Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue

In the classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the objective of maximizing the damage caused. In this paper, we consider the network defending problem against contagious attacks, e.g., the attack...

Full description

Saved in:
Bibliographic Details
Published inThe Journal of artificial intelligence research Vol. 77; pp. 487 - 515
Main Authors Bai, Rufan, Lin, Haoxing, Yang, Xinyu, Wu, Xiaowei, Li, Minming, Jia, Weijia
Format Journal Article
LanguageEnglish
Published 01.01.2023
Online AccessGet full text
ISSN1076-9757
1943-5037
1076-9757
DOI10.1613/jair.1.14563

Cover

Abstract In the classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the objective of maximizing the damage caused. In this paper, we consider the network defending problem against contagious attacks, e.g., the attack at a node u spreads to the neighbors of u and can cause damage at multiple nodes. Existing works that study shared resources assume that the resource allocated to a node can be shared or duplicated between neighboring nodes. However, in the real world, sharing resource naturally leads to a decrease in defending power of the source node, especially when defending against contagious attacks. Therefore, we study the model in which resources allocated to a node can only be transferred to its neighboring nodes, which we refer to as a reallocation process. We show that the problem of computing optimal defending strategy is NP-hard even for some very special cases. For positive results, we give a mixed integer linear program formulation for the problem and a bi-criteria approximation algorithm. Our experimental results demonstrate that the allocation and reallocation strategies our algorithm computes perform well in terms of minimizing the damage due to contagious attacks.
AbstractList In the classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the objective of maximizing the damage caused. In this paper, we consider the network defending problem against contagious attacks, e.g., the attack at a node u spreads to the neighbors of u and can cause damage at multiple nodes. Existing works that study shared resources assume that the resource allocated to a node can be shared or duplicated between neighboring nodes. However, in the real world, sharing resource naturally leads to a decrease in defending power of the source node, especially when defending against contagious attacks. Therefore, we study the model in which resources allocated to a node can only be transferred to its neighboring nodes, which we refer to as a reallocation process. We show that the problem of computing optimal defending strategy is NP-hard even for some very special cases. For positive results, we give a mixed integer linear program formulation for the problem and a bi-criteria approximation algorithm. Our experimental results demonstrate that the allocation and reallocation strategies our algorithm computes perform well in terms of minimizing the damage due to contagious attacks.
Author Yang, Xinyu
Bai, Rufan
Wu, Xiaowei
Li, Minming
Lin, Haoxing
Jia, Weijia
Author_xml – sequence: 1
  givenname: Rufan
  surname: Bai
  fullname: Bai, Rufan
– sequence: 2
  givenname: Haoxing
  surname: Lin
  fullname: Lin, Haoxing
– sequence: 3
  givenname: Xinyu
  surname: Yang
  fullname: Yang, Xinyu
– sequence: 4
  givenname: Xiaowei
  surname: Wu
  fullname: Wu, Xiaowei
– sequence: 5
  givenname: Minming
  surname: Li
  fullname: Li, Minming
– sequence: 6
  givenname: Weijia
  surname: Jia
  fullname: Jia, Weijia
BookMark eNqFkFFLwzAUhYMouE3f_AH5AXYmbdqsvo2hUxgKTp98KLfpzZata0aSMvbv7TYfRASf7uHw3cs9p0_OG9sgITecDXnGk7sVGDfkQy7SLDkjPc5kFuUylec_9CXpe79ijOciHvXI5zyAWmNdolvQOarWmbCnU9igpzsTlnRimwALY1tPx-HAemobCvQFw8669T19Q6hrqyCYzg-WhiV2nlctXpELDbXH6-85IB-PD--Tp2j2On2ejGeRimUSIixVqiuJo1yVOs0QdJ7FIkfAclQqqWVVghJVp2PJ4kRWuWC6ihPMRA4SRDIg0elu22xhv-veKbbObMDtC86KQzPFoZmCF8dmOv72xCtnvXeo_8PjX7gy4Rg3ODD130tfpgJ7Ww
CitedBy_id crossref_primary_10_1016_j_artint_2025_104297
ContentType Journal Article
DBID AAYXX
CITATION
ADTOC
UNPAY
DOI 10.1613/jair.1.14563
DatabaseName CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1076-9757
EndPage 515
ExternalDocumentID 10.1613/jair.1.14563
10_1613_jair_1_14563
GroupedDBID .DC
29J
2WC
5GY
5VS
AAKMM
AAKPC
AALFJ
AAYFX
AAYXX
ACGFO
ACM
ADBBV
ADBSK
ADMLS
AEFXT
AEJOY
AENEX
AFKRA
AFWXC
AKRVB
ALMA_UNASSIGNED_HOLDINGS
AMVHM
ARAPS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
E3Z
EBS
EJD
F5P
FRJ
FRP
