Topology Design Games and Dynamics in Adversarial Environments

被引:5
作者
Ciftcioglu, Ertugrul Necdet [1 ,2 ]
Pal, Siddharth [3 ]
Chan, Kevin S. [5 ]
Cansever, Derya H. [6 ]
Swami, Ananthram
Singh, Ambuj K. [5 ,7 ]
Basu, Prithwish [4 ]
机构
[1] US Army, Res Lab, Adelphi, MD 20783 USA
[2] IBM Res, Yorktown Hts, NY 10598 USA
[3] Raytheon BBN Technol, Cambridge, MA 02138 USA
[4] Raytheon BBN Technol, Network & Commun Technol Business Unit, Cambridge, MA 02138 USA
[5] US Army, Res Lab, Adelphi, MD 20783 USA
[6] US Army, Commun & Elect Res & Dev Ctr, Aberdeen Proving Ground, MD 21001 USA
[7] Univ Calif Santa Barbara, Comp Sci, Santa Barbara, CA 93106 USA
关键词
Network design; game theory; topology control; multi-stage games;
D O I
10.1109/JSAC.2017.2659582
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We study the problem of network topology design within a set of policy-compliant topologies as a game between a designer and an adversary. At any time instant, the designer aims to operate the network in an optimal topology within the set of policy compliant topologies with respect to a desired network property. Simultaneously, the adversary counters the designer trying to force operation in a suboptimal topology. Specifically, if the designer and the attacker choose the same link in the current topology to defend/grow and attack, respectively, then the latter is thwarted. However, if the defender does not correctly guess where the attacker is going to attack, and, hence, acts elsewhere, the topology reverts to the best policy-compliant configuration after a successful attack. We show the existence of various mixed strategy equilibria in this game and systematically study its structural properties. We study the effect of parameters, such as probability of a successful attack, and characterize the steady state behavior of the underlying Markov chain. While the intuitive adversarial strategy here is to attack the most important links, the Nash equilibrium strategy is for the designer to defend the most crucial links and for the adversary to focus attack on the lesser crucial links. We validate these properties through two use cases with example sets of network topologies. Next, we consider a multi-stage framework where the designer is not only interested in the instantaneous network property costs but a discounted sum of costs over many time instances. We establish structural properties of the equilibrium strategies in the multi-stage setting, and also demonstrate that applying algorithms based on the Q-Learning and Rollout methods can result in significant benefits for the designer compared with strategies resulting from a one-shot based game.
引用
收藏
页码:628 / 642
页数:15
相关论文
共 25 条
  • [11] Gueye A, 2010, LECT NOTES COMPUT SC, V6442, P1, DOI 10.1007/978-3-642-17197-0_1
  • [12] Games with incomplete information played by Bayesian players, I-III part I. the basic model
    Harsanyi, John C.
    Myerson, Roger B.
    [J]. Management Science, 2004, 50 (12 SUPPL.) : 1804 - 1824
  • [13] Junling Hu, 1998, Machine Learning. Proceedings of the Fifteenth International Conference (ICML'98), P242
  • [14] Design Techniques and Applications of Cyberphysical Systems: A Survey
    Khaitan, Siddhartha Kumar
    McCalley, James D.
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (02): : 350 - 365
  • [15] Knight U., 2001, POWER SYSTEMS EMERGE
  • [16] Lagoudakis M. G., 2002, P 18 C UNC ART INT, P157
  • [17] FlipThem: Modeling targeted attacks with FlipIt for multiple resources
    Laszka, Aron
    Horvath, Gabor
    Felegyhazi, Mark
    Buttyán, Levente
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8840 : 175 - 194
  • [18] Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation
    Ma, Chris Y. T.
    Yau, David K. Y.
    Lou, Xin
    Rao, Nageswara S. V.
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (02) : 1676 - 1686
  • [19] Meyerson A, 2009, LECT NOTES COMPUT SC, V5687, P272, DOI 10.1007/978-3-642-03685-9_21
  • [20] Nisan N, 2007, ALGORITHMIC GAME THEORY, P1, DOI 10.1017/CBO9780511800481