Next Article in Journal
Noise Robustness of Transcript-Based Estimators for Properties of Interactions
Previous Article in Journal
High-Efficiency Lossy Source Coding Based on Multi-Layer Perceptron Neural Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis of Complex Network Attack and Defense Game Strategies Under Uncertain Value Criterion

1
Equipment Management and UAV Engineering School, Air Force Engineering University, Xi’an 710051, China
2
Air Defense and Antimissile School, Air Force Engineering University, Xi’an 710051, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(10), 1066; https://doi.org/10.3390/e27101066
Submission received: 27 August 2025 / Revised: 2 October 2025 / Accepted: 11 October 2025 / Published: 14 October 2025
(This article belongs to the Section Complexity)

Abstract

The study of attack–defense game decision making in critical infrastructure systems confronting intelligent adversaries, grounded in complex network theory, has emerged as a prominent topic in the field of network security. Most existing research centers on game-theoretic analysis under conditions of complete information and assumes that the attacker and defender share congruent criteria for evaluating target values. However, in reality, asymmetric value perception may lead to different evaluation criteria for both the offensive and defensive sides. This paper examines the game problem wherein the attacker and defender possess distinct target value evaluation criteria. The research findings reveal that both the attacker and defender have their own “advantage ranges” for value assessment, and topological heterogeneity is the reason for this phenomenon. Within their respective advantage ranges, the attacker or defender can adopt clear-cut strategies to secure optimal benefits—without needing to consider their opponents’ decisions. Outside these ranges, we explore how the attacker can leverage small-sample detection outcomes to probabilistically infer defenders’ strategies, and we further analyze the attackers’ preference strategy selections under varying acceptable security thresholds and penalty coefficients. The research results deliver more practical solutions for games involving uncertain value criteria.

1. Introduction

Critical infrastructure systems face persistent threats from malicious attacks, and their security has garnered widespread attention [1,2,3,4,5,6]. A prominent research direction entails leveraging complex networks to characterize the topological relationships among critical infrastructure components, coupled with game theory to analyze the strategic equilibrium between intelligent attackers and defenders under constrained offensive and defensive resources [7,8,9,10].
In complex networks, each node is an abstraction of the components in the complex system, and the edges reflect the relationships between the components. From a network perspective, all nodes and edges collectively constitute an integrated whole. Consequently, unlike traditional game models, the value assessment of each target (node) in the network is shaped not only by its intrinsic value but also by its topological relationships [11,12]. The results of networked games must account for additional payoffs beyond the direct gains from attacking or defending targets, which introduces non-linear effects into network-based attack–defense games [13,14]. To date, significant progress has been achieved in research on attack–defense games within complex networks [10,15]. Li et al. [16] studied a simultaneous-move attacker–defender game model under complete information. The strategies and payoffs in this game are defined based on the topology of the infrastructure system, and the Nash equilibrium conditions for two strategies—targeted and random—were analyzed. Li et al. [17] further investigated a Stackelberg game with complete information involving one defender (the leader) and one attacker (the follower). Their research found that, in networks with more heterogeneous distributions and fewer connections, the threshold parameters (where both players adopt random strategies) have higher values. He et al. [18] studied synchronous and sequential games in cyber-physical systems (CPS) under complete information. They used a product-form function with cyber and physical exponential correlation coefficients to characterize the effect of cyber-physical interdependency on the CPS survival probability. The results demonstrate that these correlation coefficients significantly influence the CPS survival probability. Shan et al. [19] applied game theory to model three-level defense and attack strategies in smart grid network security. They characterized the best responses and equilibrium strategies for both the attacker and defender, finding that the attacker’s optimal strategies across all three network types are unaffected by interdependent relationships between networks. In contrast, the defender’s best response depends not only on direct attacks but also on cascading effects from connected networks. Fu et al. [20] studied a two-player simultaneous game under complete information, incorporating the impact of load cascading failures on the network. By categorizing nodes into high-value and equal-value groups, they found that, if the defender’s resource allocation ratio for high-value nodes falls below a threshold, it creates an exploitable opportunity for the attacker. They also studied attack and defense games on interdependent networks, considering the cascading effects of dependencies between subnetworks [21]. Wu et al. [22] proposed a framework integrating game theory and network science, where critical target selection and resource allocation are incorporated into the strategy model. Using cumulative prospect theory, they evaluated payoffs by considering agents’ risk attitudes. Their analysis of optimal strategies under varying resource levels highlights the importance of balancing investments between enhancing component capacity and safeguarding critical components.
However, all the above studies rely on the framework of complete-information games—an assumption that deviates significantly from real-world conditions. On the one hand, the defender can deliberately conceal network information, rendering it exceedingly challenging for attackers to acquire comprehensive knowledge of the system. Nagaraja et al. [23] developed an iterative dynamic game to capture the interactions between attack and defense strategies in scale-free networks, and they provide a framework for analyzing defense and attack in networks where topology matters. Domingo et al. [24] explored iterated attack and defense in scale-free weighted and/or directed networks, and they achieved this by considering costs: there are bounds to what an attacker and a defender can do in each round. Nystrom et al. [25] consider the attacker’s state of information with respect to the defender’s network and propose a program that extends the limited attacker information state by consuming resources as part of the attack round or a probability mechanism related to network attacks. Dong et al. [26] suggest that existing methods lack consideration of fuzziness and uncertainty when evaluating the payoffs in practical attack and defense games, and they propose using intuitionistic fuzzy sets to depict such uncertain payoffs. On the other hand, the defender can also deceive attackers by means of disguise or disseminating false information, which may induce the latter to make misinformed decisions. Zeng et al. [27] proposed an active defense by revealing the disguised network to the attacker under asymmetric information, where misleading information leads to the income of the attacker being lower than expected, and the attack may even fail. Wu et al. [28] considered the risk attitudes of both the attacker and defender and studied resource allocation when the defender has multiple strategies (active strike, preventive strike, and imperfect false targets). The results show that the introduction of risk attitudes leads the game to a lose–lose situation under some circumstances and benefits one party in other cases. Zhang et al. [29] studied resource allocation among multiple targets in a defender–attacker game considering false targets, and they found that the reasonable allocation of resources for the camouflage/identification of false targets has a great impact on the final profit. Fu et al. [30] analyzed the impact of camouflage strategies on the Stackelberg game model in complex networks and found that the penalty coefficient and camouflage coefficient must be designed in combination to achieve effective defense effects. Of course, attackers may also use certain means to conceal or cover up their attack behavior, making it difficult for defenders to obtain timely or accurate network status information. The incomplete information model established by Keith et al. [31] takes into account the case in which the defender cannot distinguish or recognize the opponent’s actions and natural state. Zhang et al. [32] proposed a novel approach to the H∞ performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts, aiming to identify secret attacks launched by adversaries. Hunt and Zhuang [15] conducted a comprehensive review and future development path analysis of research on offensive and defensive game problems in recent years, and they suggest that game decision making under uncertain information is a major challenge preventing theoretical research from being applied in practice.
Attack and defense game analysis is built upon two fundamental prerequisites: on one hand, it is necessary to determine the information held by the attacker and the defender separately; on the other hand, it demands an understanding of the opponent’s decision-making preferences or inclinations [33,34]. One issue that is often neglected is the evaluation of network target values—a process influenced by both subjective and objective factors. Objective factors, such as the network topology structure, are well defined, whereas subjective factors—including players’ perceptions of the target value—tend to be ambiguous. Asymmetric value perception will lead to discrepancies in the evaluation results between the attacking and defending parties. Therefore, the evaluation of the network target value is not only a factor with dual impacts but also a core element of attack and defense games: it determines the final payoffs of the game and, in turn, dictates the strategies employed by both sides. Most prior studies rely on two types of simplifying assumptions regarding target value evaluation criteria: either the criteria are uniform across attackers and defenders or both parties have complete knowledge of each other’s evaluation frameworks. However, in reality, these evaluation criteria may diverge, and one-shot games render an accurate assessment of the opponent’s target valuations exceedingly challenging. A notable finding in zero-sum games is that, when both players share identical preferences and no additional payoffs are considered, the defender incurs the maximum possible losses [28]. This creates an incentive for players to conceal their preferences from one another. Therefore, value perception asymmetry not only exists in reality but is even actively created by both offensive and defensive parties. Strictly speaking, the issue of asymmetric value perception falls under the category of incomplete information games. Unlike the incomplete grasp of objective facts—such as network information or strategic information—the uncertainty stemming from value perception asymmetry originates from the cognitive uncertainty of decision-makers. It is far more difficult and complex to collect and analyze intelligence to identify opponents’ value recognition criteria; furthermore, the conclusions derived inherently possess fuzzy attributes and subjective biases. Consequently, the study of asymmetric value recognition holds greater practical significance for decision making in network-based games.
In this paper, we study the Stackelberg game model, where the defender takes action first and the attacker takes action later. However, the attacker cannot obtain the defender’s strategic information unless the attacker takes detection actions (there is a risk of being recognized by the network). We analyze the advantageous strategy ranges and strategy transition relationships for both the attacker and the defender under distinct target value evaluation criteria. Furthermore, beyond the scope of advantageous strategies, we propose a small-sample-based Bayesian inference method to provide decision support for the attacker across varying acceptable security thresholds and penalty coefficients. Our findings offer a more practical solution for game-theoretic decision making under conditions of information uncertainty.
The article is structured as follows. In Section 2, we introduce the basic model, including network models and game models. The analysis of attack and defense strategies is shown in Section 3, where Section 3.1 analyzes the stable solution of the game under different value coefficients, Section 3.2 implements decision analysis based on probabilistic inference under uncertain conditions, and, in Section 3.3, the validation of the research results on real networks is presented. Finally, we provide conclusions in Section 4.

