Budgeted Adversarial Network Resource Utilization Games

被引:0
作者
Zhang, Yi [1 ]
Kapoor, Sanjiv [1 ]
机构
[1] Illinois Inst Technol, Chicago, IL 60616 USA
来源
GAME THEORY FOR NETWORKS, GAMENETS 2022 | 2022年 / 457卷
关键词
Security; Network; Game theory; Nash equilibrium;
D O I
10.1007/978-3-031-23141-4_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies budgeted adversarial resource utilization game, where one of the player's (designer) strategy is the utilization of resources while the other player's (adversary) role is to police the resources for misuse. In this context, we consider routing games where a designer plans routes on a computer network and the adversary intercepts the routes on the network. Another example is in determining adversarial strategies to block access to travel or resources that may be considered to pose a risk to society, e.g. during a pandemic where the population (designer) goal may not be coincide with the societal goal of minimizing accessing a banned resource. We model this as a zero-sum game with constraints on the adversary or designer budgets. While zero-sum games can be solved using linear programs, we illustrate faster combinatorial methods to solve the problem. We first consider the resource access problem game on a bipartite graph where both the designer and the adversary have independent budget constraints and distinct costs and show a fast algorithm to determine a Nash equilibrium. We also consider the situation where the designer would strategize on paths in a general graph. In this application of determining network paths, where the adversary would attack edges in order to block the paths, we also discuss the case of multiple designers and, in particular show faster algorithms when there are 2 designers. These results utilize properties of minimum cuts in 2commodity flow routing.
引用
收藏
页码:339 / 365
页数:27
相关论文
共 20 条
  • [1] From Duels to Battlefields: Computing Equilibria of Blotto and Other Games
    Ahmadinejad, AmirMahdi
    Dehghani, Sina
    Hajiaghayi, MohammadTaghi
    Loder, Brendan
    Mahini, Hamid
    Seddighin, Saeed
    [J]. MATHEMATICS OF OPERATIONS RESEARCH, 2019, 44 (04) : 1304 - 1325
  • [2] PACKING SPANNING-TREES
    BARAHONA, F
    [J]. MATHEMATICS OF OPERATIONS RESEARCH, 1995, 20 (01) : 104 - 115
  • [3] Calinescu G., 2012, LNICST, V75, P249, DOI [10.1007/978-3-642-30373-9, DOI 10.1007/978-3-642-30373-9]
  • [4] Chang SL, 2020, J BIOL DYNAM, V14, P57, DOI [10.1080/17513758.2020.1720322, 10.22649/JBAM.2020.14.1.57]
  • [5] Settling the Complexity of Computing Two-Player Nash Equilibria
    Chen, Xi
    Deng, Xiaotie
    Teng, Shang-Hua
    [J]. JOURNAL OF THE ACM, 2009, 56 (03)
  • [6] THE ELLIPSOID METHOD AND ITS CONSEQUENCES IN COMBINATORIAL OPTIMIZATION
    GROTSCHEL, M
    LOVASZ, L
    SCHRIJVER, A
    [J]. COMBINATORICA, 1981, 1 (02) : 169 - 197
  • [7] Modeling a Multitarget Attacker-Defender Game with Budget Constraints
    Guan, Peiqiu
    He, Meilin
    Zhuang, Jun
    Hora, Stephen C.
    [J]. DECISION ANALYSIS, 2017, 14 (02) : 87 - 107
  • [8] Gueye A., 2011, PROC 2 INT ICST C GA, V11, P5
  • [9] MULTI-COMMODITY NETWORK FLOWS
    HU, TC
    [J]. OPERATIONS RESEARCH, 1963, 11 (03) : 344 - 360
  • [10] 2-COMMODITY FLOW
    ITAI, A
    [J]. JOURNAL OF THE ACM, 1978, 25 (04) : 596 - 611