بهبود مدیریت

بهبود مدیریت

کاربرد بازی‌های امنیتی در مدلسازی اختلالات شبکه‌های وابسته

نوع مقاله : مقاله پژوهشی

نویسندگان
1 دانشجوی دکتری مهندسی صنایع، دانشگاه پیام نور، تهران، ایران
2 استاد گروه مهندسی صنایع، دانشگاه پیام نور، تهران، ایران
3 دانشیار گروه مهندسی صنایع، دانشگاه پیام نور، تهران، ایران
چکیده
با گسترش کاربرد نظریه بازی‌ها در مدلسازی مسائل مختلف و ماهیت رقابتی دنیای واقعی، استفاده از این روش در حل مسائل مربوط به شبکه‌های حیاتی و مهم که امنیت یک کشور یا جامعه را تحت شعاع قرار می‌دهد، به عنوان بازی‌های امنیتی معرفی گردید.
در این پژوهش، شبکه‌ای وابسته در زمان بروز اختلال مورد مطالعه قرار گرفته است که به دلیل وابستگی عناصر آن، اختلال در یک جزء از شبکه اجزای دیگر را تحت تاثیر قرار می‌دهد و منجر به اختلالات متوالی یا آبشاری می‌گردد. شبکه‌های زیرساختی و حیاتی یک کشور نظیر شبکه‌های توزیع برق، حمل‌ونقل، مخابراتی، مالی و بانکی مورد مطالعه قرار گرفته است. با توجه به ماهیت موضوع مورد بررسی، یک بازی میان مهاجم(عامل اختلال) و مدافع(شبکه) شکل می‌گیرد که هر کدام سعی در بهینه کردن استراتژی‌های خود دارند. هدف نهایی مهاجم، فروپاشی شبکه در اثر وقوع اختلالات آبشاری و هدف مدافع، ممانعت از بروز اختلال و یا کاهش اثر آن و نهایتاً حفظ پایداری شبکه است.
در این بازی، مهاجم همواره بهترین تصمیم به منظور ایجاد اختلال در جریان فعلی شبکه را اتخاذ می‌کند و مدافع تمام رفتارهای مهاجم در تکرارهای قبلی را در نظر گرفته و به منظور حداکثرسازی جریان شبکه عمل می‌کند و این بازی تکرارشونده تا همگرایی اهداف دو بازیکن به یکدیگر ادامه می‌یابد.
کلیدواژه‌ها
موضوعات

عنوان مقاله English

Application of security games in modeling interdependent network disruptions

نویسندگان English

Milad Yari 1
Ramin Sadeghian 2
Meisam Jafari eskandari 3
1 Ph.D. Candidate in Industrial Engineering, Payame Noor University, Tehran, Iran
2 Prof., Industrial Engineering Department, Payame Noor University, Tehran, Iran
3 Associate Prof., Industrial Engineering Department, Payame Noor University, Tehran, Iran
چکیده English

By expansion of the application of game theory in modeling various problems and the competitive nature of the real world, the use of this method in solving problems related to vital and important networks that affect the security of a country or society was introduced as security games.
In this research, an interdependent network has been studied under disruption, which, due to the dependence of its elements, a disruption in one component of the network affects other components and leads to sequential or cascading disruptions. The infrastructure and vital networks of a country, such as electricity distribution, transportation, telecommunications, finance and banking networks, have been studied. Given the nature of the subject under study, a game is formed between the attacker (disruptor) and the defender (network), each of which tries to optimize its strategies. The ultimate goal of the attacker is to collapse the network due to cascading disruptions, and the goal of the defender is to prevent the disruption or reduce its impact and ultimately maintain the stability of the network.
In this game, the attacker always makes the best decision to disrupt the current network flow, and the defender considers all the attacker's behaviors in previous iterations and acts to maximize the network flow. This iterative game continues until the goals of the two players converge.

کلیدواژه‌ها English

Disruptions
Game Theory
Interdependent Networks
Security Games
ابراهیم پور، مصطفی، و زینب فرجود چوکامی. 1402. "شناسایی و رتبه بندی شاخص‌های تاب‌آوری زنجیره‌تأمین در ابعاد چهارگانه با استفاده از روش سوآرا در صنعت مواد غذایی." فصلنامه بهبود مدیریت 17(2): 33-59.‎
کریمی، امیرمسعود، حسینعلی حسن‌پور، و مسعود مصدق خواه. 1403. "ارائه الگوی تحلیل اختلالات و تاب‌آوری زنجیره تامین مواد غذایی." فصلنامه بهبود مدیریت 18(2): 48-73.
صادقی آرانی، زهرا، و اسماعیل مزروعی نصرآبادی. 1404. "شناسایی و مدل‌سازی چالش‌های هم‌رقابتی در زنجیره تأمین بهداشت و درمان: رویکرد مدل‌سازی ساختاری-تفسیری فراگیر فازی." فصلنامه بهبود مدیریت 19(1): 36-59.‎
Almoghathawi, Yasser, Andrés D. González, and Kash Barker. "Exploring recovery strategies for optimal interdependent infrastructure network resilience." Networks and Spatial Economics 21 (2021): 229-260.
Benchekroun, Hassan, and N. V. Long. "Game theory: Static and dynamic games." Research tools in natural resource and environmental economics (2011): 89-140.
Bertsimas, Dimitris, Ebrahim Nasrabadi, and Sebastian Stiller. "Robust and adaptive network flows." Operations Research 61, no. 5 (2013): 1218-1242.
Brocas, Isabelle, Juan D. Carrillo, and Ashish Sachdeva. "The path to equilibrium in sequential and simultaneous games: A mousetracking study." Journal of Economic Theory 178 (2018): 246-274.
Cadini, Francesco, Luca Lomazzi, and Enrico Zio. "Vulnerability Analysis of Power Transmission Grids Subject to Cascading Failures." Electronics 13, no. 5 (2024): 943.
Casey, William, Steven E. Massey, and Bud Mishra. "How signalling games explain mimicry at many levels: from viral epidemiology to human sociology." Journal of the Royal Society Interface 18, no. 175 (2021): 20200689.
Chen, Juntao, Corinne Touati, and Quanyan Zhu. "A dynamic game approach to designing secure interdependent IoT-enabled infrastructure network." IEEE Transactions on Network Science and Engineering 8, no. 3 (2021): 2601-2612.
Cunningham, James D., and Conrad S. Tucker. "Mitigating adversarial cascades in large graph environments." Expert Systems with Applications 258 (2024): 125243.
De Soto, Borja García, Alexandru Georgescu, Bharadwaj Mantha, Ziga Turk, Abel Maciel, and Muammer Semih Sonkor. "Construction cybersecurity and critical infrastructure protection: new horizons for Construction 4.0." J. Inf. Technol. Constr. 27 (2022): 571-594.
Etesami, S. Rasoul, and Tamer Başar. "Dynamic games in cyber-physical security: An overview." Dynamic Games and Applications 2019, no. 4 (Etesami and Başar): 884-913.
Fox, William P. "Teaching the applications of optimisation in game theory's zero sum and non-zero sum games." International Journal of Data Analysis Techniques and Strategies 2, no. 3 (2010): 258-284.
Gerardi, Dino. "Unmediated communication in games with complete and incomplete information." Journal of Economic Theory 114, no. 1 (2004): 104-131.
Gudmundsson, Jens, Jens Leth Hougaard, and Jay Sethuraman. "Managing cascading disruptions through optimal liability assignment." arXiv preprint arXiv:2408.07361 (2024).
Ho, Edwin, Arvind Rajagopalan, Alex Skvortsov, Sanjeev Arulampalam, and Mahendra Piraveenan. "Game Theory in defence applications: A review." Sensors 22, no. 3 (2022): 1032.
Huang, Yan, Yi Joy Li, and Zhipeng Cai. "Security and privacy in metaverse: A comprehensive survey." Big Data Mining and Analytics 6, no. 2 (2023): 234-247.
Hunt, Kyle, and Jun Zhuang. "A review of attacker-defender games: Current state and paths forward." European Journal of Operational Research 313, no. 2 (2024): 401-417.
Lehto, Martti. "Cyber-attacks against critical infrastructure." In Cyber security: Critical infrastructure protection, pp. 3-42. Cham: Springer International Publishing, 2022.
Li, Haitao, Lixin Ji, Yingle Li, and Shuxin Liu. "Robustness Analysis of Multilayer Infrastructure Networks Based on Incomplete Information Stackelberg Game: Considering Cascading Failures." Entropy 26, no. 11 (2024): 976.
Li, Qiyuan, Yumeng Wang, Donghai Tian, Chong Yuan, and Changzhen Hu. "Component-based modeling of cascading failure propagation in directed dual-weight software networks." Computer Networks 255 (2024): 110861.