2. Basic Model

Assuming that the network model is an undirected graph G ( V , E ) , the set of nodes is recorded as V = { v 1 , v 2 , , v n } , and the number of nodes is N = | V | ; E = { e 1 , e 2 , , e m } is the set of edges, with a total of M = | E | edges. Both the attacker and defender target network nodes for their offensive and defensive actions. The value of a node is assumed to be positively correlated with its degree centrality—defined as the number of edges directly connecting the node with other nodes in the network. The physical meaning is that nodes with higher connectivity play a more important role in the network. This implies that the higher a node’s degree, the greater its value [16]. Existing research has shown that removing nodes with high degree centrality exerts a more significant impact on the network topology and is more likely to trigger network collapse [11]. Additionally, betweenness centrality is another commonly used indicator for evaluating node importance, and ref. [35] has demonstrated the correlation between degree and betweenness. Degree has lower computational complexity than betweenness in large-scale networks.
However, there is a difference in the perception of the node value between the attacker and defender. We define the attacker’s perception of the value of node v i as L i A = k i θ a , satisfying θ a 0 . Meanwhile, the defender’s perception of the value of node v i is L i D = k i θ d , satisfying θ d 0 , where θ a and θ d are independent variables. The total resources of the attacker and the defender are represented as T C A and T C D , respectively. The attack (defense) resources required by nodes are usually positively correlated with their value; in this paper, we define the resource consumption of attack and defense node v i as c i a = c i d = k i . This is motivated by the following considerations: on the one hand, the cost of attack (defense) is only considered to be related to the objective state of the network (topology), and, on the other hand, this means that our analysis focuses only on the impact of payoffs (value criteria) on game strategies. Due to both attackers and defenders recognizing the impact of damage to high-degree nodes on the network, the attacker may not be able to successfully attack high-degree nodes. On the other hand, under the constraint of limited resources, if the defender concentrates his resources on protecting high-degree nodes, the attacker has a higher probability of succeeding in attacking the remaining nodes, which will prompt the defender to transfer defense resources from high-value nodes. The above process is a typical game process, wherein both parties must consider the strategies that their opponents may adopt. Whether a stable solution exists in this process, and how to select optimal offensive and defensive strategies, requires more effective analysis.
The attack and defense game model can be represented as
A : max x i S A , y i S D B a , D : max x i S A , y i S D B d
where S A and S D are attack and defense strategies, respectively. If node v i is attacked (defended), then x i = 1 ( y i = 1 ); otherwise, x i = 0 ( y i = 0 ). The purpose of the attacker is to disrupt the network to the greatest extent possible, and the payoff of the attacker is the total value of all failed nodes in the network B a = i Ω L i A , where Ω is the set of failed nodes in the network, including nodes that have been successfully attacked and failed, as well as nodes that have detached from the main structure of the network. The goal of the defender is to minimize the value loss of the network as much as possible, and the objective function satisfies B d = i Ω L i D . Game-theoretic analysis typically assumes that players possess a complete mutual understanding. However, the reality is that the attacker and defender may have different target evaluation criteria (due to subjective cognitive differences), their objective functions yield inconsistent evaluations under identical network damage scenarios, and changes in the relationship between risk and payoffs will lead to changes in the stable strategy combination of the game. In such cases, the strategic interaction between the attacker and defender is shaped by two core factors: their own value perceptions and their inferences regarding the opponent’s valuation criteria. This divergence can render conventional stable analysis ineffective.

