Preventive strike vs. counter intelligence and protection for a target under attack

Huan Yu, Jun Yang, Yu Zhao, G. Levitin, Xiaoyang Ma, Xuejuan Liu, R. Peng
{"title":"Preventive strike vs. counter intelligence and protection for a target under attack","authors":"Huan Yu, Jun Yang, Yu Zhao, G. Levitin, Xiaoyang Ma, Xuejuan Liu, R. Peng","doi":"10.1109/ICRMS.2016.8050153","DOIUrl":null,"url":null,"abstract":"A defender protects a target from being attacked. It can carry out two kinds of strategies. One is passive defense strategy. The other is active defense strategy. When the defender executes the passive defense strategy, it can deploy camouflage to misinform the attacker. When the defender runs the active defense strategy, it strikes the attacker preventively. Then, the defender will reveals itself and therefore, the attacker detects the target without the intelligence contest. Depending on the strategy chosen by the defender, the attacker should succeed in double contest games to destroy the target. In the case of passive defense it should win the target intelligence and impact contests. In the case of active defense it should win the preventive strike and impact contests. The attacker allocates its resources among the intelligence, the impact and self-protection efforts, whereas the defender distributes its resources among the counter intelligence, protection and the preventive strike efforts. The attacker attempts to maximize the target vulnerability, but oppositely the defender desires to minimize it. The paper develops two non-cooperative two-period minmax games.","PeriodicalId":347031,"journal":{"name":"2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRMS.2016.8050153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

A defender protects a target from being attacked. It can carry out two kinds of strategies. One is passive defense strategy. The other is active defense strategy. When the defender executes the passive defense strategy, it can deploy camouflage to misinform the attacker. When the defender runs the active defense strategy, it strikes the attacker preventively. Then, the defender will reveals itself and therefore, the attacker detects the target without the intelligence contest. Depending on the strategy chosen by the defender, the attacker should succeed in double contest games to destroy the target. In the case of passive defense it should win the target intelligence and impact contests. In the case of active defense it should win the preventive strike and impact contests. The attacker allocates its resources among the intelligence, the impact and self-protection efforts, whereas the defender distributes its resources among the counter intelligence, protection and the preventive strike efforts. The attacker attempts to maximize the target vulnerability, but oppositely the defender desires to minimize it. The paper develops two non-cooperative two-period minmax games.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
预防性打击与反情报和对攻击目标的保护
防御者保护目标免受攻击。它可以执行两种策略。一是被动防御战略。二是积极防御战略。当防御方采取被动防御策略时,可以通过伪装来误导攻击方。当防御方采取主动防御策略时,对攻击方进行预防性攻击。然后,防御者会暴露自己,因此,攻击者不需要智力竞赛就能检测到目标。根据防御方所选择的策略,攻击方应该在双对局中成功摧毁目标。在被动防御的情况下,它应该赢得目标情报和影响竞赛。在积极防御的情况下,应在预防性打击和冲击性竞赛中获胜。攻击者将资源分配给情报、冲击和自我保护,防御者将资源分配给反情报、保护和预防性打击。攻击者试图将目标漏洞最大化,而防御者则希望将其最小化。本文发展了两个非合作的两期极小极大对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Review on civil aviation safety investment research A non-invasive framework for XML data binding Maintenance policies for improving the availability of a software-hardware system Analysis of reliability growth model of domestic large thermal power unit A new method for product field reliability assessment based on accelerated life test
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1