Mirzaei-Nodoushan, Fahimeh, Omid Bozorg-Haddad, and Hugo A. Loáiciga. "Evaluation of cooperative and non-cooperative game theoretic approaches for water allocation of transboundary rivers." Scientific Reports 12, no. 1 (2022): 3991.
Mühlhofer, Evelyn, Elco E. Koks, Chahan M. Kropf, Giovanni Sansavini, and David N. Bresch. "A generalized natural hazard risk modelling framework for infrastructure failure cascades." Reliability Engineering & System Safety 234 (2023): 109194.
Pan, Shouzheng, Hai Yan, Jia He, and Zhengbing He. "Vulnerability and resilience of transportation systems: A recent literature review." Physica A: Statistical Mechanics and its Applications 581 (2021): 126235.
Pandey, Prabhat, and Meenu Mishra Pandey. Research methodology tools and techniques. Bridge Center, 2021.
Ramirez, Stefanny, Marcelle Van Den Hoven, and Dario Bauso. "A stochastic model for cascading failures in financial networks." IEEE Transactions on Control of Network Systems 10, no. 4 (2023): 1950-1961.
Rao, Nageswara SV, Chris YT Ma, and Fei He. "Game-theoretic strategies for cyber-physical infrastructures under component disruptions." IEEE Transactions on Reliability 72, no. 2 (2022): 483-497.
Ren, Wendi, Jiajing Wu, Xi Zhang, Rong Lai, and Liang Chen. "A stochastic model of cascading failure dynamics in communication networks." IEEE Transactions on Circuits and Systems II: Express Briefs 65, no. 5 (2018): 632-636.
Shen, Yi, Huang Yang, Gang Ren, and Bin Ran. "Model cascading overload failure and dynamic vulnerability analysis of facility network of metro station." Reliability Engineering & System Safety 242 (2024): 109711.
Sun, Jingran, Kyle Bathgate, Shidong Pan, and Zhanmin Zhang. "Network-based method for assessing multi-modal transportation network vulnerability to cascading failures." Sustainability Analytics and Modeling 4 (2024): 100034.
Sun, Wenjuan, Paolo Bocchini, and Brian D. Davison. "Overview of interdependency models of critical infrastructure for resilience assessment." Natural Hazards Review 23, no. 1 (2022): 04021058.
Vatenmacher, Michael, Tal Svoray, Michael Tsesarsky, and Shabtai Isaac. "Performance-driven vulnerability analysis of infrastructure systems." International Journal of Disaster Risk Reduction 76 (2022): 103031.
Wang, Gang, Yuechao Chao, Yong Cao, Tieliu Jiang, Wei Han, and Zeshao Chen. "A comprehensive review of research works based on evolutionary game theory for sustainable energy development." Energy Reports 8 (2022): 114-136.
Wu, Gongyu, Meiyan Li, and Zhaojun Steven Li. "A stochastic modeling approach for cascading failures in cyberphysical power systems." IEEE Systems Journal 16, no. 1 (2021): 723-734.
Yang, Qihui, Caterina M. Scoglio, and Don M. Gruenbacher. "Robustness of supply chain networks against underload cascading failures." Physica A: Statistical Mechanics and its Applications 563 (2021): 125466.
Yang, Ya-Ting, and Quanyan Zhu. "Game-Theoretic Foundations for Cyber Resilience Against Deceptive Information Attacks in Intelligent Transportation Systems." arXiv preprint arXiv:2412.04627 (2024).
Yao, Chen, and Bo Fan. "Spatiotemporal Vulnerability Analysis of Large-Scale Infrastructure Systems under Cascading Failures: Case of Water Distribution Networks." Journal of Infrastructure Systems 29, no. 2 (2023): 04023008.
Zhang, Xi, Dong Liu, Haicheng Tu, and Chi Kong Tse. "An integrated modeling framework for cascading failure study and robustness assessment of cyber-coupled power grids." Reliability Engineering & System Safety 226 (2022): 108654.
Zhu, Quanyan, and Tamer Basar. "Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems." IEEE Control Systems Magazine 35, no. 1 (2015): 46-65.
Zhu, Yuan, Kaan Ozbay, Hong Yang, Fan Zuo, and Di Sha. "Modeling and simulation of cascading failures in transportation systems during hurricane evacuations." Journal of advanced transportation 2021, no. 1 (2021): 5599073.
دوره 19، شماره 2 - شماره پیاپی 68
تابستان 1404
صفحه 138-165

  • تاریخ دریافت 02 بهمن 1403
  • تاریخ بازنگری 26 خرداد 1404
  • تاریخ پذیرش 16 تیر 1404