3. Analysis of Attack and Defense Strategies

We examine two distinct attack–defense strategies: a preference strategy (PS) and random strategy (RS). The preference strategy refers to the attacker (defender) having a greater tendency to attack (defend) high-value nodes, adopting a roulette wheel selection mechanism for target screening, setting intervals for all nodes in the network based on the size of the k i φ -relationship of the degree values, and simulating the size of the probability distribution, where φ > 0 is the preference coefficient of the defender (attacker) towards high-value nodes. Obviously, high-value nodes occupy larger probability intervals and are more likely to be selected as attack (defense) targets. The preference strategy ensures the optimal trend and maintains the randomness of the strategy. The random strategy is to randomly select all nodes with the same probability.
We have established the scale-free random network [36] with a scale satisfying N = 1000 , and the average degree of the network is k = 2 M / N 6 . The investment of attack and defense resources is T C A = T C D = 2500 , and the preference coefficient satisfies φ = 2 . The above information can be obtained by the attacker through the collection and analysis of information intelligence. Therefore, both the attacker and defender are believed to have complete knowledge of the network topology but lack information about each other’s strategic choices. In this scenario, undefended nodes will fail when attacked, and defended nodes can successfully resist attacks. The following values were obtained by averaging over experiments on 50 independent networks.

3.1. Analysis of Game-Stable Solutions Under Different Value Coefficients

The stable solution of a game requires comprehensive consideration of the actions of both parties in the game. In the context of attack–defense interactions, attackers and defenders exhibit distinct behaviors when evaluating network targets under varying value coefficients—these evaluative behaviors not only drive their individual decisions but also ultimately dictate the game’s stable outcome. We first assume that both the attacker and defender have a consistent value coefficient—that is, θ a = θ d = θ —so that we can conduct game analysis from the perspectives of both parties simultaneously.
Figure 1a shows the game results for attack and defense strategy combinations with different value coefficients. We focus on the relative relationships between different combinations of game strategies under different value coefficients, which determine the strategy choices of both parties in the game. Simulation results show that value coefficients θ have a significant impact on game results. The strategy combination of the attacker and defender is written in the form of ( A , D ) , where A is the attacker’s strategy and D is the defender’s strategy; for example, ( P S , R S ) indicates that the attacker’s strategy is a preference strategy (PS), while the defender’s strategy is a random strategy (RS). According to the curve relationship, the intersection point of the curve is the critical point where the attack and defense stability strategy may change. We selected three data points as examples for game analysis, namely θ = 0.8 , θ = 1.0 , and θ = 1.2 , and established game matrices, as shown in Table 1, Table 2 and Table 3, for comparative analysis. The bold font in the table highlights the stable solution of the game, while the light gray background indicates the player’s advantageous strategy. Obviously, the results of game analysis vary under different value coefficients.
In practical scenarios, neither attackers nor defenders have insight into each other’s value coefficients, and their decisions are based on game matrices derived from their own value coefficients. According to the simulation results shown in Figure 1a, as the value coefficient increases, the stability of the attacker’s random strategy gradually decreases, whereas the stability of the defender’s preference strategy gradually increases. For ease of analysis, we divide the value range of coefficient θ into two regions. The significant feature of Area I is that, if the attacker’s value coefficient θ a insight is in Area I, the attacker has an absolute advantage under the random strategy. Meanwhile, if the defender’s value coefficient θ d insight is in Area II, the defender has an absolute advantage under the preference strategy. Figure 1b reflects the impacts of the strategies adopted by the attacker and defender across different coefficient regions. In the first quadrant, the defender can make clear decisions, whereas the attacker must base their decisions on the defender’s choices; the third quadrant presents the opposite scenario to that in the first quadrant. In the second quadrant area, both the attacker and defender will make clear decisions. Meanwhile, in the fourth quadrant, neither party can make independent decisions—instead, both need to adjust their strategies in response to the opponent’s actions.
Table 4, Table 5, Table 6 and Table 7 show the game results regarding the combination of attack and defense strategies for the defender’s value coefficient in scenarios θ d = 0.8 and θ d = 1.12 , as well as the attacker’s value coefficient in scenarios θ a = 0.88 and θ a = 1.2 , where θ a = 0.88 and θ d = 0.8 are in Area I, and θ d = 1.12 and θ a = 1.2 are in Area II. The stable solution in Table 4 is derived by first identifying the attacker’s advantageous strategy (random strategy), followed by the defender’s selection of the random strategy. Similarly, the stable solution in Table 7 is obtained through a sequential process: the defender first determines its dominant strategy, and the attacker then selects its own dominant strategy. In Table 6, under the corresponding value coefficients, both the attacker and the defender possess distinct advantageous strategies, and the stable solution constitutes a combination of these advantageous strategies. Table 5, by contrast, depicts a complex game scenario where neither party has an absolutely advantageous strategy. Here, the attacker and defender may make decisions based on different principles, leading to varied game outcomes.
Obviously, the final stable solution of the game needs to be determined based on the combination ( θ a , θ d ) of the value coefficient insights of the attacker and defender. The understanding of the opponent’s value coefficient by the attacker or defender is important as it can affect the final game-stable strategy. It can be confirmed that, if the value coefficient θ is small (in Area I), the attacker will adopt a random strategy, while, if the value coefficient θ is large (in Area II), the defender will adopt a preference strategy. A stable solution can be easily obtained in both of the above situations, as shown in Table 4, Table 6, and Table 7. However, in reality, it is difficult for the attacker (defender) to obtain information about the opponent’s value coefficient, especially if the attacker’s value coefficient θ a insight is outside Area I and the defender’s value coefficient θ d insight is outside Area II, whereby a stable strategy is difficult to obtain.

