IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v13y2025i17p2697-d1729922.html
   My bibliography  Save this article

Playing Repeated Stochastic Security Games Against Non-Stationary Attackers

Author

Listed:
  • Ling Chen

    (School of Mathematics and Statistics, Taiyuan Normal University, Jinzhong 030619, China)

  • Runfa Zhang

    (School of Automation and Software Engineering, Shanxi University, Taiyuan 030013, China
    Hubei Key Laboratory of Applied Mathematics, Hubei University, Wuhan 430062, China)

Abstract

This paper investigates a repeated stochastic security game against a non-stationary attacker. Most of the work to date assumes that the defender has a repeated interaction with a fixed type of attacker. In fact, the defender is more likely to encounter changing attackers in multi-round games. A defender faces an attacker whose identity is unknown. The attacker type changes stochastically over time and the defender cannot detect when these changes occur. We adopt the BPR (Bayesian Policy Reuse) algorithm to detect the switches of the attacker, and the defender could play the accurate policy correspondingly. The experiment results show that BPR algorithm could accurately detect switches and help the defender gain more utilities than the EXP3-S algorithm.

Suggested Citation

  • Ling Chen & Runfa Zhang, 2025. "Playing Repeated Stochastic Security Games Against Non-Stationary Attackers," Mathematics, MDPI, vol. 13(17), pages 1-13, August.
  • Handle: RePEc:gam:jmathe:v:13:y:2025:i:17:p:2697-:d:1729922
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/13/17/2697/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/13/17/2697/
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:13:y:2025:i:17:p:2697-:d:1729922. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.