Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment

Document Type : Original Article

Authors

1 PhD student, Ferdowsi University, Mashhad, Iran

2 Associate Professor, Ferdowsi University, Mashhad, Iran

3 Professor, Ferdowsi University, Mashhad, Iran

Abstract

Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced state variables, threat and tolerability. A Lanchester-type equations is used to present the dynamics of threat-tolerability due to contradictory behavior of insider and adversary. The main advantage of the proposed method is that it could help to optimize the two side player’s strategies and actions during the game period based on threat-tolerability dynamic. As the game progresses each player observes game position, i.e., the threat level for targets and tolerability level for insider and tries to schedule its resources to influence final game’ profits. Player could resolve offensive, defensive and maneuvering share on total available resources. Deciding on extent resources used for each strategy can be considered as control input for each player to change game’s profits. A simple tracking scenario is used to demonstrate how threat and tolerability dynamics could be used as a tool for optimal resource assignment.

Keywords


Smiley face

[1]    A. Benaskeur, "Combat Resource Management (11bm) Applied Research Project (ARP)," DEFENCE RESEARCH AND DEVELOPMENT CANADA VALCARTIER (QUEBEC)2009.
[2]    D. Akselrod, T. Lang, M. McDonald, and T. Kirubarajan, "Markov decision process-based resource and information management for sensor networks," in Sensor Networks: Springer, 2010, pp. 167-216.
[3]    B. Kovalerchuk and L. Perlovsky, "Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models," in Recent Advances in Computational Intelligence in Defense and Security: Springer, 2016, pp. 695-726.
[4]    T. H. de Groot, O. A. Krasnov, and A. G. J. I. S. J. Yarovoy, "Mission-driven resource management for reconfigurable sensing systems," vol. 12, no. 2, pp. 1531-1542, 2018.
[5]    S. F. Page, J. P. Oldfield, and P. Thomas, "Towards integrated threat assessment and sensor management: Bayesian multi-target search," in Multisensor Fusion and Integration for Intelligent Systems (MFI), 2016 IEEE International Conference on, 2016, pp. 44-51: IEEE.
[6]    S. Page et al., "Threat assessment and sensor management in a modular architecture," in Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII, 2016, vol. 9995, p. 99950W: International Society for Optics and Photonics.
[7]    F. Katsilieris, H. Driessen, and A. Yarovoy, "Threat-based sensor management for joint target tracking and classification," in Information Fusion (Fusion), 2015 18th International Conference on, 2015, pp. 435-442: IEEE.
[8]    S. kamelian, n. Pariz, and A. Karimpor, "Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences %J Journal of Command and Control," (in eng), Research vol. 3, no. 1, pp. 1-24, 2019.
[9]    F. Katsilieris, "Sensor management for surveillance and tracking: An operational perspective," 2015.
[10]         F. Katsilieris, Y. Boers, and H. Driessen, "Optimal search: A practical interpretation of information-driven sensor management," in FUSION, 2012, pp. 439-446.
[11]         N. Okello and G. Thoms, "Threat assessment using Bayesian networks," in Proceedings of the 6th International Conference on Information fusion, 2003, pp. 1102-1109.
[12]         Y. Hou, W. Guo, and Z. Zhu, "Threat assessment based on variable parameter dynamic Bayesian network," in Proceedings of the 29th Chinese Control Conference, 2010, pp. 1230-1235: IEEE.
[13]         W. Mei, "Air Defense Threat Evaluation using Fuzzy Bayesian Classifier," in IJCCI, 2013, pp. 227-232.
[14]         S. Kumar and B. K. J. P. T. Tripathi, "Modelling of threat evaluation for dynamic targets using bayesian network approach," vol. 24, pp. 1268-1275, 2016.
[15]         A. N. Costa and P. C. Costa, "Simulation-based air mission evaluation with Bayesian threat assessment for opposing forces," in Disciplinary Convergence in Systems Engineering Research: Springer, 2018, pp. 281-295.
[16]         M. Yadegary, and S. A. Seideyn, "Threat evaluation using joint fuzzy and probablistic network based on rules," in Electronic and Cyber Defense Quarterly, 2019, vol 6, Issue 4. (in persian)
[17]         M. Nilsson, J. Van Laere, T. Ziemke, and J. Edlund, "Extracting rules from expert operators to support situation awareness in maritime surveillance," in 2008 11th International conference on information fusion, 2008, pp. 1-8: IEEE.
[18]         W. Elahsoumi, I. Boujelben, and I. Keskes, "Rule Based Method for Terrorism, Violence and Threat Classification: Application to Arabic Tweets," in International Conference on Automatic Processing of Natural-Language Electronic Texts with NooJ, 2019, pp. 209-219: Springer.
