Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced state variables, threat and tolerability. A Lanchester-type equations is used to present the dynamics of threat-tolerability due to contradictory behavior of insider and adversary. The main advantage of the proposed method is that it could help to optimize the two side player’s strategies and actions during the game period based on threat-tolerability dynamic. As the game progresses each player observes game position, i.e., the threat level for targets and tolerability level for insider and tries to schedule its resources to influence final game’ profits. Player could resolve offensive, defensive and maneuvering share on total available resources. Deciding on extent resources used for each strategy can be considered as control input for each player to change game’s profits. A simple tracking scenario is used to demonstrate how threat and tolerability dynamics could be used as a tool for optimal resource assignment.
Authors and Affiliations
saeed kamelian, Ali Karimpour, Naser Pariz
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver
The spoofing attack is one of the most serious interferences in the Global Positioning System (GPS). By propagating a signal structurally similar to the original GPS signal, the spoofers try to influence the function of...
Distributed Solving of Weapon Target Assignment Problem using Learning Automata
This article presents a method to solve the weapon target assignment problem, which is one of the problems of distributed constraint optimization. The previous methods do not guarantee the convergence problem properly an...
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs
In this paper, a new algorithm called Motion Coding Gravitational Search Algorithm (MGSA) is proposed to find a moving target using a unmanned aerial vehicles (UAVs). Using the laws of physics and the properties of the e...
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications
Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator
Recently, the radio frequency fingerprint (RFF) has received attention in applications such as specific emiiter identification, detection of deception in navigation signals and detection of intrusion in wireless networks...