti, P., V. Latora, and M. Marchiori. 2004. “Model for cascading failures in complex networks.” Phys. Rev. E 69 (4): 045104. https://doi.org/10.1103/PhysRevE.69.045104.
Deng, Y., J. Wu, and Y. J. Tan. 2016. “Optimal attack strategy of complex networks based on Tabu search.” Phys. A 442 (Feb): 74–81. https://doi.org/10.1016/j.physa.2015.08.043.
Dong, Z. C., M. Tian, and Y. J. Fang. 2018. “Impact of local coupling on the vulnerability of 2D spatially embedded interdependent networks.” Phys. Lett. A 382 (36): 2544–2550. https://doi.org/10.1016/j.physleta.2018.07.003.
Dui, H. Y., X. Y. Meng, H. Xiao, and J. J. Guo. 2020. “Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game.” Reliab. Eng. Syst. Saf. 199 (Jul): 106919. https://doi.org/10.1016/j.ress.2020.106919.
Fu, C. Q., Y. J. Gao, J. L. Zhong, Y. Sun, P. T. Zhang, and T. Wu. 2021. “Attack-defense game for critical infrastructure considering the cascade effect.” Reliab. Eng. Syst. Saf. 216 (Dec): 107958. https://doi.org/10.1016/j.ress.2021.107958.
Gjorgiev, B., and G. Sansavini. 2022. “Identifying and assessing power system vulnerabilities to transmission asset outages via cascading failure analysis.” Reliab. Eng. Syst. Saf. 217 (Jan): 108085. https://doi.org/10.1016/j.ress.2021.108085.
Goforth, E., W. El-Dakhakhni, and L. Wiebe. 2022. “Network analytics for infrastructure asset management systemic risk assessment.” J. Infrastruct. Syst. 28 (2): 04022006. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000667.
Guo, P. L., and C. D. Han. 2021. “Nash equilibrium and group strategy consensus of networked evolutionary game with coupled social groups.” Appl. Math. Comput. 409 (Nov): 126380. https://doi.org/10.1016/j.amc.2021.126380.
Hao, Y. C., L. M. Jia, and Y. H. Wang. 2020. “Edge attack strategies in interdependent scale-free networks.” Phys. A 540 (Feb): 122759. https://doi.org/10.1016/j.physa.2019.122759.
Hausken, K. 2017. “Defense and attack for interdependent systems.” Eur. J. Oper. Res. 256 (2): 582–591. https://doi.org/10.1016/j.ejor.2016.06.033.
Hausken, K., and G. Levitin. 2009. “Minmax defense strategy for complex multi-state systems.” Reliab. Eng. Syst. Saf. 94 (2): 577–587. https://doi.org/10.1016/j.ress.2008.06.005.
Huang, Y., J. Wu, K. T. Chi, and Z. Zheng. 2021. “Sequential attacker–defender game on complex networks considering the cascading failure process.” IEEE Trans. Comput. Social Syst. 9 (2): 518–529. https://doi.org/10.1109/TCSS.2021.3099718.
Kabir, K. A., K. Kuga, and J. Tanimoto. 2020. “The impact of information spreading on epidemic vaccination game dynamics in a heterogeneous complex network-a theoretical approach.” Chaos Solitons Fractals 132 (Mar): 109548. https://doi.org/10.1016/j.chaos.2019.109548.
Lemke, C. E., and J. T. Howson Jr. 1964. “Equilibrium points of bimatrix games.” J. Soc. Ind. Appl. Math. 12 (2): 413–423. https://doi.org/10.1137/0112033.
Li, Y. L., J. Lin, C. Zhang, H. X. Zhu, S. X. Zeng, and C. S. Sun. 2022. “Joint optimization of structure and protection of interdependent infrastructure networks.” Reliab. Eng. Syst. Saf. 218 (Feb): 108163. https://doi.org/10.1016/j.ress.2021.108163.
Li, Y. P., S. Qiao, Y. Deng, and J. Wu. 2019. “Stackelberg game in critical infrastructures from a network science perspective.” Phys. A 521 (Mar): 705–714. https://doi.org/10.1016/j.physa.2019.01.119.
Li, Y. P., S. Y. Tan, Y. Deng, and J. Wu. 2018. “Attacker-defender game from a network science perspective.” Chaos 28 (5): 051102. https://doi.org/10.1063/1.5029343.
Lin, C., H. Xiao, R. Peng, and Y. S. Xiang. 2021. “Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory.” Reliab. Eng. Syst. Saf. 210 (Jun): 107510. https://doi.org/10.1016/j.ress.2021.107510.
Liu, L., L. Zhang, S. Liao, J. Y. Liu, and Z. X. Wang. 2021. “A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense.” Inf. Sci. 577 (Aug): 245–264. https://doi.org/10.1016/j.ins.2021.06.078.
Mavronicolas, M., V. Papadopoulou, A. Philippou, and P. Spirakis. 2008. “A network game with attackers and a defender.” Algorithmica 51 (3): 315–341. https://doi.org/10.1007/s00453-007-9109-3.
Nash, J. F., Jr. 1950. “Equilibrium points in n-person games.” Proc. Natl. Acad. Sci. U.S.A. 36 (1): 48–49. https://doi.org/10.1073/pnas.36.1.48.
Ouyang, M. 2013. “Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability.” Chaos 23 (2): 023114. https://doi.org/10.1063/1.4807478.
Peng, R., D. Wu, M. Y. Sun, and S. M. Wu. 2021. “An attack-defense game on interdependent networks.” J. Oper. Res. Soc. 72 (10): 2331–2341. https://doi.org/10.1080/01605682.2020.1784048.
Porter, R., E. Nudelman, Y. J. G. Shoham, and E. Behavior. 2008. “Simple search methods for finding a Nash equilibrium.” Games Econ. Behav. 63 (2): 642–662. https://doi.org/10.1016/j.geb.2006.03.015.
Rinaldi, S. M., J. P. Peerenboom, and T. K. Kelly. 2001. “Identifying, understanding, and analyzing critical infrastructure interdependencies.” IEEE Control Syst. Mag. 21 (6): 11–25. https://doi.org/10.1109/37.969131.
Rocco, C. M., K. Barker, J. Moronta, and J. E. Ramirez-Marquez. 2018. “Multiobjective formulation for protection allocation in interdependent infrastructure networks using an attack-diffusion model.” J. Infrastruct. Syst. 24 (1): 04018002. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000415.
Shi, C. X., and G. H. Yang. 2019. “Nash equilibrium computation in two-network zero-sum games: An incremental algorithm.” Neurocomputing 359 (Mar): 114–121. https://doi.org/10.1016/j.neucom.2019.05.076.
Sun, C. B., C. Luo, and J. Q. Li. 2020. “Aspiration-based co-evolution of cooperation with resource allocation on interdependent networks.” Chaos Solitons Fractals 135 (Jun): 109769. https://doi.org/10.1016/j.chaos.2020.109769.
Tardos, É., and V. Vazirani. 2007. “Basic solution concepts and computational issues.” In Algorithmic game theory, edited by N. Nisan, T. Roughgarden, E. Tardos, and V. Vazirani, 3–28. Cambridge: Cambridge University Press.
Ugwu, I. A., B. Salarieh, A. M. Salman, L. Petnga, and M. Y. Williams. 2022. “Postdisaster recovery planning for interdependent infrastructure systems prioritizing the functionality of healthcare facilities.” J. Infrastruct. Syst. 28 (4): 04022038. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000719.
Wang, J., H. Y. Fang, and X. L. Qin. 2019. “Cascading failures on correlated interdependent networks with dependency groups.” Phys. A 530 (Sep): 121355. https://doi.org/10.1016/j.physa.2019.121355.
Wang, K., J. Liu, L. Tian, X. Tan, G. Peng, T. Qin, J. J. R. E. Wu, and S. Safety. 2022. “Analyzing vulnerability of optical fiber network considering recoverability.” Reliab. Eng. Syst. Saf. 221 (May): 108308. https://doi.org/10.1016/j.ress.2021.108308.
Wang, N., Z. Y. Jin, and J. Zhao. 2021a. “Cascading failures of overload behaviors on interdependent networks.” Phys. A 574 (Jul): 125989. https://doi.org/10.1016/j.physa.2021.125989.
