Title | Defending against Contagious Attacks on a Network with Resource Reallocation |
Creator | |
Date Issued | 2021 |
Conference Name | 35th AAAI Conference on Artificial Intelligence, AAAI 2021 |
Source Publication | 35th AAAI Conference on Artificial Intelligence, AAAI 2021
![]() |
Volume | 6A |
Pages | 5135-5142 |
Conference Date | FEB 02-09, 2021 |
Conference Place | Electronic Network |
Abstract | In classic network security games, the defender distributes defending resources to the nodes of the network, and the attacker attacks a node, with the objective to maximize the damage caused. Existing models assume that the attack at node u causes damage only at u. However, in many real-world security scenarios, the attack at a node u spreads to the neighbors of u and can cause damage at multiple nodes, e.g., for the outbreak of a virus. In this paper, we consider the network defending problem against contagious attacks. Existing works that study shared resources assume that the resource allocated to a node can be shared or duplicated between neighboring nodes. However, in real world, sharing resource naturally leads to a decrease in defending power of the source node, especially when defending against contagious attacks. To this end, we study the model in which resources allocated to a node can only be transferred to its neighboring nodes, which we refer to as a reallocation process. We show that this more general model is difficult in two aspects: (1) even for a fixed allocation of resources, we show that computing the optimal reallocation is NP-hard; (2) for the case when reallocation is not allowed, we show that computing the optimal allocation (against contagious attack) is also NP-hard. For positive results, we give a mixed integer linear program formulation for the problem and a bi-criteria approximation algorithm. Our experimental results demonstrate that the allocation and reallocation strategies our algorithm computes perform well in terms of minimizing the damage due to contagious attacks. |
URL | View source |
Language | 英语English |
Scopus ID | 2-s2.0-85130073093 |
Citation statistics | |
Document Type | Conference paper |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/9364 |
Collection | Faculty of Science and Technology |
Affiliation | 1.IoTSC, University of Macau, Macao, China 2.City University of Hong Kong, Hong Kong, China 3.BNU (Zhuhai), UIC, China |
Recommended Citation GB/T 7714 | Bai, Rufan,Lin, Haoxing,Yang, Xinyuet al. Defending against Contagious Attacks on a Network with Resource Reallocation[C], 2021: 5135-5142. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment