×

Two-stage invest-defend game: balancing strategic and operational decisions. (English) Zbl 1441.90077

Summary: Protecting infrastructures and their users against terrorist attacks involves making both strategic and operational decisions in an organization’s hierarchy. Although usually analyzed separately, these decisions influence each other. To study the combined effect of strategic and operational decisions, we present a game-theoretic, two-stage model between a defender and an attacker involving multiple target sites. In the first stage, the defender (attacker) makes a strategic decision of allocating investment resources to target sites to improve the defense (attack) capabilities. We consider two cases for investments in the first stage: (1) unconstrained and (2) budget-constrained models. The investment allocations for each target site determine its detection probability. In the second stage, the players make operational decisions of which target site to defend or to attack. We distinguish between two games that arise in the second stage: the maximal damage game and the infiltration/harassment game. We prove that the solution to each game under budget constraints is unique. In fact, when the second-stage game is of the infiltration/harassment type, the invest-defend game has a unique closed-form solution that is very intuitive. The results reveal that an increase in defense investments at a target site decreases the probability of both defending and attacking that target. However, an increase in attack investments increases the probability of both defending and attacking that target. Similarly, an increase in the defender’s (attacker’s) investment efficiency leads to a decrease (increase) in investments of both the defender and the attacker. Finally, the model is applied to real data to obtain the equilibrium investment and defense strategies. The results from real data demonstrate that the attacker’s penalty from a failed attack is an important factor in determining the defender’s optimal distribution of investments and defense probabilities. The defender’s second-stage defense decisions complement the first-stage investment decisions; that is, among target sites that receive little or zero investment, the most important one is covered with a relatively high defense probability in the second stage. Moreover, as the attacker’s budget increases, the defense investments shift from less important sites to more important ones.

MSC:

90B50 Management decision making, including multiple objectives
91A80 Applications of game theory

Software:

IRIS
Full Text: DOI

References:

