Abstract
This article considers a system consisting of elements that can be protected and attacked individually and collectively. To destroy the system, the attacker must always penetrate/destroy the collective (overarching) protection. In the case of the parallel system, it also must destroy all elements, whereas in the case of the series system, it must destroy at least one element. Both the attacker and the defender have limited resources and can distribute these freely between the two types of protection. The attacker chooses the resource distribution and the number of attacked elements to maximize the system destruction probability. The defender chooses the resource distribution and the number of protected elements to minimize the system destruction probability. The bi-contest minmax game is formulated and its analytical solutions are presented and analysed. The asymptotical analysis of the solutions is presented. The influence of the game parameters on the optimal defence and attack strategies is discussed.
Similar content being viewed by others
References
Avenhaus R and Canty M (2005). Playing for time: A sequential inspection game. European Journal of Operational Research 167 (2): 475–492.
Azaiez N and Bier VM (2007). Optimal resource allocation for security in reliability systems. European Journal of Operational Research 181: 773–786.
Bier VM, Haphuriwat N, Menoyo J, Zimmerman R and Culpen AM (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis 28 (3): 763–770.
Bier VM, Nagaraj A and Abhichandani V (2005). Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety 87: 315–323.
Boros E, Fedzhora L, Kantor P, Saeger K and Stroud P (2009). A large-scale linear programming model for finding optimal container inspection strategies. Naval Research Logistics 56 (5): 404–420.
Brown GG, Carlyle WM, Salmerón J and Wood K (2006). Defending critical infrastructure. Interfaces 36 (6): 530–544.
Cox LA (2009). Making telecommunications networks resilient against terrorist attacks (Chapter 8). In: Bier VM, Azaiez MN (eds). Game Theoretic Risk Analysis of Security Threats. Springer: New York, pp 175–198.
Golalikhani M and Zhuang J (2011). Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis 31 (4): 533–547.
Haphuriwat N and Bier VM (2009). Tradeoffs between target hardening and overarching protection. INFORMS Annual Meeting. San Diego, CA, 11–14 October 2009.
Haphuriwat N and Bier VM (2010). Tradeoffs between target hardening and overarching protection. PhD Thesis, University of Wisconsin-Madison.
Korczak E and Levitin G (2007). Survivability of systems under multiple factor impact. Reliability Engineering & System Safety 92 (2): 269–274.
Korczak E, Levitin G and Ben Haim H (2005). Survivability of series-parallel systems with multilevel protection. Reliability Engineering & System Safety 90 (1): 45–54.
Levitin G (2009). Optimal distribution of constrained resources in bi-contest detection-impact game. International Journal of Performability Engineering 5 (1): 45–54.
Levitin G and Hausken K (2009a). Intelligence and impact contests in systems with fake targets. Defense and Security Analysis 25 (2): 157–173.
Levitin G and Hausken K (2009b). Intelligence and impact contests in systems with redundancy, false targets, and partial protection. Reliability Engineering & System Safety 94 (12): 1927–1941.
McLay LA, Lloyd JD and Niman E (2011). Interdicting nuclear material on cargo containers using knapsack problem models. Annals of Operations Research 33 (9): 747–759.
Powell R (2007). Defending against terrorist attacks with limited resources. American Political Science Review 101 (3): 527–541.
Skaperdas S (1996). Contest success functions. Economic Theory 7: 283–290.
Tullock G. (1980). Efficient rent-seeking. In: Buchanan JM, Tollison RD and Tullock G (eds). Toward a Theory of the Rent-seeking Society. Texas A. & M. University Press, College Station, pp 97–112.
Zhuang J and Bier VM (2007). Balancing terrorism and natural disasters—Defensive strategy with endogenous attacker effort. Operations Research 55 (5): 976–991.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Theorem
-
Let
for differentiable F and G, and (X *, x *) be a Nash saddle point of φ. Then, we have
and
Proof
-
For (X *, x *) we have
and
Solving (A.4) and (A.5) together we get
From (A.6) it follows that F(x */X *)=F(1), F′(x */X *)=F′(1), G((1−x *)/(1−X *))=G(1), G′((1−x *)/(1−X *))=G′(1), which yields
and
which completes the proof. □
Corollary 1
-
For
Proof
-
Representing φ(X, x)=F(x/X)G((1−x)/(1−X)), where
and
we get (A.9) from (A.7). □
Corollary 2
-
For
Proof
-
Representing φ(X, x)=F(x/X)G((1−x)/(1−X)), where
and
we get (A.10) from (A.7). □
Rights and permissions
About this article
Cite this article
Levitin, G., Hausken, K. Individual versus overarching protection against strategic attacks. J Oper Res Soc 63, 969–981 (2012). https://doi.org/10.1057/jors.2011.96
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/jors.2011.96