IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v185y2019icp465-475.html
   My bibliography  Save this article

Modeling a multi-target attacker-defender game with multiple attack types

Author

Listed:
  • Zhang, Jing
  • Zhuang, Jun

Abstract

How to allocate limited defense resources effectively and efficiently to prevent damages is a critical and difficult problem, especially when faced with adaptive attackers and various attack types (methods that the attacker uses). There has been a growing amount of literature on studying the strategic interactions between attackers (terrorists) and defenders (government). This research presents a novel class of multi-target attacker-defender games where the attackers have multiple attacking options including assassination, armed assault, bombing/explosion, facility/infrastructure attack, hijacking, hostage taking, and unarmed assault. Different attack types may lead to different attack success probabilities, consequences, and effectiveness of defensive resource allocation. Faced with multiple attack types and adaptive attackers, the defender distributes a limited amount of resources to multiple targets to minimize the total expected loss in a sequential game as the first mover. We provide numerical illustrations for the model results. The model is illustrated by: (a) using historical terrorism and defensive investment data to estimate the model parameters, and (b) comparing the historical resource allocation with the model outputs. From the sensitivity analyses, we find that the defense cost effectiveness against the “Hijacking,†and “Bombing/Explosion†attack types play a critical role in decreasing the expected loss. The proposed multi-attack model leads to less expected loss than that of both the single-attack model and the historical allocation from the Urban Area Security Initiative (UASI). This paper provides new insights on modeling defensive resource allocation models related to adaptive adversaries.

Suggested Citation

  • Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
  • Handle: RePEc:eee:reensy:v:185:y:2019:i:c:p:465-475
    DOI: 10.1016/j.ress.2019.01.015
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832018306100
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2019.01.015?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    2. Drakos, Konstantinos, 2010. "Terrorism activity, investor sentiment, and stock returns," Review of Financial Economics, Elsevier, vol. 19(3), pages 128-135, August.
    3. Gerald G. Brown & Louis Anthony (Tony) Cox, Jr., 2011. "How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 196-204, February.
    4. W. Kip Viscusi, 2000. "Misuses and Proper Uses of Hedonic Values of Life in Legal Contexts," Journal of Forensic Economics, National Association of Forensic Economics, vol. 13(2), pages 111-125, April.
    5. Seung-Whan Choi, 2010. "Fighting Terrorism through the Rule of Law?," Journal of Conflict Resolution, Peace Science Society (International), vol. 54(6), pages 940-966, December.
    6. Asaf Zussman & Noam Zussman, 2006. "Assassinations: Evaluating the Effectiveness of an Israeli Counterterrorism Policy Using Stock Market Data," Journal of Economic Perspectives, American Economic Association, vol. 20(2), pages 193-206, Spring.
    7. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    8. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    9. G Levitin & K Hausken, 2013. "Defence resource distribution between protection and decoys for constant resource stockpiling pace," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 64(9), pages 1409-1417, September.
    10. Victor Richmond R. Jose & Jun Zhuang, 2018. "Incorporating risk preferences in stochastic noncooperative games," IISE Transactions, Taylor & Francis Journals, vol. 50(1), pages 1-13, January.
    11. Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
    12. Jonathan Feinstein & Edward Kaplan, 2011. "Counterterror intelligence operations and terror attacks," Public Choice, Springer, vol. 149(3), pages 281-295, December.
    13. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    14. Eldor, Rafi & Melnick, Rafi, 2004. "Financial markets and terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 367-386, June.
    15. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    16. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    17. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    18. Borooah, Vani, 2009. "Terrorist Incidents in India, 1998–2004: A Quantitative Analysis of Fatality Rates," MPRA Paper 19423, University Library of Munich, Germany.
    19. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    20. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    21. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    22. Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
    23. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    24. Hamid Mohtadi & Antu Panini Murshid, 2009. "Risk Analysis of Chemical, Biological, or Radionuclear Threats: Implications for Food Security," Risk Analysis, John Wiley & Sons, vol. 29(9), pages 1317-1335, September.
    25. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    26. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    27. Peter Phillips, 2009. "Applying Modern Portfolio Theory To The Analysis Of Terrorism. Computing The Set Of Attack Method Combinations From Which The Rational Terrorist Group Will Choose In Order To Maximise Injuries And Fat," Defence and Peace Economics, Taylor & Francis Journals, vol. 20(3), pages 193-213.
    28. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    29. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    30. Aven, Terje, 2007. "A unified framework for risk and vulnerability analysis covering both safety and security," Reliability Engineering and System Safety, Elsevier, vol. 92(6), pages 745-754.
    31. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Alcantara-Jiménez, Guillermo & Clempner, Julio B., 2020. "Repeated Stackelberg security games: Learning with incomplete state information," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    4. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
    5. Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
    6. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    7. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    8. Li, Yulong & Lin, Jie & Zhang, Chi & Zhu, Huaxing & Zeng, Saixing & Sun, Chengshaung, 2022. "Joint optimization of structure and protection of interdependent infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    9. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    10. Zhao, Yunfei & Huang, Linan & Smidts, Carol & Zhu, Quanyan, 2020. "Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    11. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    12. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    13. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    14. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    2. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    3. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    4. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    5. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    6. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    7. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    8. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    9. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    10. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    11. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    12. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    13. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    14. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    15. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    16. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    17. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    18. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    19. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    20. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:185:y:2019:i:c:p:465-475. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.