Modeling a Multitarget Attacker-Defender Game with Budget Constraints

نویسندگان

  • Peiqiu Guan
  • Meilin He
  • Jun Zhuang
  • Stephen C. Hora
چکیده

Copyright: © 2017 INFORMS Abstract. Though the choices of terrorists’ attack targets are vast, their resources are limited. In this paper, a game-theoretical model is proposed to study both the defender’s (government) and the attacker’s (terrorist) expenditures among multiple targets under budget constraints to guide investment in defense. We study how the defender’s and the attacker’s equilibrium allocations depend on the budget constraints, target valuations, cost effectiveness of their investments, and inherent defense levels of targets in both sequential-move and simultaneous-move games. The equilibrium solutions are provided using the Karush–Kuhn–Tucker conditions. At the subgame-perfect Nash equilibrium, the defender’s total marginal effects are the same among targets. Moreover, the defender’s total marginal effects can be decomposed into direct and indirect effects. We also use the multiple-infrastructure and multiple-urban-area data sets to demonstrate the model results. The regression analysis shows that both the attacker’s and the defender’s equilibrium investments increase with their own target valuations, because a higher valuation for themselves means a higher attractiveness. Interestingly, the attacker’s equilibrium investment is negatively correlated with the defender’s target valuations, since a higher defender’s valuationwouldmake it more difficult for the attacker to successfully attack the target. By contrast, the defender’s equilibrium investment is positively correlated with the attacker’s target valuations, as a higher attacker’s valuations would increase the urgency for the defender to protect the target. To show the utility of the new model, we compare the results of this model and the model in which the defender assumes that only a single target will be attacked when there could actually be multiple targets attacked. Our results show that the defender will suffer higher expected losses if she assumes that the attacker will attack only one target. The analysis of the attacker’s and the defender’s budget constraints show that (a) the higher the budget the defender has, the less likely it is that her most valuable target will be attacked; (b) a higher proportion of defense resources should be allocated to the most valuable target if the defender’s budget is low; and (c) the attacker is less concentrated on attacking the most valuable target and spreads the resources to attack more targets as his budget increases.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models

Reliable operation of power systems is a primary challenge for the system operators. With the advancement in technology and grid automation, power systems are becoming more vulnerable to cyber-attacks. The main goal of adversaries is to take advantage of these vulnerabilities and destabilize the system. This paper describes a game-theoretic approach to attacker / defender modeling in power syst...

متن کامل

Robust allocation of a defensive budget considering an attacker's private information.

Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-opti...

متن کامل

Security of Transportation Networks: Modeling Attacker-Defender Interaction

Transportation networks are increasingly facing new security threats due to the vulnerabilities of cyber-physical components that support their operation. In this article, we aim to understand how the network operator (defender) should prioritize the investment in securing a set of facilities in order to limit the impact of a strategic adversary (attacker) who can target a facility to increase ...

متن کامل

A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources

Stealthy attacks are a major threat to cyber security. In practice, both attackers and defenders have resource constraints that could limit their capabilities. Hence, to develop robust defense strategies, a promising approach is to utilize game theory to understand the fundamental trade-offs involved. Previous works in this direction, however, mainly focus on the single-node case without consid...

متن کامل

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Decision Analysis

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2017