Colonel Blotto Game Aided Attack-Defense Analysis in Real-World Networks

  • Sanghai Guan
  • , Jingjing Wang
  • , Chunxiao Jiang
  • , Zhu Han
  • , Yong Ren
  • , Abderrahim Benslimane

Research output: Contribution to journalConference articlepeer-review

Abstract

Large scale network systems such as Internet, smart grids and social networks become an indispensable part of our daily life. However, due to their inherent vulnerability as well as the limited management and operational capability, these network systems are constantly under the threat of malicious attackers. In such attack-defense scenarios, it is particularly significant to make the best use of defenders' limited resources and capability. In this paper, we propose a networked Colonel Blotto game, where the attackers and defenders allocate the limited resources on network nodes, and their utility depends on certain network performance metrics, which are defined for evaluating the performance of the whole network system. Furthermore, considering the complexity of the equilibrium analysis in large scale network systems, a co-evolution based algorithm is proposed for obtaining the practical action sets as well as achieving the mixed-strategy Nash equilibrium. Finally, relying on three real-world network systems, i.e., computer networks, Internet of vehicles and online social networks, simulation results show the effectiveness and feasibility of our proposed model, which is conducive to the design, management and maintenance of real-world network systems.

Original languageEnglish
Article number8647886
JournalProceedings - IEEE Global Communications Conference, GLOBECOM
DOIs
StatePublished - 2018
Externally publishedYes
Event2018 IEEE Global Communications Conference, GLOBECOM 2018 - Abu Dhabi, United Arab Emirates
Duration: 9 Dec 201813 Dec 2018

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 7 - Affordable and Clean Energy
    SDG 7 Affordable and Clean Energy

Keywords

  • Colonel Blotto game
  • network attack-defense security
  • resource allocation

Fingerprint

Dive into the research topics of 'Colonel Blotto Game Aided Attack-Defense Analysis in Real-World Networks'. Together they form a unique fingerprint.

Cite this