[19]         Y. Liang, J. Lee, B. Hong, and W. Kim, "Design and Implementation of Rule-based CEP for Threat Detection and Defense," in 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (INISTA), 2019, pp. 1-6: IEEE.
[20]         [20]         A. N. Steinberg, "A model for threat assessment," in Fusion Methodologies in Crisis Management: Springer, 2016, pp. 313-340.
[21]         A. N. J. H. o. m. d. f. t. Steinberg and practice, "Foundations of situation and threat assessment," pp. 437-501, 2009.
[22]         A. N. Steinberg, "Threat assessment technology development," in International and Interdisciplinary Conference on Modeling and Using Context, 2005, pp. 490-500: Springer.
[23]         M. Oxenham, "Enhancing situation awareness for air defence via automated threat analysis," in Proceedings of the Sixth International Conference on Information Fusion, 2003, vol. 2, pp. 1086-1093.
[24]         M. G. Oxenham, "Using contextual information for extracting air target behavior from sensor tracks," in Signal Processing, Sensor Fusion, and Target Recognition XII, 2003, vol. 5096, pp. 482-493: International Society for Optics and Photonics.
[25]         H. Irandoust, A. Benaskeur, F. Kabanza, and P. Bellefeuille, "A mixed-initiative advisory system for threat evaluation," in Proceedings of the 15th International Command and Control Research and Technology Symposium: The Evolution of C, 2010, vol. 2, pp. 2-3.
[26]         M. J. Liebhaber, D. Kobus, and B. J. S. Feher, "Studies of US Navy air defense threat assessment: Cues, information order, and impact of conflicting data," 2002.
[27]         R. Roux and J. H. J. O. van Vuuren, "Real-time threat evaluation in a ground based air defence environment," vol. 24, no. 1, pp. 75-101, 2008.
[28]         M. Yoon, J. Park, and J. J. I. J. o. C. Yi, "An Effective Threat Evaluation Algorithm for Multiple Ground Targets in Multi-target and Multi-weapon Environments," vol. 15, no. 1, 2019.
[29]         I. Dimitrijević and N. Stekić, "Intelligence Analysis Models for Asymmetric Threats," Strategic Research Institute & National Defence School, 2018.
[30]         T. Hamilton and R. Mesic, "A simple game-theoretic approach to suppression of enemy defenses and other time critical target analyses," RAND CORP SANTA MONICA CA2004.
[31]         E. G. Little and G. L. Rogova, "An ontological analysis of threat and vulnerability," in 2006 9th International Conference on Information Fusion, 2006, pp. 1-8: IEEE.
[32]         S. M. R. Mousavi, and H. Alimohammadi, "Optimized allocation for radar jamming resources.," in Electronic and Cyber Defense Quarterly, 2015, vol 3, Issue 7. (in persian)
[33]         N. Le Guillarme, A.-I. Mouaddib, S. Gatepaille, and A. Bellenger, "Adversarial intention recognition as inverse game-theoretic planning for threat assessment," in 2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI), 2016, pp. 698-705: IEEE.
[34]         G. Chen, D. Shen, C. Kwan, J. B. Cruz, and M. Kruger, "Game theoretic approach to threat prediction and situation awareness," in 2006 9th International Conference on Information Fusion, 2006, pp. 1-8: IEEE.
[35]         J. Roy, S. Paradis, and M. Allouche, "Threat evaluation for impact assessment in situation analysis systems," in Signal processing, sensor fusion, and target recognition XI, 2002, vol. 4729, pp. 329-341: International Society for Optics and Photonics.
[36]         N. Le Guillarme, "A Game-Theoretic Planning Framework for Intentional Threat Assessment," Thèse de doctorat, Université de Caen, 2016.
[37]         M. J. Liebhaber and B. Feher, "Air threat assessment: Research, model, and display guidelines," SPACE AND NAVAL WARFARE SYSTEMS COMMAND SAN DIEGO CA2002.
[38]         S. Blackman and R. J. A. h. Popoli, "Design and Analysis of Modern Tracking Systems (Artech House Radar Library)," 1999.
[39]         D. Bauso, Game theory with engineering applications. SIAM, 2016.
[40]         M. Kress, "Lanchester Models for Irregular Warfare," vol. 8, no. 5, p. 737, 2020.
[41]         J. G. Taylor, "Lanchester-type models of warfare and optimal control," vol. 21, no. 1, pp. 79-106, 1974.
[42]         S. Jørgensen and S. Sigué, "A lanchester-type dynamic game of advertising and pricing," in Games in Management Science: Springer, 2020, pp. 1-14.
[43]         S. Jørgensen and S.-P. Sigué, "Defensive, Offensive, and Generic Advertising in a Lanchester Model with Market Growth," Dynamic Games and Applications, vol. 5, no. 4, pp. 523-539, 2015/12/01 2015.
[44]         G. M. J. M. L. Erickson, "Offensive and defensive marketing: Closed-loop duopoly strategies," pp. 285-295, 1993.
[45]         G. J. J. o. E. D. Sorger and Control, "Competitive dynamic advertising: A modification of the Case game," vol. 13, no. 1, pp. 55-80, 1989.
Volume 11, Issue 2 - Serial Number 42
No. 42, Summer
July 2023
Pages 15-29
  • Receive Date: 07 December 2021
  • Revise Date: 22 December 2022
  • Accept Date: 17 May 2023
  • Publish Date: 22 June 2023