A Three-level Game Theory Model for Modeling the Defender and Attackers Considering the Deception Strategy Between Them

Document Type : Original Article

Authors

1 PhD, Tarbiat Modares University, Tehran, Iran

2 Assistant Professor, Command University and Aja Headquarters, Tehran, Iran

Abstract

Security is the most basic need of any society that affects different parts of it. Also, due to increasing security threats and limited resources to deal with them, it is necessary for security resources to be deployed in an optimal state. Furthermore, because of resources limitation, the use of deceptive resources is used by the attacker and the defender. Game theory is a common way to understand the concepts, strategies and consequently the allocation of limited resources of the attacker and defender. In this paper, a three-level Stackelberg security game between a defender and two attackers is modeled in a situation where the defender and the attacker try to deceive each other. The advantage of this research compared to the previous papers is to model the attacker and defender deception as well as considering the financial limitations and limitations related to attack and defense in a three-level model. The utility of the defender and the attackers is modeled along with their limitations. The model is converted into a single-level model using the Karush-Kuhn-Tucker method and solved, describing its application in defense decision-making. The obtained results show that by using the proposed model, limited security resources are optimally allocated, which leads to the improvement of security conditions and dealing optimally with security threats.

Keywords

Main Subjects


Smiley face

[1]     Garrec, T. “Continuous Patrolling and Hiding Games”; Eur. J. Oper. Res. 2019, 277, 42-51. DOI:10.1016/j.ejor. 2019.02.026
[2]     Kar, D.; Nguyen, T.H.; Fang, F.; Brown, M.; Sinha, A.; Tambe, M.; Jiang, A.X. “Trends and Applications in Stackelberg Security Games”; Handbook of dynamic game theory, 2017. 1-47.
[3]     Yuan, Y.; Sun, F.; Liu, H. “Resilient Control of Cyber-physical Systems against Intelligent Attacker: a Hierarchal Stackelberg Game Approach”; Int. J. Syst. Sci. 2016, 47, 2067-2077. DOI:10.1080/00207721.2014.973467
[4]     Hunt, K.; Agarwal, P.; Zhuang, J. “Technology Adoption for Airport Security: Modeling Public Disclosure and Secrecy in an Attacker-Defender Game”; Reliab. Eng. Syst. Safe 2021, 107355. DOI:10.1016/j.ress.2020.107355
[5]     Sinha, A.; Fang, F.; An, B.; Kiekintveld, C; Tambe, M. “Stackelberg Security Games: Looking Beyond a Decade of Success”; Int. Joint Conf. Artificial Intelligence 2018, 1-13. DOI:10.24963/ijcai.2018/775
[6]     An, B.; Tambe, M.; and Sinha, A., “Stackelberg Security Games (ssg) Basics and Application Overview”; Improving Homeland Security Decisions. 2017. 2. 485.
[7]     Korzhyk, D.; Conitzer, V.; Parr, R. “Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games”; Twenty-Fourth AAAI Conf. Artificial Intelligence. 2010. 805-810.
[8]     Letchford, J.; Conitzer, V. “Solving security games on graphs via marginal probabilities”; Twenty-Seventh AAAI Conf. Artificial Intelligence. 2013. 591-597. DOI:10.1609/ aaai.v27i1.8688 
[9]     Xu, H.; “The Mysteries of Security Games: Equilibrium Computation Becomes Combinatorial Algorithm Design”; Conf. Economics and Computation. 2016. 497-514.
[10]  Han, Y.; Alpcan, T.; Chan, J.; Leckie, C. “Security Games for Virtual Machine Allocation in Cloud Computing”; 4th Int. Conf. Decision and Game Theory for Security. 2013. 99-118.
[11]  Bigdeli, H.; Hassanpour H.; Tayyebi, J. “The Optimistic And Pessimistic Solutions of Single and Multiobjective Matrix Games with Fuzzy Payoffs and Analysis of Some of Military Problems”; J. Adv. Defense Sci. & Technol. 2016, 8, 133-45 (In Persian).DOR: 20.1001.1.26762935.1396.8.2.5.5
[12]  Bigdeli, H.; Hassanpour, H; Tayyebi, J. “Constrained Bimatrix Games with Fuzzy Goals and Its Application in Nuclear Negotiations”; J. Numerical Anal. Optim. 2018, 8, 81-110. DOI:10.1142/S0218488523500459
[13]  Toudashki, M.; Zahraee, S.; “Solving Multiobjective Security Games with Interval Payoffs”; J. Wargaming 2020, 2, 71-90. DOI:10.22034/ijwg.2020.106194
[14]  Bigdeli, H.; Hassanpour, H. “Modeling and Solving Multiobjective Security Game Problem Using Multiobjective Bilevel Problem and Its Application in Metro Security System”; J. Elect. Cyber Def. 2017, 31-38 (In Persian). DOI:10.22034/ijwg.2020.106194
[15]  Kheirkhah, A. S.; Navidi, H. R.; Bidgoli, M. M. “Modeling and Solving the Hazmat Routing Problem under Network Interdiction with Information Asymmetry”; J. Trans. Eng. 2017, 9, 17-36. https://dor.net/20.1001.1.20086598.1396. 9.1.1.7
[16]  Gan, J. Elkind, E. Wooldridge, M. “Stackelberg Security Games With Multiple Uncoordinated Defenders”; 17th Int. Conf. Autonomous Agents and Multiagent Systems. 2018. 703-711. https://dlnext.acm.org/doi/abs/10.5555/3237383. 3237487
[17] Nguyen, T.; Xu, H. “Imitative Attacker Deception in Stackelberg Security Games”; IJCAI. 2019, 528-534. DOI:10.24963/ijcai.2019/75 
[18] Esmaieli, S.; Hassanpour, H; Bigdeli, H. “Lexicographic Programming for Solving Security Game with Fuzzy Payoffs and Computing Optimal Deception Strategy”; Defensive Future Study Researches J. 2020, 5, 89-108. DOI: 10.22034/dfsr.2020.39783
[19] Bigdeli, H.; Tayyebi, J. “A Defender-Attacker Game with Intuitionistic Fuzzy Payoffs”; 14th Int. Conf. Iranian Operations Research Society 1400, 60-74. 
[20] Nguyen, T.; Xu, H. “When Can the Defender Effectively Deceive Attackers in Security Games?”; Thirty-Sixth AAAI. Conf. Artificial Intelligence 2022. 9405-9412.
Volume 14, Issue 2 - Serial Number 52
summer 2024
September 2024
Pages 89-99
  • Receive Date: 20 May 2023
  • Revise Date: 13 July 2023
  • Accept Date: 29 July 2023
  • Publish Date: 08 September 2023