Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue
In the classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the objective of maximizing the damage caused. In this paper, we consider the network defending problem against contagious attacks, e.g., the attack...
Saved in:
| Published in | The Journal of artificial intelligence research Vol. 77; pp. 487 - 515 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
01.01.2023
|
| Online Access | Get full text |
| ISSN | 1076-9757 1943-5037 1076-9757 |
| DOI | 10.1613/jair.1.14563 |
Cover
| Abstract | In the classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the objective of maximizing the damage caused. In this paper, we consider the network defending problem against contagious attacks, e.g., the attack at a node u spreads to the neighbors of u and can cause damage at multiple nodes. Existing works that study shared resources assume that the resource allocated to a node can be shared or duplicated between neighboring nodes. However, in the real world, sharing resource naturally leads to a decrease in defending power of the source node, especially when defending against contagious attacks. Therefore, we study the model in which resources allocated to a node can only be transferred to its neighboring nodes, which we refer to as a reallocation process. We show that the problem of computing optimal defending strategy is NP-hard even for some very special cases. For positive results, we give a mixed integer linear program formulation for the problem and a bi-criteria approximation algorithm. Our experimental results demonstrate that the allocation and reallocation strategies our algorithm computes perform well in terms of minimizing the damage due to contagious attacks. |
|---|---|
| AbstractList | In the classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the objective of maximizing the damage caused. In this paper, we consider the network defending problem against contagious attacks, e.g., the attack at a node u spreads to the neighbors of u and can cause damage at multiple nodes. Existing works that study shared resources assume that the resource allocated to a node can be shared or duplicated between neighboring nodes. However, in the real world, sharing resource naturally leads to a decrease in defending power of the source node, especially when defending against contagious attacks. Therefore, we study the model in which resources allocated to a node can only be transferred to its neighboring nodes, which we refer to as a reallocation process. We show that the problem of computing optimal defending strategy is NP-hard even for some very special cases. For positive results, we give a mixed integer linear program formulation for the problem and a bi-criteria approximation algorithm. Our experimental results demonstrate that the allocation and reallocation strategies our algorithm computes perform well in terms of minimizing the damage due to contagious attacks. |
| Author | Yang, Xinyu Bai, Rufan Wu, Xiaowei Li, Minming Lin, Haoxing Jia, Weijia |
| Author_xml | – sequence: 1 givenname: Rufan surname: Bai fullname: Bai, Rufan – sequence: 2 givenname: Haoxing surname: Lin fullname: Lin, Haoxing – sequence: 3 givenname: Xinyu surname: Yang fullname: Yang, Xinyu – sequence: 4 givenname: Xiaowei surname: Wu fullname: Wu, Xiaowei – sequence: 5 givenname: Minming surname: Li fullname: Li, Minming – sequence: 6 givenname: Weijia surname: Jia fullname: Jia, Weijia |
| BookMark | eNqFkFFLwzAUhYMouE3f_AH5AXYmbdqsvo2hUxgKTp98KLfpzZata0aSMvbv7TYfRASf7uHw3cs9p0_OG9sgITecDXnGk7sVGDfkQy7SLDkjPc5kFuUylec_9CXpe79ijOciHvXI5zyAWmNdolvQOarWmbCnU9igpzsTlnRimwALY1tPx-HAemobCvQFw8669T19Q6hrqyCYzg-WhiV2nlctXpELDbXH6-85IB-PD--Tp2j2On2ejGeRimUSIixVqiuJo1yVOs0QdJ7FIkfAclQqqWVVghJVp2PJ4kRWuWC6ihPMRA4SRDIg0elu22xhv-veKbbObMDtC86KQzPFoZmCF8dmOv72xCtnvXeo_8PjX7gy4Rg3ODD130tfpgJ7Ww |
| CitedBy_id | crossref_primary_10_1016_j_artint_2025_104297 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY |
| DOI | 10.1613/jair.1.14563 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1076-9757 |
| EndPage | 515 |
| ExternalDocumentID | 10.1613/jair.1.14563 10_1613_jair_1_14563 |
| GroupedDBID | .DC 29J 2WC 5GY 5VS AAKMM AAKPC AALFJ AAYFX AAYXX ACGFO ACM ADBBV ADBSK ADMLS AEFXT AEJOY AENEX AFKRA AFWXC AKRVB ALMA_UNASSIGNED_HOLDINGS AMVHM ARAPS BCNDV BENPR BGLVJ CCPQU CITATION E3Z EBS EJD F5P FRJ FRP GROUPED_DOAJ GUFHI HCIFZ K7- KQ8 LHSKQ LPJ OK1 OVT P2P PHGZM PHGZT PIMPY PQGLB PUEGO RNS TR2 XSB ADTOC AFFNX C1A UNPAY |