3.2. Decision Analysis Based on Probabilistic Inference Under Uncertain Conditions

Compared to analyzing the opponent’s value coefficient, obtaining information about the defender’s deployed actions is more readily achievable. Usually, the defender deploys a strategy earlier than the attacker, and the attacker can take detection actions to obtain information about the defender’s strategy. Therefore, the attacker has the opportunity to ascertain the defender’s strategic choice; this is beneficial in enabling the attacker to make correct decisions when the value coefficient θ a insight is not in Area I. The above model is called a Stackelberg game. However, if the attacker takes action to detect the network, there is a certain probability that the network will recognize the detection action due to warning or defense mechanisms. The probability of an undefended node recognizing the detection behavior is recorded as ω 1 , and ω 2 is the probability of a defended node recognizing the detection behavior, which usually satisfies ω 2 ω 1 . If the network identifies the attacker’s detection action, the defense mechanism of the network is triggered. On the one hand, the attacker will no longer be able to detect the true information of the network. On the other hand, the undefended nodes will have a certain resistance ability after being attacked, and the probability of failure will be reduced from 1 to 1 β , where β denotes the penalty coefficient.
The attacker can improve the effectiveness of the attacks by detecting whether nodes are defended. However, if such detection is identified by the network, the subsequent improvement in the network’s attack resistance will adversely impact the attackers’ payoffs. Notably, large-scale detection is prone to being recognized—even under conditions where coefficients ω 1 and ω 2 are very low. To further maximize the benefits, the attacker can therefore first employ small-scale detection combined with probabilistic inference to deduce the defender’s strategy. This approach aims to minimize the risk of punishment caused by the detection action being identified, while maximizing the acquisition of the defender’s defense strategy. We assume that the attacker is aware of the defender’s total resources and can conduct small-scale detection tests to infer the defender’s defense strategy based on probability inference before launching a direct attack. The specific steps are as follows.
(1)
The attacker first determines the acceptable security threshold S Λ , which represents the level of risk that the attacker can tolerate regarding the defender identifying its detection action. S Λ will affect the sample size detected by the attacker; the larger S Λ , the fewer nodes will be detected and the lower the accuracy of the attacker’s inference of the defender’s strategy based on the observed results.
(2)
Nodes are randomly selected for sequential detection, with the risk of detection behavior being identified by the network denoted as S T T T d = ( 1 ω 2 ) T d ( 1 ω 1 ) T T T d . T T N is the total number of detected nodes, which means that the risk of detection behavior satisfies S T T d < S Λ   ( T < T T ) if and only if condition S T T T d S Λ is satisfied when detecting the T T -th. T d is the number of defended nodes among the detected sample. ω 1 and ω 2 denote the ability of the network to recognize the attacker’s detection behavior, and they do not directly affect the game results. ω 1 and ω 2 only affect the sampling size ( T d and T T ) under the constraint of security threshold S Λ .
(3)
The attacker can calculate the benchmark ratio of defended nodes in the network using the defender’s total defense resources and publicly available/acquired network information. The proportions of nodes defended by the defender under random and preference strategies (denoted as P R S and P P S , respectively) can be obtained by averaging the results from multiple simulations. The proportion of nodes under the random strategy can also be calculated through formula P R S = T C D / ( N k ) , where k is the average degree of the network.
(4)
Based on the benchmark ratios P R S and P P S and the sample information T T and T d , the conditional probability of the defender adopting a random strategy is P ( S | R S ) C T T T d ( P R S ) T d ( 1 P R S ) T T T d . Meanwhile, the conditional probability of adopting a preference strategy is P ( S | P S ) C T T T d ( P P S ) T d ( 1 P P S ) T T T d . Here, P ( S ) = T d / T T is the proportion of defended nodes in the sample, and P ( R S ) = P ( P S ) = 0.5 indicates that the attacker is completely unaware of which of the two strategies the defender will employ.
(5)
Based on the Bayesian formula, we can calculate the posterior values P ( R S | S ) and P ( P S | S ) using Formulas (1) and (2) and analyze the impact of estimation errors.
P ( R S | S ) = P ( S | R S ) × P ( R S ) P ( S ) = C T T T d ( P R S ) T d ( 1 P R S ) T T T d × P ( R S ) ( T d / T T )
P ( P S | S ) = P ( S | P S ) × P ( P S ) P ( S ) = C T T T d ( P P S ) T d ( 1 P P S ) T T T d × P ( P S ) ( T d / T T )
Obviously, as shown in Formulas (1) and (2), P ( R S | S ) and P ( P S | S ) are influenced by the prior values of P P S , P ( P S ) , P R S , and P ( R S ) , as well as the sampling results T T and T d . If P ( P S | S ) > P ( R S | S ) is satisfied, it can be inferred that the defender is more likely to have adopted a preference strategy; otherwise, the defender’s strategy is deemed a random strategy. Subsequently, the attacker will select an attack strategy that is inconsistent with the defender’s strategy.
The impact of the attacker’s probability inference on their benefits is influenced by the qualitative relationship between P ( R S | S ) and P ( P S | S ) , the correctness of the probability inference, and the joint influence of S Λ and β . This is usually complex and difficult to control, so we focus on analyzing the impact of S Λ and β , as these two parameters have a direct impact on the game results. The sensitivity analysis of parameters such as ω 1 , ω 2 , P ( P S ) , and P R S , etc., which indirectly affect the game results, can be theoretically performed based on Formulas (1) and (2).
Based on the previously set parameters, the probabilities of any node being defended under the defender’s random and preference strategies—calculated by averaging the outcomes from multiple simulations—are P R S = 0.412 (theoretical value: P R S = T C D / ( N k ) = 0.417 ) and P P S = 0.1963 , respectively. The simulation is designed with fixed parameters w 1 = 0.01 , w 2 = 0.05 and analyzes the impact of S Λ and β on the decision of the attacker under situation θ a = 1.2 . In the case of θ a = 1.2 , the attacker’s optimal choice is to adopt a strategy that is inconsistent with that of the defender. Results for other parameter value combinations can be derived using the same method.
Figure 2a,b illustrate the attacker’s payoffs under the assumption that the defender adopts a random strategy (RS) and a preference strategy (PS), respectively. The attacker infers the defender’s strategy from a small sample and then determines its own attack strategy. The simulation results indicate that S Λ and β indeed influence the attacker’s decision of whether to conduct probing. Under the assumption that the defender adopts a random strategy, the attacker’s detection behavior is advantageous only when the penalty coefficient β is small—in contrast to not detecting at all. However, in the case where the defender adopts a preference strategy, the attacker still has the motivation to probe the network when facing a larger penalty coefficient. Another conclusion is that the security threshold S Λ needs to be set to an appropriate value. If S Λ is too small, excessive sample detection will increase the risk of being recognized by the network, and, under the influence of the penalty coefficient, it will actually reduce the reduce the attacker’s payoffs. If it is too large, the sample size will be insufficient to accurately infer the defender’s strategy, making it difficult for the attacker to make more favorable decisions. Table 8 shows the sample sizes and defense count ranges obtained from simulations under different parameter settings.
The combined effect of S Λ and β directly impacts the results of the game. If the total value of undefended nodes among the attacked nodes is V , the expected benefit obtained by the attacker from the undefended nodes is V * ( 1 S Λ ) * ( 1 β ) + σ , where S Λ < 1 ( S Λ = 1 means no detection), and 1 S Λ denotes the probability of the attacker’s detection behavior being identified by the network. If the network fails to recognize the attacker’s detection behavior, then β 0 ; otherwise, β is the corresponding value. σ is the value of nodes separated from network entities. Meanwhile, the inference results of the attacker regarding defense strategies can also affect V ; correct inferences will increase V , while incorrect inferences will decrease the value of V . Moreover, the inference result will be affected by S Λ . Therefore, the sensitivity of S Λ and β to the game result is intricate.
However, in reality, the attacker lacks clarity on whether the defender has adopted a preference strategy (PS) or random strategy (RS). Therefore, the attacker cannot definitively decide whether to conduct detection under a given security threshold. As shown in Figure 3a, when the defender adopts a PS or RS, respectively, the penalty coefficient corresponding to whether the attacker conducts detection behavior under the security threshold S Λ = 0.7 is different. Obviously, if β < β 1 , the attacker should conduct detection behavior, and, if β > β 2 , no detection behavior should be performed. Under the condition of β 1 < β < β 2 , the attacker cannot decide whether to detect or not. Therefore, the aspect that the attacker needs to analyze is the strategic advantage of different security thresholds and penalty coefficients when the defender’s strategy (PS or RS) is unknown. Figure 3b is the result of the comprehensive processing of the data in Figure 2a,b, indicating the impacts of decisions made by the defender with equal probability regarding the attacker’s payoffs under the two strategies (PS or RS). According to the results in Figure 3b, the attacker can determine whether to conduct detection behavior based on different penalty coefficients for the defender at different security thresholds.

