About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Game Theory for Networks. 11th International EAI Conference, GameNets 2022, Virtual Event, July 7–8, 2022, Proceedings

Research Article

Budgeted Adversarial Network Resource Utilization Games

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-23141-4_25,
        author={Yi Zhang and Sanjiv Kapoor},
        title={Budgeted Adversarial Network Resource Utilization Games},
        proceedings={Game Theory for Networks. 11th International EAI Conference, GameNets 2022, Virtual Event, July 7--8, 2022, Proceedings},
        proceedings_a={GAMENETS},
        year={2023},
        month={1},
        keywords={Security Network Game theory Nash equilibrium},
        doi={10.1007/978-3-031-23141-4_25}
    }
    
  • Yi Zhang
    Sanjiv Kapoor
    Year: 2023
    Budgeted Adversarial Network Resource Utilization Games
    GAMENETS
    Springer
    DOI: 10.1007/978-3-031-23141-4_25
Yi Zhang1, Sanjiv Kapoor1,*
  • 1: Illinois Institute of Technology, Chicago
*Contact email: kapoor@iit.edu

Abstract

This paper studies budgeted adversarial resource utilization game, where one of the player’s (designer) strategy is the utilization of resources while the other player’s (adversary) role is to police the resources for misuse. In this context, we consider routing games where a designer plans routes on a computer network and the adversary intercepts the routes on the network. Another example is in determining adversarial strategies to block access to travel or resources that may be considered to pose a risk to society, e.g. during a pandemic where the population (designer) goal may not be coincide with the societal goal of minimizing accessing a banned resource. We model this as a zero-sum game with constraints on the adversary or designer budgets. While zero-sum games can be solved using linear programs, we illustrate faster combinatorial methods to solve the problem. We first consider the resource access problem game on a bipartite graph where both the designer and the adversary have independent budget constraints and distinct costs and show a fast algorithm to determine a Nash equilibrium. We also consider the situation where the designer would strategize on paths in a general graph. In this application of determining network paths, where the adversary would attack edges in order to block the paths, we also discuss the case of multiple designers and, in particular show faster algorithms when there are 2 designers. These results utilize properties of minimum cuts in 2-commodity flow routing.

Keywords
Security Network Game theory Nash equilibrium
Published
2023-01-08
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-23141-4_25
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL