Skip to main content
Log in

Individual versus overarching protection against strategic attacks

  • General Paper
  • Published:
Journal of the Operational Research Society

Abstract

This article considers a system consisting of elements that can be protected and attacked individually and collectively. To destroy the system, the attacker must always penetrate/destroy the collective (overarching) protection. In the case of the parallel system, it also must destroy all elements, whereas in the case of the series system, it must destroy at least one element. Both the attacker and the defender have limited resources and can distribute these freely between the two types of protection. The attacker chooses the resource distribution and the number of attacked elements to maximize the system destruction probability. The defender chooses the resource distribution and the number of protected elements to minimize the system destruction probability. The bi-contest minmax game is formulated and its analytical solutions are presented and analysed. The asymptotical analysis of the solutions is presented. The influence of the game parameters on the optimal defence and attack strategies is discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8

Similar content being viewed by others

References

  • Avenhaus R and Canty M (2005). Playing for time: A sequential inspection game. European Journal of Operational Research 167 (2): 475–492.

    Article  Google Scholar 

  • Azaiez N and Bier VM (2007). Optimal resource allocation for security in reliability systems. European Journal of Operational Research 181: 773–786.

    Article  Google Scholar 

  • Bier VM, Haphuriwat N, Menoyo J, Zimmerman R and Culpen AM (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis 28 (3): 763–770.

    Article  Google Scholar 

  • Bier VM, Nagaraj A and Abhichandani V (2005). Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety 87: 315–323.

    Article  Google Scholar 

  • Boros E, Fedzhora L, Kantor P, Saeger K and Stroud P (2009). A large-scale linear programming model for finding optimal container inspection strategies. Naval Research Logistics 56 (5): 404–420.

    Article  Google Scholar 

  • Brown GG, Carlyle WM, Salmerón J and Wood K (2006). Defending critical infrastructure. Interfaces 36 (6): 530–544.

    Article  Google Scholar 

  • Cox LA (2009). Making telecommunications networks resilient against terrorist attacks (Chapter 8). In: Bier VM, Azaiez MN (eds). Game Theoretic Risk Analysis of Security Threats. Springer: New York, pp 175–198.

    Chapter  Google Scholar 

  • Golalikhani M and Zhuang J (2011). Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis 31 (4): 533–547.

    Article  Google Scholar 

  • Haphuriwat N and Bier VM (2009). Tradeoffs between target hardening and overarching protection. INFORMS Annual Meeting. San Diego, CA, 11–14 October 2009.

  • Haphuriwat N and Bier VM (2010). Tradeoffs between target hardening and overarching protection. PhD Thesis, University of Wisconsin-Madison.

  • Korczak E and Levitin G (2007). Survivability of systems under multiple factor impact. Reliability Engineering & System Safety 92 (2): 269–274.

    Article  Google Scholar 

  • Korczak E, Levitin G and Ben Haim H (2005). Survivability of series-parallel systems with multilevel protection. Reliability Engineering & System Safety 90 (1): 45–54.

    Article  Google Scholar 

  • Levitin G (2009). Optimal distribution of constrained resources in bi-contest detection-impact game. International Journal of Performability Engineering 5 (1): 45–54.

    Google Scholar 

  • Levitin G and Hausken K (2009a). Intelligence and impact contests in systems with fake targets. Defense and Security Analysis 25 (2): 157–173.

    Article  Google Scholar 

  • Levitin G and Hausken K (2009b). Intelligence and impact contests in systems with redundancy, false targets, and partial protection. Reliability Engineering & System Safety 94 (12): 1927–1941.

    Article  Google Scholar 

  • McLay LA, Lloyd JD and Niman E (2011). Interdicting nuclear material on cargo containers using knapsack problem models. Annals of Operations Research 33 (9): 747–759.

    Google Scholar 

  • Powell R (2007). Defending against terrorist attacks with limited resources. American Political Science Review 101 (3): 527–541.

    Article  Google Scholar 

  • Skaperdas S (1996). Contest success functions. Economic Theory 7: 283–290.

    Article  Google Scholar 

  • Tullock G. (1980). Efficient rent-seeking. In: Buchanan JM, Tollison RD and Tullock G (eds). Toward a Theory of the Rent-seeking Society. Texas A. & M. University Press, College Station, pp 97–112.

    Google Scholar 

  • Zhuang J and Bier VM (2007). Balancing terrorism and natural disasters—Defensive strategy with endogenous attacker effort. Operations Research 55 (5): 976–991.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K Hausken.

Appendix

Appendix

Theorem

  • Let

    for differentiable F and G, and (X *, x *) be a Nash saddle point of φ. Then, we have

    and

Proof

  • For (X *, x *) we have

    and

    Solving (A.4) and (A.5) together we get

    From (A.6) it follows that F(x */X *)=F(1), F′(x */X *)=F′(1), G((1−x *)/(1−X *))=G(1), G′((1−x *)/(1−X *))=G′(1), which yields

    and

    which completes the proof. □

Corollary 1

  • For

Proof

  • Representing φ(X, x)=F(x/X)G((1−x)/(1−X)), where

    and

    we get (A.9) from (A.7). □

Corollary 2

  • For

Proof

  • Representing φ(X, x)=F(x/X)G((1−x)/(1−X)), where

    and

    we get (A.10) from (A.7). □

Rights and permissions

Reprints and permissions

About this article

Cite this article

Levitin, G., Hausken, K. Individual versus overarching protection against strategic attacks. J Oper Res Soc 63, 969–981 (2012). https://doi.org/10.1057/jors.2011.96

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/jors.2011.96

Keywords

Navigation