3.3. Verification and Analysis of Real Networks

To verify the effectiveness of the proposed method, we conducted simulation verification on two real networks—the Email network [20] and the US airlines network [37]. The relevant network parameters are shown in Table 9.
The simulation results in Figure 4a,b have a high degree of similarity with Figure 1a, as the topologies of the Email network and US airlines network are similar to that of the scale-free network, all exhibiting obvious power-law distribution characteristics. Therefore, node value evaluation based on the topological structure yields similar relative results under the combination of preference and random strategies. Figure 4c shows the calculation results for the random network [38]. The topology of the random network follows a normal distribution, and most nodes have similar probability distributions in the roulette wheel of the preference strategy. Therefore, the similarity between the node sets of the attack and defense sides under the preference strategy is lower than that of the scale-free distribution network, and it is closer to the screening results of the random strategy. This is the reason that there is little difference in the results of strategy combinations ( R S , R S ) , ( R S , P S ) , ( P S , R S ) . This indicates that the heterogeneity of the network topology is the root cause of the attacker and defender having ranges of advantageous value coefficients in the game under different strategy combinations. Figure 5 shows the payoffs of the attacker in different scenarios. According to Figure 5c,f, this can provide a reference for the attacker to determine whether to carry out detection behavior under different combinations of security thresholds and penalty coefficients.

