{"title":"受Chakravyuh启发的多层防御的动态优化","authors":"Kishore Dutta","doi":"10.1016/j.ijcip.2025.100794","DOIUrl":null,"url":null,"abstract":"<div><div>As adversaries grow more sophisticated, critical infrastructure demands defense systems that not only react but also learn and adapt dynamically. This work introduces a novel reinforcement learning framework inspired by the ancient Indian <em>Chakravyuh</em> formation, integrating Q-learning, Markov decision processes, and network optimization to model multi-layered security under uncertainty. The system enables attackers to attempt sequential node breaches while defenders deploy adaptive traps and allocate resources through quantifiable metrics including ROI-driven investment and critical node vulnerability analysis. Results demonstrate both vulnerabilities and strengths: universal Layer 0 breaches occur (Mean Time to Breach = 52 episodes) due to uneven resource allocation quantified by a high Gini coefficient of 0.712. Despite this vulnerability, deeper layers remain highly resilient — with over 90% of attacks halted by Layer 1 and fewer than 5% of episodes resulting in breaches beyond Layer 2. Trap deployment achieves high efficiency, with approximately 82% of traps being triggered, especially during early episodes. However, efficiency declines over time as attackers adapt and avoid traps. Resource allocation patterns scale linearly, ensuring sustainable defense operations. These findings validate how the fusion of <em>Chakravyuh</em> strategy with modern reinforcement learning creates an adaptive defense system, simultaneously exposing perimeter vulnerabilities for targeted reinforcement and demonstrating effective deeper-layer security through optimized stochastic policies.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"51 ","pages":"Article 100794"},"PeriodicalIF":5.3000,"publicationDate":"2025-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic optimization of multi-layered defenses inspired by Chakravyuh\",\"authors\":\"Kishore Dutta\",\"doi\":\"10.1016/j.ijcip.2025.100794\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>As adversaries grow more sophisticated, critical infrastructure demands defense systems that not only react but also learn and adapt dynamically. This work introduces a novel reinforcement learning framework inspired by the ancient Indian <em>Chakravyuh</em> formation, integrating Q-learning, Markov decision processes, and network optimization to model multi-layered security under uncertainty. The system enables attackers to attempt sequential node breaches while defenders deploy adaptive traps and allocate resources through quantifiable metrics including ROI-driven investment and critical node vulnerability analysis. Results demonstrate both vulnerabilities and strengths: universal Layer 0 breaches occur (Mean Time to Breach = 52 episodes) due to uneven resource allocation quantified by a high Gini coefficient of 0.712. Despite this vulnerability, deeper layers remain highly resilient — with over 90% of attacks halted by Layer 1 and fewer than 5% of episodes resulting in breaches beyond Layer 2. Trap deployment achieves high efficiency, with approximately 82% of traps being triggered, especially during early episodes. However, efficiency declines over time as attackers adapt and avoid traps. Resource allocation patterns scale linearly, ensuring sustainable defense operations. These findings validate how the fusion of <em>Chakravyuh</em> strategy with modern reinforcement learning creates an adaptive defense system, simultaneously exposing perimeter vulnerabilities for targeted reinforcement and demonstrating effective deeper-layer security through optimized stochastic policies.</div></div>\",\"PeriodicalId\":49057,\"journal\":{\"name\":\"International Journal of Critical Infrastructure Protection\",\"volume\":\"51 \",\"pages\":\"Article 100794\"},\"PeriodicalIF\":5.3000,\"publicationDate\":\"2025-08-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Critical Infrastructure Protection\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1874548225000551\",\"RegionNum\":3,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Critical Infrastructure Protection","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874548225000551","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Dynamic optimization of multi-layered defenses inspired by Chakravyuh
As adversaries grow more sophisticated, critical infrastructure demands defense systems that not only react but also learn and adapt dynamically. This work introduces a novel reinforcement learning framework inspired by the ancient Indian Chakravyuh formation, integrating Q-learning, Markov decision processes, and network optimization to model multi-layered security under uncertainty. The system enables attackers to attempt sequential node breaches while defenders deploy adaptive traps and allocate resources through quantifiable metrics including ROI-driven investment and critical node vulnerability analysis. Results demonstrate both vulnerabilities and strengths: universal Layer 0 breaches occur (Mean Time to Breach = 52 episodes) due to uneven resource allocation quantified by a high Gini coefficient of 0.712. Despite this vulnerability, deeper layers remain highly resilient — with over 90% of attacks halted by Layer 1 and fewer than 5% of episodes resulting in breaches beyond Layer 2. Trap deployment achieves high efficiency, with approximately 82% of traps being triggered, especially during early episodes. However, efficiency declines over time as attackers adapt and avoid traps. Resource allocation patterns scale linearly, ensuring sustainable defense operations. These findings validate how the fusion of Chakravyuh strategy with modern reinforcement learning creates an adaptive defense system, simultaneously exposing perimeter vulnerabilities for targeted reinforcement and demonstrating effective deeper-layer security through optimized stochastic policies.
期刊介绍:
The International Journal of Critical Infrastructure Protection (IJCIP) was launched in 2008, with the primary aim of publishing scholarly papers of the highest quality in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology, law and policy to craft sophisticated yet practical solutions for securing assets in the various critical infrastructure sectors. These critical infrastructure sectors include: information technology, telecommunications, energy, banking and finance, transportation systems, chemicals, critical manufacturing, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, nuclear reactors, materials and waste, postal and shipping, and government facilities. Protecting and ensuring the continuity of operation of critical infrastructure assets are vital to national security, public health and safety, economic vitality, and societal wellbeing.
The scope of the journal includes, but is not limited to:
1. Analysis of security challenges that are unique or common to the various infrastructure sectors.
2. Identification of core security principles and techniques that can be applied to critical infrastructure protection.
3. Elucidation of the dependencies and interdependencies existing between infrastructure sectors and techniques for mitigating the devastating effects of cascading failures.
4. Creation of sophisticated, yet practical, solutions, for critical infrastructure protection that involve mathematical, scientific and engineering techniques, economic and social science methods, and/or legal and public policy constructs.