Saturday, December 21, 2019
The Adversarial Risk Analysis Approach - 1709 Words
Source: Figure 3 (Rios and Insua, 2012) Source: Figure 4 (Rios and Insua, 2012) Source: Figure 5 (Rios and Insua, 2012) Source: Figure 6 (Rios and Insua, 2012) The Adversarial Risk Analysis Approach relaxes the common knowledge assumption in order to make this model more realistic. If the Defenderââ¬â¢s decision problem is a standard decision analysis problem, shown in Figure 3, with the Attackerââ¬â¢s decision node regarded as a random variable. Then her decision tree in Figure 4 illustrates the uncertainty about the Attackerââ¬â¢s decision by replacing A (in a square, Fig 3) with A (in a circle, Fig 3). (Rios and Insua 2012) Once the Defender has already assessed pD(S | d, a, v) and uD(d, s, v), she needs pD(A | d), which isâ⬠¦show more contentâ⬠¦The Defenderââ¬â¢s decision is illustrated as a random variable as it is not under control in the Attackerââ¬â¢s analysis. The arrow from D (in a circle, Fig 5) to A (in a square, Fig 5) in the influence diagram demonstrates that he will know the Defenderââ¬â¢s decision while he has to decide. The Defenderââ¬â¢s private information v, is not known by the Attacker, therefore his uncertainty is demonstrated through a probability distribution pA(V), illustrating the Attackerââ¬â¢s previous beliefs about the Defenderââ¬â¢s private information. Assuming the Defender analyses the Attackerââ¬â¢s decision, knowing that he is an expected utility maximiser and uses Bayesââ¬â¢s rule to discover about the Defenderââ¬â¢s private information from monitoring of her defence decision. Consequently, the arrow in the influence diagram from V (in a circle, Fig 5) to D (in a circle, Fig 5), represents probabilistic dependence, is to be inverted to acquire the Attackerââ¬â¢s subsequent beliefs about v: pA(V|D=d), yet to acquire this it is needed to assess pA(D|v). (Rios and Insua 2012) If the Defender knew the Attackerââ¬â¢s utility function uA(a,s,v) and the probabilities pA(S|d,a,v) and pA(V|d), she could predict his decision a*(d) for any d âËË D by solving backwards the tree in Figure 6, followed by computing his expected utility ÃËA. - Compute at chance node S: ÃËA(d,a,v) for each (d,a,v) as in Equation (2). - Compute for
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.