4. Conclusions

Critical infrastructure systems are complex systems composed of numerous interconnected components. Complex networks can effectively model the topological relationships between these components. The value of a target (node) in the network depends not only on its intrinsic monetary value but also on its structural position and functional role, as reflected by the network’s topology. However, the attacker and defender may assess the target value differently, leading to different decisions in strategic interactions.
In this paper, we simulate and analyze how differing target value assessments between the attacker and defender influence the game dynamics. Our findings reveal that both sides have distinct advantage ranges in their value coefficients. Within these advantage ranges, a player can make optimal decisions without considering the opponent’s valuation. Outside these ranges, we investigate how the attacker uses Bayesian inference on small-sample observations to deduce the defender’s strategy. The results demonstrate that (1) the defender’s penalty coefficient (measures taken by the defender after discovering the attacker’s detection behavior) and the attacker’s acceptable security threshold (risk of the attacker’s detecting behavior being recognized by the defender) significantly influence whether the attacker conducts detection actions; (2) with information about the penalty coefficient and the total defense resources, the attacker can decide whether to perform small-sample sampling, and they can select an appropriate security threshold to increase the payoffs.
This study provides a more practical approach for games under information uncertainty in undirected networks. In fact, our model and method can be applied to weighted networks by replacing node degrees with node weights. However, securing critical infrastructure against intelligent adversaries remains an open challenge. Target valuation needs to account for multiple factors beyond the topology (e.g., functional attributes, group dependencies). Additionally, game-theoretic analysis typically assumes that players understand their opponents’ information, which is often not the case in practice. Future research should focus on reducing the reliance on opponent information or substituting hard-to-obtain data with more accessible alternatives.

Author Contributions

Conceptualization, C.F.; methodology, C.F.; software, C.F.; validation, C.F. and Z.S.; formal analysis, C.F. and Z.S.; investigation, Z.S.; resources, C.F.; data curation, Z.S.; writing—original draft preparation, C.F.; writing—review and editing, C.F. and Z.S.; visualization, C.F. and Z.S.; supervision, C.F.; project administration, C.F.; funding acquisition, C.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant No. 72301292.

Data Availability Statement

The original data presented in the study are openly available in Network Repository at reference [37].

