A Model for Perimeter-Defense Problems with Heterogeneous Teams

08/02/2022
by   Christopher D. Hsu, et al.
0

We develop a model of the multi-agent perimeter-defense game to calculate how an adaptive defense should be organized. This model is inspired by the human immune system and captures settings such as heterogeneous teams, limited resource allocations, partial observability of the attacking side, and decentralization. An optimal defense, that minimizes the harm under constraints of the energy spent to maintain a large and diverse repertoire, must maintain coverage of the perimeter from a diverse attacker population. The model characterizes how a defense might take advantage of its ability to respond strongly to attackers of the same type but weakly to attackers of diverse types to minimize the number of diverse defenders and while reducing harm. We first study the model from a steady-state perimeter-defense perspective and then extend it to mobile defenders and evolving attacker distributions. The optimal defender distribution is supported on a discrete set and similarly a Kalman filter obtaining local information is able to track a discrete, sometimes unknown, attacker distribution. Simulation experiments are performed to study the efficacy of the model under different constraints.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/24/2023

From Shortcuts to Triggers: Backdoor Defense with Denoised PoE

Language models are often at risk of diverse backdoor attacks, especiall...
research
04/01/2023

Coordinated Defense Allocation in Reach-Avoid Scenarios with Efficient Online Optimization

Deriving strategies for multiple agents under adversarial scenarios pose...
research
06/06/2019

Connected Subgraph Defense Games

We study a security game over a network played between a defender and k ...
research
06/27/2022

Measuring and Clustering Network Attackers using Medium-Interaction Honeypots

Network honeypots are often used by information security teams to measur...
research
01/06/2021

A Qualitative Empirical Analysis of Human Post-Exploitation Behavior

Honeypots are a well-studied defensive measure in network security. This...
research
02/21/2022

The Role of Heterogeneity in Autonomous Perimeter Defense Problems

When is heterogeneity in the composition of an autonomous robotic team b...
research
08/31/2021

Incorporating Deception into CyberBattleSim for Autonomous Defense

Deceptive elements, including honeypots and decoys, were incorporated in...

Please sign up or login with your details

Forgot password? Click here to reset