{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:39:17Z","timestamp":1760150357750,"version":"build-2065373602"},"reference-count":41,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T00:00:00Z","timestamp":1700265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Network attack and defence games are gradually becoming a new approach through which to study the protection of infrastructure networks such as power grids and transportation networks. Uncertainty factors, such as the subjective decision preferences of attackers and defenders, are not considered in existing attack and defence game studies for infrastructure networks. In this paper, we introduce, respectively, the attacker\u2019s and defender\u2019s expectation value, rejection value, and hesitation degree of the target, as well as construct an intuitionistic fuzzy goal-based attack and defence game model for infrastructure networks that are based on the maximum connectivity slice size, which is a network performance index. The intuitionistic fuzzy two-player, zero-sum game model is converted into a linear programming problem for solving, and the results are analysed to verify the applicability and feasibility of the model proposed in this paper. Furthermore, different situations, such as single-round games and multi-round repeated games, are also considered. The experimental results show that, when attacking the network, the attacker rarely attacks the nodes with higher importance in the network, but instead pays more attention to the nodes that are not prominent in the network neutrality and median; meanwhile, the defender is more inclined to protect the more important nodes in the network to ensure the normal performance of the network.<\/jats:p>","DOI":"10.3390\/e25111558","type":"journal-article","created":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T07:33:18Z","timestamp":1700292798000},"page":"1558","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks"],"prefix":"10.3390","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3475-0584","authenticated-orcid":false,"given":"Zhe","family":"Li","sequence":"first","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9920-8113","authenticated-orcid":false,"given":"Yibo","family":"Dong","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Jiaqi","family":"Ren","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Weili","family":"Li","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,11,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"033027","DOI":"10.1088\/1367-2630\/11\/3\/033027","article-title":"Evolution of cooperation on scale-free networks subject to error and attack","volume":"11","author":"Perc","year":"2009","journal-title":"New J. Phys."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2023.03.005","article-title":"Signal propagation in complex networks","volume":"1017","author":"Ji","year":"2023","journal-title":"Phys. Rep."},{"key":"ref_3","unstructured":"Li, Y.P. (2018). Modelling and Analysis of Attacker\u2013defender Game in Complex Networks. [Master\u2019s Thesis, National University of Defense Technology]."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2601","DOI":"10.1109\/TNSE.2021.3100801","article-title":"A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network","volume":"8","author":"Chen","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"100583","DOI":"10.1016\/j.ijcip.2022.100583","article-title":"Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes","volume":"40","author":"Wang","year":"2023","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.1111\/itor.12900","article-title":"A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information","volume":"28","author":"Li","year":"2021","journal-title":"Int. Trans. Oper. Res."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"105900","DOI":"10.1016\/j.ress.2017.07.003","article-title":"Using game theory to optimize the allocation of defensive resources on a city scale to protect chemical facilities against multiple types of attackers","volume":"191","author":"Feng","year":"2019","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"107617","DOI":"10.1016\/j.ress.2021.107617","article-title":"Resource allocation among multiple targets for a defender-attacker game with false targets consideration","volume":"211","author":"Zhang","year":"2021","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_9","first-page":"290","article-title":"On random graphs","volume":"6","year":"1959","journal-title":"Publ. Math."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of \u2018small-world\u2019 networks","volume":"393","author":"Watts","year":"1998","journal-title":"Nature"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of Scaling in Random Networks","volume":"286","author":"Albert","year":"1999","journal-title":"Science"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1126\/science.1173299","article-title":"Scale-Free Networks: A Decade and Beyond","volume":"325","year":"2009","journal-title":"Science"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1038\/s42254-023-00566-3","article-title":"Controlling complex networks with complex nodes","volume":"5","author":"Liu","year":"2023","journal-title":"Nat. Rev. Phys."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"e1371","DOI":"10.7717\/peerj-cs.1371","article-title":"Models of similarity in complex networks","volume":"9","author":"Shvydun","year":"2023","journal-title":"PeerJ Comput. Sci."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"119226","DOI":"10.1016\/j.ins.2023.119226","article-title":"An efficient complex network embedding model for hierarchical networks","volume":"643","author":"Huang","year":"2023","journal-title":"Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"187402","DOI":"10.1103\/PhysRevLett.130.187402","article-title":"Searching for Key Cycles in a Complex Network","volume":"130","author":"Jiang","year":"2023","journal-title":"Phys. Rev. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1111\/j.1539-6924.2010.01492.x","article-title":"How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts","volume":"31","author":"Brown","year":"2011","journal-title":"Risk Anal."