Wang, Y., and G. Xiao. 2011. “Effects of interconnections on epidemics in network of networks.” In Proc., 7th Int. Conf. on Wireless Communications, Networking and Mobile Computing, 1–4. New York: IEEE.
Wang, Z., C. F. Li, X. Jin, H. Ding, G. H. Cui, and L. P. Yu. 2021b. “Evolutionary dynamics of the interdependent security games on complex network.” Appl. Math. Comput. 399 (Jun): 126051. https://doi.org/10.1016/j.amc.2021.126051.
Watts, D. J., and S. H. Strogatz. 1998. “Collective dynamics of ‘small-world’ networks.” Nature 393 (6684): 440–442. https://doi.org/10.1038/30918.
Wu, B. C., A. P. Tang, and J. Wu. 2016. “Modeling cascading failures in interdependent infrastructures under terrorist attacks.” Reliab. Eng. Syst. Saf. 147 (May): 1–8. https://doi.org/10.1016/j.ress.2015.10.019.
Wu, D., H. Xiao, and R. Peng. 2018. “Object defense with preventive strike and false targets.” Reliab. Eng. Syst. Saf. 169 (Feb): 76–80. https://doi.org/10.1016/j.ress.2017.08.006.
Wu, F. Z., J. Yang, H. Jiang, X. P. Zhan, S. Y. Liao, J. Xu, H. Fan, and J. F. Liang. 2022. “Cascading failure in coupled networks of transportation and power grid.” Int. J. Electr. Power 140 (Sep): 108058. https://doi.org/10.1016/j.ijepes.2022.108058.
Xiao, F., J. Li, and B. Wei. 2022. “Cascading failure analysis and critical node identification in complex networks.” Phys. A 596 (Jun): 127117. https://doi.org/10.1016/j.physa.2022.127117.
Yao, J., W. Yi, H. Wang, L. Zhen, and Y. J. Liu. 2022. “Stackelberg game model for construction waste disposal network design.” Autom. Constr. 144 (Dec): 104573. https://doi.org/10.1016/j.autcon.2022.104573.
Zeng, C. Y., B. A. Ren, M. L. Li, H. F. Liu, and J. Chen. 2019. “Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective.” Chaos 29 (8): 083129. https://doi.org/10.1063/1.5100849.
Zhang, C., J. E. Ramirez-Marquez, and J. H. Wang. 2015. “Critical infrastructure protection using secrecy—A discrete simultaneous game.” Eur. J. Oper. Res. 242 (1): 212–221. https://doi.org/10.1016/j.ejor.2014.10.001.
Zhang, X. X., S. Ding, B. F. Ge, B. Y. Xia, and W. Pedrycz. 2021. “Resource allocation among multiple targets for a defender-attacker game with false targets consideration.” Reliab. Eng. Syst. Saf. 211 (Jul): 107617. https://doi.org/10.1016/j.ress.2021.107617.
Zhang, Y. R., A. Arenas, and O. Yagan. 2018. “Cascading failures in interdependent systems under a flow redistribution model.” Phys. Rev. E 97 (2): 022307. https://doi.org/10.1103/PhysRevE.97.022307.
Zhao, Y. Y., J. Zhou, Y. Zou, S. G. Guan, and Y. L. Gao. 2022. “Characteristics of edge-based interdependent networks.” Chaos Soliton Fractals 156 (Mar): 111819. https://doi.org/10.1016/j.chaos.2022.111819.
Information & Authors
Information
Published In
Copyright
© 2023 American Society of Civil Engineers.
History
Received: Oct 7, 2022
Accepted: Apr 13, 2023
Published online: Jun 24, 2023
Published in print: Sep 1, 2023
Discussion open until: Nov 24, 2023
ASCE Technical Topics:
- Analysis (by type)
- Business management
- Coupling
- Decision making
- Electric power
- Energy engineering
- Engineering fundamentals
- Engineering mechanics
- Equilibrium
- Failure analysis
- Game theory
- Infrastructure
- Lifeline systems
- Network analysis
- Power transmission
- Practice and Profession
- Sensitivity analysis
- Statics (mechanics)
- Structural engineering
- Structural members
- Structural systems
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.