[1] Baykal-Gürsoy M, Duan Z, Poor HV, Garnaev A (2014) Infrastructure security games. Eur. J. Oper. Res. 239(2):469-478.Crossref, Google Scholar · Zbl 1339.90105 · doi:10.1016/j.ejor.2014.04.033
[2] Bier VM, Abhichandani V (2002) Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. Haimes YY, Moser DA, Stakhiv EZ, eds. Proc. Engrg. Foundation Conf. Risk-Based Decisionmaking Water Resources X (American Society of Civil Engineers, Reston, VA), 59-76.Google Scholar
[3] Bier VM, Haphuriwat N, Menoyo J, Zimmerman R, Culpen AM (2008) Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Anal. 28(3):763-770.Crossref, Google Scholar · doi:10.1111/j.1539-6924.2008.01053.x
[4] Cachon GP, Netessine S (2004) Game theory in supply chain analysis. Simchi-Levi D, Wu SD, Shen ZM, eds. Handbook of Quantitative Supply Chain Analysis (Springer, Boston), 13-65.Crossref, Google Scholar · Zbl 1138.91365 · doi:10.1007/978-1-4020-7953-5_2
[5] Debreu G (1952) A social equilibrium existence theorem. Proc. Natl. Acad. Sci. USA 38(10):886-893.Crossref, Google Scholar · Zbl 0047.38804 · doi:10.1073/pnas.38.10.886
[6] Garcia ML (2005) Vulnerability Assessment of Physical Protection Systems (Butterworth-Heinemann, Oxford, UK).Google Scholar
[7] Garnaev A, Baykal-Gürsoy M, Poor HV (2014) Incorporating attack-type uncertainty into network protection. IEEE Trans. Inform. Forensics Security 9(8):1278-1287.Crossref, Google Scholar · doi:10.1109/TIFS.2014.2329241
[8] Garnaev A, Baykal-Gürsoy M, Poor HV (2015) How to deal with an intelligent adversary. Comput. Indust. Engrg. 90:352-360.Crossref, Google Scholar · doi:10.1016/j.cie.2015.10.001
[9] Garnaev A, Baykal-Gürsoy M, Poor HV (2016) Security games with unknown adversarial strategies. IEEE Trans. Cybernetics 46(10):2291-2299.Crossref, Google Scholar · doi:10.1109/TCYB.2015.2475243
[10] Garrick BJ, James EH, Kilger M, McDonald JC, O’Toole T, Probst PS, Rindskopf Parker E, Rosenthal R, Trivelpiece AW, Van Arsdale LA (2004) Confronting the risks of terrorism: Making the right decisions. Reliability Engrg. System Safety 86(2):129-176.Crossref, Google Scholar · doi:10.1016/j.ress.2004.04.003
[11] Golany B, Kaplan EH, Marmur A, Rothblum UG (2009) Nature plays with dice-terrorists do not: Allocating resources to counter strategic versus probabilistic risks. Eur. J. Oper. Res. 192(1):198-208.Crossref, Google Scholar · Zbl 1205.91096 · doi:10.1016/j.ejor.2007.09.001
[12] Guan P, He M, Zhuang J, Hora SC (2017). Modeling a multi target attacker-defender game with budget constraints. Decision Anal. 14(2):87-107.Link, Google Scholar · Zbl 1416.91045
[13] Haphuriwat N, Bier VM, Willis HH (2011) Deterring the smuggling of nuclear weapons in container freight through detection and retaliation. Decision Anal. 8(2):88-102.Link, Google Scholar · Zbl 1398.91028
[14] Harris B (2004) Mathematical methods in combatting terrorism. Risk Anal. 24(4):985-988.Crossref, Google Scholar · doi:10.1111/j.0272-4332.2004.00501.x
[15] Hausken K (2002) Probabilistic risk analysis and game theory. Risk Anal. 22(1):17-27.Crossref, Google Scholar · doi:10.1111/0272-4332.t01-1-00002
[16] Hausken K (2006) Income, interdependence, and substitution effects affecting incentives for security investment. J. Accounting Public Policy 25(6):629-665.Crossref, Google Scholar · doi:10.1016/j.jaccpubpol.2006.09.001
[17] Hausken K (2009) Strategic defense and attack of complex networks. Internat. J. Performability Engrg. 5(1):13-30.Google Scholar
[18] Hausken K (2010) Defense and attack of complex and dependent systems. Reliability Engrg. System Safety 95(1):29-42.Crossref, Google Scholar · doi:10.1016/j.ress.2009.07.006
[19] Hausken K, Bier VM (2011) Defending against multiple different attackers. Eur. J. Oper. Res. 211(2):370-384.Crossref, Google Scholar · Zbl 1250.91021 · doi:10.1016/j.ejor.2010.12.013
[20] Hausken K, He F (2016) On the effectiveness of security countermeasures for critical infrastructures. Risk Anal. 36(4):711-726.Crossref, Google Scholar · doi:10.1111/risa.12318