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Jusup, M.; Holme, P.; Kanazawa, K.; Takayasu, M.; Romić, I.; Wang, Z.; Geček, S.; Lipić, T.; Podobnik, B.; Wang, L.; et al. Social physics. Phys. Rep. 2022, 948, 1–148. [Google Scholar] [CrossRef]
  2. Moteff, J.D. Critical Infrastructures: Background, Policy, and Implementation; DIANE Publishing: Darby, PA, USA, 2010. [Google Scholar]
  3. Zeng, G.; Li, D.; Guo, S.; Gao, L.; Gao, Z.; Stanley, H.E.; Havlin, S. Switch between critical percolation modes in city traffic dynamics. Proc. Natl. Acad. Sci. USA 2018, 116, 201801545. [Google Scholar] [CrossRef] [PubMed]
  4. Rosas-Casals, M. Power Grids as Complex Networks: Topology and Fragility. In Proceedings of the 2010 Complexity in Engineering, Rome, Italy, 22–24 February 2010; pp. 21–26. [Google Scholar] [CrossRef]
  5. Onnela, J.P.; Saramaeki, J.; Hyvoenen, J.; Szabó, G.; Lazer, D.; Kaski, K.; Kertész, K.; Barabási, A.L. Structure and tie strengths in mobile communication networks. Proc. Natl. Acad. Sci. USA 2007, 104, 7332–7336. [Google Scholar] [CrossRef] [PubMed]
  6. Newman, M.E.J. The structure and function of complex networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef]
  7. Committee on Network Science for Future Army Applications, National Research Council. Network Science; National Academies Press: Washington, DC, USA, 2005. [Google Scholar]
  8. Sandler, T.; Siqueira, K. Games and terrorism: Recent developments. Simul. Gaming 2008, 40, 164–192. [Google Scholar] [CrossRef]
  9. Tambe, M. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  10. Hausken, K.; Welburn, J.W.; Zhuang, J. A Review of Attacker-Defender Games and Cyber Security. Games 2024, 15, 1–27. [Google Scholar] [CrossRef]
  11. Albert, R.; Jeong, H.; Barabasi, A.L. Error and attack tolerance of complex networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef]
  12. Motter, A.E.; Lai, Y.C. Cascade-Based Attacks on Complex Networks. Phys. Rev. E 2003, 66, 065102. [Google Scholar] [CrossRef]
  13. Li, M.; Liu, R.R.; Lü, L.Y.; Hu, M.B.; Xu, S.; Zhang, Y.C. Percolation on complex networks: Theory and application. Phys. Rep. 2021, 907, 1–68. [Google Scholar] [CrossRef]
  14. Verma, T.; Russmann, F.; Araújo, N.; Nagler, J.; Herrmann, H. Emergence of core-peripheries in networks. Nat. Commun. 2016, 7, 10441. [Google Scholar] [CrossRef]
  15. Hunt, K.; Zhuang, J. A review of attacker-defender games: Current state and paths forward. Eur. J. Oper. Res. 2024, 313, 401–417. [Google Scholar] [CrossRef] [PubMed]
  16. Li, Y.P.; Tan, S.Y.; Deng, Y.; Wu, J. Attacker-defender game from a network science perspective. Chaos 2018, 28, 051102. [Google Scholar] [CrossRef] [PubMed]
  17. Li, Y.; Qiao, S.; Deng, Y.; Wu, J. Stackelberg game in critical infrastructures from a network science perspective. Phys. A Stat. Mech. Its Appl. 2019, 521, 705–714. [Google Scholar] [CrossRef]
  18. He, F.; Zhuang, J.; Rao, N.S.V. Discrete game-theoretic analysis of defense in correlated cyber-physical systems. Ann. Oper. Res. 2020, 294, 741–767. [Google Scholar] [CrossRef]
  19. Shan, X.J.; Zhuang, J. A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. Reliab. Eng. Syst. Saf. 2020, 195, 106683. [Google Scholar] [CrossRef]
  20. Chaoqi, F.; Yangjun, G.; Jilong, Z.; Yun, S.; Pengtao, Z.; Tao, W. Attack-defense game for critical infrastructure considering the cascade effect. Reliab. Eng. Syst. Saf. 2021, 216, 107958. [Google Scholar] [CrossRef]
  21. Chaoqi, F.; Jilong, Z.; Chuhan, Z.; Yuan, B. Analysis of attacker-defender games on interdependent networks. Expert Syst. Appl. 2025, 285, 128057. [Google Scholar] [CrossRef]
  22. Wu, Y.; Guo, P.; Wang, Y.; Enrico, Z. Attack-defense game modeling framework from a vulnerability perspective to protect critical infrastructure systems. Reliab. Eng. Syst. Saf. 2025, 256, 110740. [Google Scholar] [CrossRef]
  23. Nagaraja, S.; Anderson, R. Dynamic topologies for robust scale-free networks. In Bio-Inspired Computing and Communication; Springer: Berlin, Germany, 2008; pp. 411–426. [Google Scholar]
  24. Domingo-Ferrer, J.; González-Nicolás, Ú. Decapitation of networks with and without weights and direction: The economics of iterated attack and defense. Comput. Netw. 2011, 55, 119–130. [Google Scholar] [CrossRef]
  25. Nystrom, J.K.; Robbins, M.J.; Deckro, R.F.; Morris, J.F. Simulating attacker and defender strategies within a dynamic game on network topology. J. Simul. 2017, 12, 1–25. [Google Scholar] [CrossRef]
  26. Dong, Y.; Liu, J.; Ren, J.; Li, Z.; Li, W. Attack and Defense Game with Intuitionistic Fuzzy Payoffs in Infrastructure Networks. Tsinghua Sci. Technol. 2025, 30, 384–401. [Google Scholar] [CrossRef]
  27. Zeng, C.; Ren, B.; Li, M.; Liu, H.; Chen, J. Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective. Chaos Interdiscip. J. Nonlinear Sci. 2019, 29, 083129. [Google Scholar] [CrossRef]
  28. Wu, D.; Yan, X.; Peng, R.; Wu, S. Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets. Reliab. Eng. Syst. Saf. 2020, 196, 106778. [Google Scholar] [CrossRef]
  29. Zhang, X.; Ding, S.; Ge, B.; Xia, B.; Pedrycz, W. Resource allocation among multiple targets for a defender-attacker game with false targets consideration. Reliab. Eng. Syst. Saf. 2021, 211, 107617. [Google Scholar] [CrossRef]
  30. Chaoqi, F.; Pengtao, Z.; Lin, Z.; Yangjun, G.; Na, D. Camouflage strategy of a Stackelberg game based on evolution rules. Chaos Solitons Fractals 2021, 153, 111603. [Google Scholar] [CrossRef]
  31. Keith, A.A.D. Counterfactual regret minimization for integrated cyber and air defense resource allocation. Eur. J. Oper. Res. 2021, 292, 95–107. [Google Scholar] [CrossRef]
  32. Zhang, X.M.; Han, Q.L.; Ge, X. A novel approach to H_∞ performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts. Automatica 2022, 136, 110010. [Google Scholar] [CrossRef]
  33. Gu, X.Q.; Zeng, C.Y.; Xiang, F.T. Applying a Bayesian Stackelberg game to secure infrastructure system: From a complex network perspective. In Proceedings of the 4th International Conference on Automation, Control and Robotics Engineering, Shenzhen, China, 19–21 July 2019; pp. 1–6. [Google Scholar]
  34. Zeng, C.Y.; Ren, B.A.; Liu, H.F.; Chen, J. Applying the Bayesian Stackelberg active deception game for securing infrastructure networks. Entropy 2019, 21, 909. [Google Scholar] [CrossRef]
  35. Holme, P.; Kim, B.J.; Yoon, C.N.; Han, S.K. Attack vulnerability of complex networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 2002, 65, 056109. [Google Scholar] [CrossRef]
  36. Barabasi, A.L.; Albert, R. Emergence of Scaling in Random Networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef]
  37. Available online: https://networkrepository.com/inf.php (accessed on 25 September 2025).
  38. Watts, D.J.; Strogatz, S.H. Collective dynamics of ‘small-world’ networks. Nature 1998, 393, 440. [Google Scholar] [CrossRef]
Figure 1. The results of attack and defense strategy combinations with different value coefficients and attack and defense decisions. ((a) is the result of attack and defense strategy combinations with different value coefficients; (b) is a schematic diagram of the area division where the attacking and defending sides make decisions).
Figure 1. The results of attack and defense strategy combinations with different value coefficients and attack and defense decisions. ((a) is the result of attack and defense strategy combinations with different value coefficients; (b) is a schematic diagram of the area division where the attacking and defending sides make decisions).
Entropy 27 01066 g001
Figure 2. The payoff relationship of the attacker under different penalty coefficients with different acceptable security thresholds. ((a) and (b), respectively, represent the payoffs of the attacker in different scenarios S Λ under the assumption of the defender adopting an RS or PS. No detection means S Λ = 1.0 ).
Figure 2. The payoff relationship of the attacker under different penalty coefficients with different acceptable security thresholds. ((a) and (b), respectively, represent the payoffs of the attacker in different scenarios S Λ under the assumption of the defender adopting an RS or PS. No detection means S Λ = 1.0 ).
Entropy 27 01066 g002
Figure 3. The payoff relationship of the attacker under different penalty coefficients. ((a) demonstrates the difference in penalty coefficient β for the attacker carrying out detection behavior under different strategies of the defender at security threshold S Λ = 0.7 ; (b) showcases the impacts of detection behavior and penalty coefficient β on the payoffs of the attacker under different security thresholds S Λ ).
Figure 3. The payoff relationship of the attacker under different penalty coefficients. ((a) demonstrates the difference in penalty coefficient β for the attacker carrying out detection behavior under different strategies of the defender at security threshold S Λ = 0.7 ; (b) showcases the impacts of detection behavior and penalty coefficient β on the payoffs of the attacker under different security thresholds S Λ ).
Entropy 27 01066 g003aEntropy 27 01066 g003b
Figure 4. The results of attack and defense strategy combinations with different value coefficients. (a,b) are the real networks—the Email network and US airlines network, respectively—and (c) is the comparative network—a random network.
Figure 4. The results of attack and defense strategy combinations with different value coefficients. (a,b) are the real networks—the Email network and US airlines network, respectively—and (c) is the comparative network—a random network.
Entropy 27 01066 g004
Figure 5. The payoff relationship of the attacker under different penalty coefficients with different acceptable security thresholds. ((a)\(d) and (b)\(e), respectively, represent the payoffs of the attacker in different scenarios S Λ under the assumption of the defender adopting an RS or PS. (c)\(f) show the payoffs of the attacker in different scenarios without considering the strategy of the defender. Among them, (ac) are the calculation results for the Email network, and (df) are the calculation results for the US airlines network).
Figure 5. The payoff relationship of the attacker under different penalty coefficients with different acceptable security thresholds. ((a)\(d) and (b)\(e), respectively, represent the payoffs of the attacker in different scenarios S Λ under the assumption of the defender adopting an RS or PS. (c)\(f) show the payoffs of the attacker in different scenarios without considering the strategy of the defender. Among them, (ac) are the calculation results for the Email network, and (df) are the calculation results for the US airlines network).
Entropy 27 01066 g005aEntropy 27 01066 g005b
Table 1. The payoff matrix of an attack and defense game ( θ = 0.8 ).
Table 1. The payoff matrix of an attack and defense game ( θ = 0.8 ).


