2017
DOI: 10.3390/g8010013
|View full text |Cite
|
Sign up to set email alerts
|

Interdependent Defense Games with Applications to Internet Security at the Level of Autonomous Systems

Abstract: Abstract:We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence of risk and security in multi-agent systems under deliberate external attacks. Our model builds upon interdependent security (IDS) games, a model by Heal and Kunreuther that considers the source of the risk to be the result of a fixed randomized-strategy. We adapt IDS games to model the attacker's deliberate behavior. We define the attacker's pure-strategy space and utility f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(23 citation statements)
references
References 48 publications
0
21
0
Order By: Relevance
“…The first line is interdependent security game [Kunreuther and Heal, 2003;Kearns and Ortiz, 2004] where users are interdependent and can experience direct risk from internal contamination and indirect risk transferred from their neighbors and is widely applied to security settings such as airline baggage security, fire safety and computer virus. An extension of these works is interdependent defense game [Chan et al, 2012;Chan et al, 2017] where a strategic attacker is added into the game. However, they focus on the computation of Nash equilibria between users and the attacker and there is no defender who tries to optimize the global security level.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The first line is interdependent security game [Kunreuther and Heal, 2003;Kearns and Ortiz, 2004] where users are interdependent and can experience direct risk from internal contamination and indirect risk transferred from their neighbors and is widely applied to security settings such as airline baggage security, fire safety and computer virus. An extension of these works is interdependent defense game [Chan et al, 2012;Chan et al, 2017] where a strategic attacker is added into the game. However, they focus on the computation of Nash equilibria between users and the attacker and there is no defender who tries to optimize the global security level.…”
Section: Related Workmentioning
confidence: 99%
“…Both users and the attacker are termed as followers. The interactions between followers exactly follow the assumptions and models in interdependent security (defense) game, which is widely investigated in [Kunreuther and Heal, 2003;Kearns and Ortiz, 2004;Chan et al, 2012;Chan et al, 2017].…”
Section: Cybersecurity Investment Gamementioning
confidence: 99%
See 3 more Smart Citations