[21] Hausken K, Levitin G (2009) Parallel systems with different types of defense resource expenditure under two sequential attacks. Proc. Institution Mech. Engineers Part O: J. Risk Reliability 223(1):71-85.Crossref, Google Scholar · doi:10.1243/1748006XJRR223
[22] Hausken K, Levitin G (2012) Review of systems defense and attack models. Internat. J. Performability Engrg. 8(4):355-366.Google Scholar
[23] Hausken K, Zhuang J (2011) Governments’ and terrorists’ defense and attack in a t-period game. Decision Anal. 8(1):46-70.Link, Google Scholar · Zbl 1398.91368
[24] Hausken K, Bier VM, Zhuang J (2009) Defending against terrorism, natural disaster, and all hazards. Bier VM, Azaiez MN, eds. Game Theoretic Risk Analysis of Security Threats (Springer, New York), 65-97.Crossref, Google Scholar · doi:10.1007/978-0-387-87767-9_4
[25] Jose VRR, Zhuang J (2013) Technology adoption, accumulation, and competition in multi-period attacker-defender games. Military Oper. Res. 18(2):33-47.Crossref, Google Scholar · doi:10.5711/1082598318233
[26] Kaplan S, Garrick BJ (1981) On the quantitative definition of risk. Risk Anal. 1(1):11-27.Crossref, Google Scholar · doi:10.1111/j.1539-6924.1981.tb01350.x
[27] Kuhn HW, Tucker AW (1951) Nonlinear programming. Neyman J, ed. Proc. 2nd Berkeley Sympos. Math. Statist. Probab. (University of California Press, Berkeley), 481-492.Google Scholar · Zbl 0044.05903
[28] Levitin G (2009) Optimal distribution of constrained resources in bi-contest detection-impact game. Internat. J. Performability Engrg. 5(1):45-54.Google Scholar
[29] Levitin G, Hausken K (2009) Intelligence and impact contests in systems with redundancy, false targets, and partial protection. Reliability Engrg. System Safety 94(12):1927-1941.Crossref, Google Scholar · doi:10.1016/j.ress.2009.06.010
[30] Levitin G, Hausken K (2010) Defence and attack of systems with variable attacker system structure detection probability. J. Oper. Res. Soc. 61(1):124-133.Crossref, Google Scholar · Zbl 1193.94042 · doi:10.1057/jors.2008.158
[31] Levitin G, Hausken K (2012a) Individual versus overarching protection against strategic attacks. J. Oper. Res. Soc. 63(7):969-981.Crossref, Google Scholar · doi:10.1057/jors.2011.96
[32] Levitin G, Hausken K (2012b) Parallel systems under two sequential attacks with imperfect detection of the first attack outcome. J. Oper. Res. Soc. 63(11):1545-1555.Crossref, Google Scholar · doi:10.1057/jors.2012.4
[33] Levitin G, Hausken K (2012c) Resource distribution in multiple attacks with imperfect detection of the attack outcome. Risk Anal. 32(2):304-318.Crossref, Google Scholar · doi:10.1111/j.1539-6924.2011.01657.x
[34] McGill WL, Ayyub BM, Kaminskiy M (2007) Risk analysis for critical asset protection. Risk Anal. 27(5):1265-1281.Crossref, Google Scholar · doi:10.1111/j.1539-6924.2007.00955.x
[35] National Consortium for the Study of Terrorism and Responses to Terrorism (2016) Annex of statistical information: Country reports on terrorism 2016. Report, Bureau of Counterterrorism and Countering Violent Extremism, U.S. Department of State, Washington, DC. Google Scholar
[36] Nikoofal ME, Zhuang J (2012) Robust allocation of a defensive budget considering an attacker’s private information. Risk Anal. 32(5):930-943.Crossref, Google Scholar · doi:10.1111/j.1539-6924.2011.01702.x
[37] Paté-Cornell E (2002) Fusion of intelligence information: A Bayesian approach. Risk Anal. 22(3):445-454.Crossref, Google Scholar · doi:10.1111/0272-4332.00056
[38] Paté-Cornell E, Guikema S (2002) Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Oper. Res. 7(4):5-23.Crossref, Google Scholar · doi:10.5711/morj.7.4.5
[39] Peng R, Levitin G, Xie M, Ng SH (2010) Defending simple series and parallel systems with imperfect false targets. Reliability Engrg. System Safety 95(6):679-688.Crossref, Google Scholar · doi:10.1016/j.ress.2010.02.008