Attacker
Defender
Random strategyPreference strategy
Random strategy985.6, −985.61064.7, −1064.7
Preference strategy869.3, −869.3465.1, −465.1
Table 2. The payoff matrix of an attack and defense game ( θ = 1.0 ).
Table 2. The payoff matrix of an attack and defense game ( θ = 1.0 ).


Attacker
Defender
Random strategyPreference strategy
Random strategy1429.1, −1429.11470.4, −1470.4
Preference strategy1465.9, −1465.9668.6, −668.6
Table 3. The payoff matrix of an attack and defense game ( θ = 1.2 ).
Table 3. The payoff matrix of an attack and defense game ( θ = 1.2 ).


Attacker
Defender
Random strategyPreference strategy
Random strategy2292.2, −2292.21971.7, −1971.7
Preference strategy 2815.5, −2815.51005.8, −1005.8
Table 4. The payoff matrix of an attack and defense game ( θ a = 0.88 , θ d = 0.8 ).
Table 4. The payoff matrix of an attack and defense game ( θ a = 0.88 , θ d = 0.8 ).


Attacker
Defender
Random strategyPreference strategy
Random strategy1142.8, −985.61233.3, −1064.7
Preference strategy 1062, −869.3549.4, −465.1
Table 5. The payoff matrix of an attack and defense game ( θ a = 1.2 , θ d = 0.8 ).
Table 5. The payoff matrix of an attack and defense game ( θ a = 1.2 , θ d = 0.8 ).


Attacker
Defender
Random strategyPreference strategy
Random strategy2292.2, −985.61971.7, −1064.7
Preference strategy 2815.5, −869.31005.8, −465.1
Table 6. The payoff matrix of an attack and defense game ( θ a = 0.88 , θ d = 1.12 ).
Table 6. The payoff matrix of an attack and defense game ( θ a = 0.88 , θ d = 1.12 ).


Attacker
Defender
Random strategyPreference strategy
Random strategy1142.8, −1887.51233.3, −1744.3
Preference strategy 1062, −2162.5549.4, −867.7
Table 7. The payoff matrix of an attack and defense game ( θ a = 1.2 , θ d = 1.12 ).
Table 7. The payoff matrix of an attack and defense game ( θ a = 1.2 , θ d = 1.12 ).


Attacker
Defender
Random strategyPreference strategy
Random strategy2292.2, −1887.51971.7, −1744.3
Preference strategy 2815.5, −2162.51005.8, −867.7
Table 8. Sample sizes and defense count ranges obtained from simulations.
Table 8. Sample sizes and defense count ranges obtained from simulations.
Type of NetworkRS/PSSSample Size (TT)Defended Count (Td)
Scale-free networkRS0.712.041.695
0.519.172.755
0.326.943.535
PS0.717.832.614
0.528.373.141
0.338.83.88
Table 9. Network parameter settings.
Table 9. Network parameter settings.
Network TypeN<k>TCA and TCDPRSPPS
Email Network11339.6245000.40380.1832
US Airlines Network33212.8118000.380.102
Random Network10006.6227000.40380.377
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fu, C.; Shi, Z. Analysis of Complex Network Attack and Defense Game Strategies Under Uncertain Value Criterion. Entropy 2025, 27, 1066. https://doi.org/10.3390/e27101066

AMA Style

Fu C, Shi Z. Analysis of Complex Network Attack and Defense Game Strategies Under Uncertain Value Criterion. Entropy. 2025; 27(10):1066. https://doi.org/10.3390/e27101066

Chicago/Turabian Style

Fu, Chaoqi, and Zhuoying Shi. 2025. "Analysis of Complex Network Attack and Defense Game Strategies Under Uncertain Value Criterion" Entropy 27, no. 10: 1066. https://doi.org/10.3390/e27101066

APA Style

Fu, C., & Shi, Z. (2025). Analysis of Complex Network Attack and Defense Game Strategies Under Uncertain Value Criterion. Entropy, 27(10), 1066. https://doi.org/10.3390/e27101066

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop