Abstract
Two agents protect and attack a collection of assets overarchingly versus individually. Examples of overarching protection are border security, counter intelligence, and public health measures. Both layers of protection have to be breached for an attack to be successful. We consider a simultaneous game, and a two period game with overarching contest in period 1 and individual contests in period 2 if the attacker wins period 1. With reasonable assumptions, such as contest intensities not exceeding one, the defender prefers two protection layers, while the attacker prefers one protection layer. When the unit effort costs of overarching protection and attack are equal, and the agents’ valuations for each asset are equal, in the simultaneous game defender and attacker efforts are equal in the overarching contest. In contrast, for the two period game, the defender invests more than the attacker in the overarching contest to prevent the occurrence of period 2. If the attacker nevertheless wins period 1, both agents exert larger efforts in period 2 compared with the individual contests in the simultaneous game. Framed within the Colonel Blotto literature, the attacker must win the first battlefield (overarching contest) in order to engage in the contests over the n other battlefields (individual contests).
Similar content being viewed by others
Notes
Both simultaneous and sequential games are common in the literature. One example where a sequential game is often argued to be realistic is when a defender has built a substantial and virtually impenetrable and insurmountable defense wall in period 1 which the attacker can observe and take as given when choosing his effort in period 2. Even for this example, a defender building such a wall usually or always does so anticipating and sometimes assuming a certain attack capacity by the attacker. No defender designs a defense in a vacuum not assuming anything about possible attacks. For example, the solidity and thickness of the wall is usually designed to withstand certain modes of attack, and not to withstand other modes of attack. Assuming that a defender knows nothing about an attack, while the attacker knows everything about a defense, is questionable. For defenses that are more fluid and movable than defense walls, for example security personnel, detectors, surveillance equipment, such defenses have the capacity to adapt themselves to expected modes of behavior by the attacker. In this paper we assume that the defender and attacker are on an equal footing with respect to observing versus not observing characteristics about each other ahead of time. The attacker cannot know the actual defense effort before testing it, and the defender cannot know the attack effort before experiencing it. Future research may analyze sequential games where either the defender or attacker moves first. Solving sequential games with backward induction requires setting the contest intensities to \(\text{ m}=\text{ m}_\mathrm{i}=1\).
In this paper we do not consider responsive overarching protection which requires analyzing a sequential game where the attacker moves first and the defender moves second as a response to the attack.
Abbreviations
- \(n\) :
-
Number of system assets
- \(t_{i}\) :
-
Defender’s individual protection effort for asset i
- \(T_{i}\) :
-
Attacker’s individual attack effort for asset i
- \(t\) :
-
Defender’s overarching protection effort
- \(T\) :
-
Attacker’s overarching attack effort
- \(s_{i }\) :
-
Defender’s valuation of asset i, \(s_{i}\,{\ge }\,0\)
- \(S_{i }\) :
-
Attacker’s valuation of asset i, \(S_{i}\,{\ge }\,0\)
- \(c_{i }\) :
-
Defender’s unit cost of protecting asset i
- \(C_{i }\) :
-
Attacker’s unit cost of attacking asset i
- \(m_{i }\) :
-
Contest intensity for asset i
- \(Q_i =\frac{C_i /S_i }{c_i /s_i }\) :
-
Unit cost over asset valuation ratio for asset i
- \(c\) :
-
Defender’s unit cost for overarching protection
- \(C\) :
-
Attacker’s unit cost for overarching attack
- \(Q=\frac{C/{\sum _{i=1}^n {\frac{S_i }{1+Q_i ^{m_i }}}} }{c/{\sum _{i=1}^n {\frac{s_i }{1+Q_i ^{m_i }}}}}\) :
-
Adjusted unit cost ratio for overarching attack and protection
- \(m\) :
-
Contest intensity for overarching protection and attack
- \(V_{i }\) :
-
Attack success probability for asset i due to individual protection and attack
- \(d_{i }\) :
-
Defender’s expected damage for asset i
- \(D_{i }\) :
-
Attacker’s expected damage for asset i
- \(V\) :
-
Attack success probability for the collection of assets due to overarching protection and attack
- \(d\) :
-
Defender’s expected damage for the collection of assets
- \(D\) :
-
Attacker’s expected damage the collection of assets
- \(r\) :
-
Defender’s expenditure ratio
- \(R\) :
-
Attacker’s expenditure ratio
- \(u\) :
-
Defender’s utility
- \(U\) :
-
Attacker’s utility
References
Arce DG, Croson RTA, Eckel CC (2011) Terrorism experiments. J Peace Res 48(3):373–382
Avenhaus R, Canty M (2005) Playing for time: a sequential inspection game. Eur J Oper Res 167(2):475–492
Azaiez N, Bier VM (2007) Optimal resource allocation for security in reliability systems. Eur J Oper Res 181(2):773–786
Bier VM, Haphuriwat N (2011) Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks. Ann Oper Res 187(1):137–158
Bier VM, Haphuriwat N, Menoyo J, Zimmerman R, Culpen AM (2008) Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Anal 28(3):763–770
Bier VM, Nagaraj A, Abhichandani V (2005) Protection of simple series and parallel systems with components of different values. Reliab Eng Syst Saf 87:315–323
Boros E, Fedzhora L, Kantor P, Saeger K, Stroud P (2009) A large-scale linear programming model for finding optimal container inspection strategies. Nav Res Logisti 56(5):404–420
Brown GG, Carlyle WM, Salmerón J, Wood K (2006) Defending critical infrastructure. Interfaces 36(6):530–544
Chowdhury S, Kovenock D, Sheremeta RM (2009) An experimental investigation of Colonel Blotto games. CESifo working paper series, CESifo Group, Munich
Clark DJ, Konrad KA (2007a) Contests with multi-tasking. Scand J Econ 109(2):303–319
Clark DJ, Konrad KA (2007b) Asymmetric conflict—weakest link against best shot. J Confl Resolut 51(3):457–469
Clark DJ, Konrad KA (2008) Fragmented property rights and incentives for R&D. Manag Sci 54(5):969–981
Cox LA (2009) Making telecommunications networks resilient against terrorist attacks (Chapter 8). In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York, pp 175–198
Friedman L (1958) Game-theory models in the allocation of advertising expenditures. Oper Res 6(5):699–709
Golalikhani M, Zhuang J (2011) Modeling arbitrary layers of continuous level defenses in facing with a strategic attacker. Risk Anal 31(4):533–547
Haphuriwat N, Bier VM (2011) Trade-offs between target hardening and overarching protection. Eur J Oper Res 213(1):320–328
Hausken K (2008a) Strategic defense and attack for reliability systems. Reliab Eng Syst Saf 93(11):1740–1750
Hausken K (2008b) Strategic defense and attack for series and parallel reliability systems. Eur J Oper Res 186(2):856–881
Hausken K (2011a) Protecting complex infrastructures against multiple strategic attackers. Int J Syst Sci 42(1):11–29
Hausken K (2011b) Strategic defense and attack of series systems when agents move sequentially. IIE Trans 43(7):483–504
Hausken K, Levitin G (2008) Efficiency of even separation of parallel elements with variable contest intensity. Risk Anal 28(5):1477–1486
Hausken K, Levitin G (2009) Minmax defense strategy for complex multi-state systems. Reliab Eng Syst Saf 94:577–587
Klumpp T, Polborn MK (2006) Primaries and the New Hampshire effect. J Public Econ 90(6–7):1073–1114
Konrad KA, Kovenock D (2009) Multi-battle contests. Games Econ Behav 66(1):256–274
Konrad KA, Kovenock D (2010) Contests with stochastic abilities. Econ Inq 48(1):89–103
Korczak E, Levitin G (2007) Survivability of systems under multiple factor impact. Reliab Eng Syst Saf 92(2):269–274
Kovenock D, Roberson B (2009) Terrorism and the optimal defense of networks of targets. Purdue University, West Lafayette, IN, Mimeograph
Levitin G (2003) Optimal multilevel protection in series parallel systems. Reliab Eng Syst Saf 81(1):93–102
Levitin G, Hausken K (2009a) Intelligence and impact contests in systems with fake targets. Def Security Anal 25(2):157–173
Levitin G, Hausken K (2009b) Intelligence and impact contests in systems with redundancy, false targets, and partial protection. Reliab Eng System Saf 94(12):1927–1941
Levitin G, Hausken K (2012) Individual vs. overarching protection against strategic attacks. J Oper Res Soc 63(7):969–981
McLay LA, Lloyd JD, Niman E (2011) Interdicting nuclear material on cargo containers using knapsack problem models. Ann Oper Res 187(1):185–205
Powell R (2007) Defending against terrorist attacks with limited resources. Am Polit Sci Rev 101(3):527–541
Roberson BA (2006) The Colonel Blotto game. Econ Theory 29(1):1–24
Robson ARW (2005) Multi-item contests. Working paper no 446, Australian National University, Canberra
Shubik M, Weber RJ (1981) Systems defense games: Colonel Blotto, command and control. Nav Res Logist Q 28(2):281–287
Snyder JM (1989) Election goals and the allocation of campaign resources. Econometrica 57:637–660
Tullock G (1980) Efficient rent-seeking. In: Buchanan JM, Tollison RD, Tullock G (eds) Toward a theory of the rent-seeking society, Texas A& M University Press, College Station, pp 97–112
Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters—defensive strategy with endogenous attack effort. Oper Res 55(5):976–991
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hausken, K. Individual versus overarching protection and attack of assets. Cent Eur J Oper Res 22, 89–112 (2014). https://doi.org/10.1007/s10100-012-0271-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10100-012-0271-6