| ID | FETCH-LOGICAL-c273t-ebc5fd7e89cbf56eaf96249eaeb8bc7f7dbac4d8bc270237d940fd23e649a7a43 |
| IEDL.DBID | UNPAY |
| ISSN | 1076-9757 1943-5037 |
| IngestDate | Mon Sep 15 10:09:01 EDT 2025 Wed Oct 01 04:00:55 EDT 2025 Thu Apr 24 23:04:06 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c273t-ebc5fd7e89cbf56eaf96249eaeb8bc7f7dbac4d8bc270237d940fd23e649a7a43 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://jair.org/index.php/jair/article/download/14563/26939 |
| PageCount | 29 |
| ParticipantIDs | unpaywall_primary_10_1613_jair_1_14563 crossref_primary_10_1613_jair_1_14563 crossref_citationtrail_10_1613_jair_1_14563 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2023-01-01 |
| PublicationDateYYYYMMDD | 2023-01-01 |
| PublicationDate_xml | – month: 01 year: 2023 text: 2023-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | The Journal of artificial intelligence research |
| PublicationYear | 2023 |
| SSID | ssj0019428 |
| Score | 2.394685 |
| Snippet | In the classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the... |
| SourceID | unpaywall crossref |
| SourceType | Open Access Repository Enrichment Source Index Database |
| StartPage | 487 |
| Title | Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue |
| URI | https://jair.org/index.php/jair/article/download/14563/26939 |
| UnpaywallVersion | publishedVersion |
| Volume | 77 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1076-9757 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0019428 issn: 1076-9757 databaseCode: KQ8 dateStart: 19930101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: Openly Available Collection - DOAJ customDbUrl: eissn: 1076-9757 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0019428 issn: 1076-9757 databaseCode: DOA dateStart: 19930101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1076-9757 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0019428 issn: 1076-9757 databaseCode: ADMLS dateStart: 20130501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVEBS databaseName: Mathematics Source customDbUrl: eissn: 1076-9757 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0019428 issn: 1076-9757 databaseCode: AMVHM dateStart: 20130501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1076-9757 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0019428 issn: 1076-9757 databaseCode: BENPR dateStart: 19930101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dSxtBEB80eagvaq1i_Aj7UH0pl-Sye_tRfIlFKwWD2AYsIsfs7a6o4SJ6Qexf7-7dRapQkb4dy4_7mLllPnbmNwCf477GHmMucomzEZMoI8Re4kMVzVApy6UOzcnHQ340Yj_OkrM52Jv1wlzj1V15gF-SBQaGiHKpW8uxawKF_ARNN_aWn3b7XFE1D02eeE-8Ac3R8GTwuyoz5JESJdGnD9NplPSoqOvevQGrHhN3ypu8sEgfpvktPj7gePyXmTlcgovZC1bVJTedaaE72Z9X3I3_-wXLsFj7n2RQwT7CnM1XYGk224HUW_0TnHsv1G_wkgGL_KyH3JHvoaaWhNwtCbRWeBkqaMmgCNh7MskJkmFVV_6VnNpwpl9lBEkxId7T9Gv32dSuwujw4Ne3o6gexBBl3rspIquzxBlhpcq0S7hFp7gP2yxa7VUpnDAaM2b8dehuo8Io1nOmTy1nCgUyugaNfJLbdSCSSiZtHzV1lGUcpTZKUGskxjpGJlrwZaaMNKtZysOwjHEaohWvujQIM43TUnot2HlG31bsHP_A7T7r9U3gxnuBm7AQBs9XyZgtaBR3U7vt3ZNCt6G5fzA8OW2X4X27_iefAFlM6go |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3daxNBEB_S5KF9Mda2NH6xD9WXcknudm8_xJcgpkVoEDUQkXLM3u6KGi4huSD617t7dwlWaCm-HcuP-5i5ZT525jcAZ3GicciYi1zqbMQkyghxmPpQRTNUynKpQ3Py1YRfTtm7WTprwettL8x3_LaqDvArssDAEFEtDRo5DkygkF-gGcTe8tNBwhVVe9DhqffE29CZTt6PPtdlhjxSoiL69GE6jdIhFU3duzdg9WPifnWTGxZpf1Ms8ddPnM__MjPjLlxvX7CuLvnR35S6n__-h7vxf7_gITxo_E8yqmGH0LLFI-huZzuQZqsfwRfvhfoNXjFgkY_NkDtyEWpqScjdkkBrhV9DBS0ZlQG7JouCIJnUdeWvyAcbzvTrjCApF8R7mn5tnW_sMUzHbz-9uYyaQQxR7r2bMrI6T50RVqpcu5RbdIr7sM2i1V6VwgmjMWfGX4fuNiqMYkNnEmo5UyiQ0RNoF4vCngKRVDJpE9TUUZZzlNooQa2RGOsYmejB-VYZWd6wlIdhGfMsRCtedVkQZhZnlfR68GKHXtbsHLfgXu70eifw8X2BT-AgDJ6vkzFPoV2uNvaZd09K_bz5C_8Aoajnew |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Stackelberg+Security+Games+with+Contagious+Attacks+on+a+Network%3A+Reallocation+to+the+Rescue&rft.jtitle=The+Journal+of+artificial+intelligence+research&rft.au=Bai%2C+Rufan&rft.au=Lin%2C+Haoxing&rft.au=Yang%2C+Xinyu&rft.au=Wu%2C+Xiaowei&rft.date=2023-01-01&rft.issn=1076-9757&rft.eissn=1076-9757&rft.volume=77&rft.spage=487&rft.epage=515&rft_id=info:doi/10.1613%2Fjair.1.14563&rft.externalDBID=n%2Fa&rft.externalDocID=10_1613_jair_1_14563 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1076-9757&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1076-9757&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1076-9757&client=summon |