[40] Pita J, Jain M, Marecki J, Ordóñez F, Portway C, Tambe M, Western C, Paruchuri P, Kraus S (2008) Deployed armor protection: the application of a game theoretic model for security at the Los Angeles International Airport. Padgham L, Parkes D, Muller JP, eds. Proc. 7th Internat. Joint Conf. Autonomous Agents Multiagent Systems (Indust. Track) (International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC), 125-132.Google Scholar
[41] Powell R (2007) Allocating defensive resources with private information about vulnerability. Amer. Political Sci. Rev. 101(4):799-809.Crossref, Google Scholar · doi:10.1017/S0003055407070530
[42] Shan X, Zhuang J (2013a) Cost of equity in homeland security resource allocation in the face of a strategic attacker. Risk Anal. 33(6):1083-1099.Crossref, Google Scholar · doi:10.1111/j.1539-6924.2012.01919.x
[43] Shan X, Zhuang J (2013b) Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game. Eur. J. Oper. Res. 228(1):262-272.Crossref, Google Scholar · Zbl 1332.91029 · doi:10.1016/j.ejor.2013.01.029
[44] Shan X, Zhuang J (2014a) Modeling credible retaliation threats in deterring the smuggling of nuclear weapons using partial inspection-A three-stage game. Decision Anal. 11(1):43-62.Link, Google Scholar · Zbl 1398.91067
[45] Shan X, Zhuang J (2014b) Subsidizing to disrupt a terrorism supply chain-A four-player game. J. Oper. Res. Soc. 65(7):1108-1119.Crossref, Google Scholar · doi:10.1057/jors.2013.53
[46] Shan X, Zhuang J (2018) Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game. Reliability Engrg. System Safety 179:12-26.Crossref, Google Scholar · doi:10.1016/j.ress.2017.03.022
[47] Shieh E, An B, Yang R, Tambe M, Baldwin C, DiRenzo J, Maule B, Meyer G (2012) Protect: A deployed game theoretic system to protect the ports of the united states. van der Hoek W, Padgham L, eds. Proc. 11th Internat. Conf. Autonomous Agents Multiagent Systems, vol. 1 (International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC), 13-20.Google Scholar
[48] Skaperdas S (1996) Contest success functions. Econom. Theory 7(2):283-290.Crossref, Google Scholar · Zbl 0852.90137 · doi:10.1007/BF01213906
[49] Smith BL, Roberts P, Damphousse KR (2017) The terrorists’ planning cycle. LaFree G, Freilich JD, eds. The Handbook of the Criminology of Terrorism (John Wiley & Sons, Chichester, UK), 62-76.Crossref, Google Scholar · doi:10.1002/9781118923986.ch4
[50] Tsai J, Kiekintveld C, Ordonez F, Tambe M, Rathi S (2009) IRIS—A tool for strategic security allocation in transportation networks. Decker KS, Sichman JS, Sierra C, Castelfranchi C, eds. Proc. 8th Internat. Joint Conf. Autonomous Agents Multiagent Systems (Indust. Track), (International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC), 37-44.Google Scholar
[51] U.S. Army Training and Doctrine Command (2010) Appendix A. A Military Guide to Terrorism in the Twenty-First Century (Cosimo Inc., Fort Leavenworth, KS), A1-A6.Google Scholar
[52] Wang C, Bier VM (2011) Target-hardening decisions based on uncertain multi-attribute terrorist utility. Decision Anal. 8(4):286-302.Link, Google Scholar · Zbl 1398.91068
[53] Willis HH, Morral AR, Kelly TK, Medby JJ (2005) Estimating Terrorism Risk (RAND Corporation, Santa Monica, CA).Crossref, Google Scholar · doi:10.7249/MG388
[54] Yolmeh A, Baykal-Gürsoy M (2017) A robust approach to infrastructure security games. Comput. Indust. Engrg. 110(August):515-526.Crossref, Google Scholar · doi:10.1016/j.cie.2017.06.032
[55] Yolmeh A, Baykal-Gürsoy M (2018) Urban rail patrolling: A game theoretic approach. J. Transportation Security 11(1/2):1-18.Google Scholar
[56] Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters—Defensive strategy with endogenous attacker effort. Oper. Res. 55(5):976-991.Link, Google Scholar · Zbl 1167.91331
[57] Zhuang J, · Zbl 1177.91053 · doi:10.1016/j.ejor.2009.07.028
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.