GROUPED_DOAJ
GUFHI
HCIFZ
K7-
KQ8
LHSKQ
LPJ
OK1
OVT
P2P
PHGZM
PHGZT
PIMPY
PQGLB
PUEGO
RNS
TR2
XSB
ADTOC
AFFNX
C1A
UNPAY
ID FETCH-LOGICAL-c273t-ebc5fd7e89cbf56eaf96249eaeb8bc7f7dbac4d8bc270237d940fd23e649a7a43
IEDL.DBID UNPAY
ISSN 1076-9757
1943-5037
IngestDate Mon Sep 15 10:09:01 EDT 2025
Wed Oct 01 04:00:55 EDT 2025
Thu Apr 24 23:04:06 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c273t-ebc5fd7e89cbf56eaf96249eaeb8bc7f7dbac4d8bc270237d940fd23e649a7a43
OpenAccessLink https://proxy.k.utb.cz/login?url=https://jair.org/index.php/jair/article/download/14563/26939
PageCount 29
ParticipantIDs unpaywall_primary_10_1613_jair_1_14563
crossref_primary_10_1613_jair_1_14563
crossref_citationtrail_10_1613_jair_1_14563
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-01-01
PublicationDateYYYYMMDD 2023-01-01
PublicationDate_xml – month: 01
  year: 2023
  text: 2023-01-01
  day: 01
PublicationDecade 2020
PublicationTitle The Journal of artificial intelligence research
PublicationYear 2023
SSID ssj0019428
Score 2.394685
Snippet In the classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the...
SourceID unpaywall
crossref
SourceType Open Access Repository
Enrichment Source
Index Database
StartPage 487
Title Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue
URI https://jair.org/index.php/jair/article/download/14563/26939
UnpaywallVersion publishedVersion
Volume 77
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1076-9757
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0019428
  issn: 1076-9757
  databaseCode: KQ8
  dateStart: 19930101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: Openly Available Collection - DOAJ
  customDbUrl:
  eissn: 1076-9757
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0019428
  issn: 1076-9757
  databaseCode: DOA
  dateStart: 19930101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1076-9757
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0019428
  issn: 1076-9757
  databaseCode: ADMLS
  dateStart: 20130501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Mathematics Source
  customDbUrl:
  eissn: 1076-9757
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0019428
  issn: 1076-9757
  databaseCode: AMVHM
  dateStart: 20130501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source
  providerName: EBSCOhost
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1076-9757
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0019428
  issn: 1076-9757
  databaseCode: BENPR
  dateStart: 19930101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dSxtBEB80eagvaq1i_Aj7UH0pl-Sye_tRfIlFKwWD2AYsIsfs7a6o4SJ6Qexf7-7dRapQkb4dy4_7mLllPnbmNwCf477GHmMucomzEZMoI8Re4kMVzVApy6UOzcnHQ340Yj_OkrM52Jv1wlzj1V15gF-SBQaGiHKpW8uxawKF_ARNN_aWn3b7XFE1D02eeE-8Ac3R8GTwuyoz5JESJdGnD9NplPSoqOvevQGrHhN3ypu8sEgfpvktPj7gePyXmTlcgovZC1bVJTedaaE72Z9X3I3_-wXLsFj7n2RQwT7CnM1XYGk224HUW_0TnHsv1G_wkgGL_KyH3JHvoaaWhNwtCbRWeBkqaMmgCNh7MskJkmFVV_6VnNpwpl9lBEkxId7T9Gv32dSuwujw4Ne3o6gexBBl3rspIquzxBlhpcq0S7hFp7gP2yxa7VUpnDAaM2b8dehuo8Io1nOmTy1nCgUyugaNfJLbdSCSSiZtHzV1lGUcpTZKUGskxjpGJlrwZaaMNKtZysOwjHEaohWvujQIM43TUnot2HlG31bsHP_A7T7r9U3gxnuBm7AQBs9XyZgtaBR3U7vt3ZNCt6G5fzA8OW2X4X27_iefAFlM6go
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3daxNBEB_S5KF9Mda2NH6xD9WXcknudm8_xJcgpkVoEDUQkXLM3u6KGi4huSD617t7dwlWaCm-HcuP-5i5ZT525jcAZ3GicciYi1zqbMQkyghxmPpQRTNUynKpQ3Py1YRfTtm7WTprwettL8x3_LaqDvArssDAEFEtDRo5DkygkF-gGcTe8tNBwhVVe9DhqffE29CZTt6PPtdlhjxSoiL69GE6jdIhFU3duzdg9WPifnWTGxZpf1Ms8ddPnM__MjPjLlxvX7CuLvnR35S6n__-h7vxf7_gITxo_E8yqmGH0LLFI-huZzuQZqsfwRfvhfoNXjFgkY_NkDtyEWpqScjdkkBrhV9DBS0ZlQG7JouCIJnUdeWvyAcbzvTrjCApF8R7mn5tnW_sMUzHbz-9uYyaQQxR7r2bMrI6T50RVqpcu5RbdIr7sM2i1V6VwgmjMWfGX4fuNiqMYkNnEmo5UyiQ0RNoF4vCngKRVDJpE9TUUZZzlNooQa2RGOsYmejB-VYZWd6wlIdhGfMsRCtedVkQZhZnlfR68GKHXtbsHLfgXu70eifw8X2BT-AgDJ6vkzFPoV2uNvaZd09K_bz5C_8Aoajnew
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Stackelberg+Security+Games+with+Contagious+Attacks+on+a+Network%3A+Reallocation+to+the+Rescue&rft.jtitle=The+Journal+of+artificial+intelligence+research&rft.au=Bai%2C+Rufan&rft.au=Lin%2C+Haoxing&rft.au=Yang%2C+Xinyu&rft.au=Wu%2C+Xiaowei&rft.date=2023-01-01&rft.issn=1076-9757&rft.eissn=1076-9757&rft.volume=77&rft.spage=487&rft.epage=515&rft_id=info:doi/10.1613%2Fjair.1.14563&rft.externalDBID=n%2Fa&rft.externalDocID=10_1613_jair_1_14563
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1076-9757&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1076-9757&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1076-9757&client=summon