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1287\/inte.1060.0252","article-title":"Defending Critical Infrastructure","volume":"36","author":"Brown","year":"2006","journal-title":"Interfaces"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"051102","DOI":"10.1063\/1.5029343","article-title":"Attacker-defender game from a network science perspective","volume":"28","author":"Li","year":"2018","journal-title":"Chaos Interdiscip. J. Nonlinear Sci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1630","DOI":"10.1007\/s11424-019-7420-0","article-title":"Attack and Defense Strategies in Complex Networks Based on Game Theory","volume":"32","author":"Li","year":"2019","journal-title":"J. Syst. Sci. Complex."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"56214","DOI":"10.1109\/ACCESS.2018.2872767","article-title":"Which Targets to Protect in Critical Infrastructures\u2014A Game-Theoretic Solution from a Network Science Perspective","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"111603","DOI":"10.1016\/j.chaos.2021.111603","article-title":"Camouflage strategy of a Stackelberg game based on evolution rules","volume":"153","author":"Chaoqi","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Gu, X., Zeng, C., and Xiang, F. (2019, January 19\u201321). Applying a Bayesian Stackelberg game to secure infrastructure system: From a complex network perspective. Proceedings of the 2019 4th International Conference on Automation, Control and Robotics Engineering, Shenzhen, China.","DOI":"10.1145\/3351917.3351924"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2537","DOI":"10.1080\/00207543.2020.1735661","article-title":"Bayesian Stackelberg game model for water supply networks against interdictions with mixed strategies","volume":"59","author":"Jiang","year":"2021","journal-title":"Int. J. Prod. Res."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"083129","DOI":"10.1063\/1.5100849","article-title":"Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective","volume":"29","author":"Zeng","year":"2019","journal-title":"Chaos Interdiscip. J. Nonlinear Sci."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Zeng, C., Ren, B., Liu, H., and Chen, J. (2019). Applying the Bayesian Stackelberg Active Deception Game for Securing Infrastructure Networks. Entropy, 21.","DOI":"10.3390\/e21090909"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Thompson, K.H., and Tran, H.T. (2018, January 23\u201324). Application of a Defender-Attacker-Defender Model to the U.S. Air Transportation Network. Proceedings of the 2018 IEEE International Symposium on Technologies for Homeland Security (HST), Woburn, MA, USA.","DOI":"10.1109\/THS.2018.8574199"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1503","DOI":"10.1109\/TITS.2019.2909177","article-title":"Operational Perspectives into the Resilience of the U.S. Air Transportation Network against Intelligent Attacks","volume":"21","author":"Thompson","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1007\/s12667-019-00345-z","article-title":"Cost-effective power grid protection through defender\u2013attacker\u2013defender model with corrective network topology control","volume":"11","author":"Yuan","year":"2020","journal-title":"Energy Syst."},{"key":"ref_30","first-page":"2965","article-title":"Novel improved chaotic elephant herding optimization algorithm-based optimal defense resource allocation in cyber-physical systems","volume":"27","author":"Abidi","year":"2023","journal-title":"Soft Comput.-Fusion Found. Methodol. Appl."},{"key":"ref_31","first-page":"5199","article-title":"A two-step trace model for the detection of UVI attacks against power grids in the wireless network","volume":"25","author":"Benisha","year":"2021","journal-title":"Soft Comput.-Fusion Found. Methodol. Appl."},{"key":"ref_32","first-page":"1026","article-title":"Research on network protection strategy of associated infrastructure based on incomplete information game","volume":"42","author":"Li","year":"2022","journal-title":"Syst. Eng.-Theory Pract."},{"key":"ref_33","first-page":"608","article-title":"Active defense strategy selection of military information network based on incomplete information game","volume":"41","author":"Wang","year":"2020","journal-title":"Acta Armamentarii"},{"key":"ref_34","unstructured":"Jiang, M.T. (2022). Research on Network Defense Resource Scheduling Strategy of Critical Infrastructure Systems Based on Game Theory. [Master\u2019s Thesis, Hangzhou Dianzi University]."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"104820","DOI":"10.1016\/j.knosys.2019.06.028","article-title":"Generalizing identity-based string comparison metrics: Framework and techniques","volume":"187","author":"Cauteruccio","year":"2020","journal-title":"Knowl.-Based Syst."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/S0165-0114(86)80034-3","article-title":"Intuitionistic fuzzy sets","volume":"20","author":"Atanassov","year":"1986","journal-title":"Fuzzy Sets Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/S0165-0114(96)00144-3","article-title":"On a canonical representation of fuzzy numbers","volume":"93","author":"Delgado","year":"1998","journal-title":"Fuzzy Sets Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/S0165-0114(96)00009-7","article-title":"Optimization in an intuitionistic fuzzy environment","volume":"86","author":"Angelov","year":"1997","journal-title":"Fuzzy Sets Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s10700-012-9123-z","article-title":"Application of linear programming with I-fuzzy sets to matrix games with I-fuzzy goals","volume":"11","author":"Aggarwal","year":"2012","journal-title":"Fuzzy Optim. Decis. Mak."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1080\/18756891.2013.761781","article-title":"Linear programming approach to matrix games with intuitionistic fuzzy goals","volume":"6","author":"Nan","year":"2013","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1142\/S0218488509006157","article-title":"A nonlinear programming approach to matrix games with payoffs of atanassov\u2019s intuitionistic fuzzy sets","volume":"17","author":"Li","year":"2009","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/11\/1558\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:25:22Z","timestamp":1760131522000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/11\/1558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,18]]},"references-count":41,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2023,11]]}},"alternative-id":["e25111558"],"URL":"https:\/\/doi.org\/10.3390\/e25111558","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2023,11,18]]}}}