Cargando…

Zero-determinant strategy in stochastic Stackelberg asymmetric security game

In a stochastic Stackelberg asymmetric security game, the strong Stackelberg equilibrium (SSE) strategy is a popular option for the defender to get the highest utility against an attacker with the best response (BR) strategy. However, the attacker may be a boundedly rational player, who adopts a com...

Descripción completa

Detalles Bibliográficos
Autores principales: Cheng, Zhaoyang, Chen, Guanpu, Hong, Yiguang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10338512/
https://www.ncbi.nlm.nih.gov/pubmed/37438579
http://dx.doi.org/10.1038/s41598-023-38460-8
_version_ 1785071644192014336
author Cheng, Zhaoyang
Chen, Guanpu
Hong, Yiguang
author_facet Cheng, Zhaoyang
Chen, Guanpu
Hong, Yiguang
author_sort Cheng, Zhaoyang
collection PubMed
description In a stochastic Stackelberg asymmetric security game, the strong Stackelberg equilibrium (SSE) strategy is a popular option for the defender to get the highest utility against an attacker with the best response (BR) strategy. However, the attacker may be a boundedly rational player, who adopts a combination of the BR strategy and a fixed stubborn one. In such a condition, the SSE strategy may not maintain the defensive performance due to the stubbornness. In this paper, we focus on how the defender can adopt the unilateral-control zero-determinate (ZD) strategy to confront the boundedly rational attacker. At first, we verify the existence of ZD strategies for the defender. We then investigate the performance of the defender’s ZD strategy against a boundedly rational attacker, with a comparison of the SSE strategy. Specifically, when the attacker’s strategy is close to the BR strategy, the ZD strategy admits a bounded loss for the defender compared with the SSE strategy. Conversely, when the attacker’s strategy is close to the stubborn strategy, the ZD strategy can bring higher defensive performance for the defender than the SSE strategy does.
format Online
Article
Text
id pubmed-10338512
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-103385122023-07-14 Zero-determinant strategy in stochastic Stackelberg asymmetric security game Cheng, Zhaoyang Chen, Guanpu Hong, Yiguang Sci Rep Article In a stochastic Stackelberg asymmetric security game, the strong Stackelberg equilibrium (SSE) strategy is a popular option for the defender to get the highest utility against an attacker with the best response (BR) strategy. However, the attacker may be a boundedly rational player, who adopts a combination of the BR strategy and a fixed stubborn one. In such a condition, the SSE strategy may not maintain the defensive performance due to the stubbornness. In this paper, we focus on how the defender can adopt the unilateral-control zero-determinate (ZD) strategy to confront the boundedly rational attacker. At first, we verify the existence of ZD strategies for the defender. We then investigate the performance of the defender’s ZD strategy against a boundedly rational attacker, with a comparison of the SSE strategy. Specifically, when the attacker’s strategy is close to the BR strategy, the ZD strategy admits a bounded loss for the defender compared with the SSE strategy. Conversely, when the attacker’s strategy is close to the stubborn strategy, the ZD strategy can bring higher defensive performance for the defender than the SSE strategy does. Nature Publishing Group UK 2023-07-12 /pmc/articles/PMC10338512/ /pubmed/37438579 http://dx.doi.org/10.1038/s41598-023-38460-8 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Cheng, Zhaoyang
Chen, Guanpu
Hong, Yiguang
Zero-determinant strategy in stochastic Stackelberg asymmetric security game
title Zero-determinant strategy in stochastic Stackelberg asymmetric security game
title_full Zero-determinant strategy in stochastic Stackelberg asymmetric security game
title_fullStr Zero-determinant strategy in stochastic Stackelberg asymmetric security game
title_full_unstemmed Zero-determinant strategy in stochastic Stackelberg asymmetric security game
title_short Zero-determinant strategy in stochastic Stackelberg asymmetric security game
title_sort zero-determinant strategy in stochastic stackelberg asymmetric security game
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10338512/
https://www.ncbi.nlm.nih.gov/pubmed/37438579
http://dx.doi.org/10.1038/s41598-023-38460-8
work_keys_str_mv AT chengzhaoyang zerodeterminantstrategyinstochasticstackelbergasymmetricsecuritygame
AT chenguanpu zerodeterminantstrategyinstochasticstackelbergasymmetricsecuritygame
AT hongyiguang zerodeterminantstrategyinstochasticstackelbergasymmetricsecuritygame