Devil take the hindmost: Deflecting attacks to other defenders
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ress.2020.107205
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
- repec:wly:soecon:v:83:1:y:2016:p:105-125 is not listed on IDEAS
- Konrad, Kai A., 2020.
"Attacking and defending multiple valuable secrets in a big data world,"
European Journal of Operational Research, Elsevier, vol. 280(3), pages 1122-1129.
- Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
- Konrad, Kai A. & Kovenock, Dan, 2012.
"The lifeboat problem,"
European Economic Review, Elsevier, vol. 56(3), pages 552-559.
- Kovenock, Dan & Konrad, Kai A., 2009. "The Lifeboat Problem," CEPR Discussion Papers 7424, C.E.P.R. Discussion Papers.
- Konrad, Kai A. & Kovenock, Dan, 2012. "The lifeboat problem," Munich Reprints in Economics 13962, University of Munich, Department of Economics.
- Konrad, Kai A. & Kovenock, Dan, 2011. "The lifeboat problem," Discussion Papers, Research Professorship & Project "The Future of Fiscal Federalism" SP II 2011-106, WZB Berlin Social Science Center.
- Kai A. Konrad & Dan Kovenock, 2011. "The Lifeboat Problem," Working Papers the_lifeboat_problem, Max Planck Institute for Tax Law and Public Finance.
- H. Peyton Young & Shmuel Zamir (ed.), 2015. "Handbook of Game Theory with Economic Applications," Handbook of Game Theory with Economic Applications, Elsevier, edition 1, volume 4, number 4.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
- Qiang Fu & Jingfeng Lu & Yue Pan, 2015. "Team Contests with Multiple Pairwise Battles," American Economic Review, American Economic Association, vol. 105(7), pages 2120-2140, July.
- Michael R. Baye & Dan Kovenock & Casper G. Vries, 1996.
"The all-pay auction with complete information,"
Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 209-223,
Springer.
- Dan Kovenock & Michael R. Baye & Casper G. de Vries, 1996. "The all-pay auction with complete information (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 8(2), pages 291-305.
- Baye, M.R. & Kovenock, D. & De Varies, C.G., 1990. "The All-Pay Auction With Complete Information," Papers 9051, Tilburg - Center for Economic Research.
- Michael R. Baye & Dan Kovenock & Casper De Vries & Casper G, de Vries, 1995. "The All-pay Auction with Complete Information," CESifo Working Paper Series 90, CESifo.
- Baye, M.R. & Kovenock, D. & De Vries, C., 1992. "The All-Pay Auction with Complete Information," Papers 8-92-1, Pennsylvania State - Department of Economics.
- Baye, M. & Kovenock, D. & de Vries, C., 1990. "The All-Pay Auction with Complete Information," Discussion Paper 1990-51, Tilburg University, Center for Economic Research.
- Baye, M. & Kovenock, D. & de Vries, C., 1990. "The All-Pay Auction with Complete Information," Other publications TiSEM 8739e73c-3375-40b8-b29b-b, Tilburg University, School of Economics and Management.
- Kovenock, D. & de Vries, C.G., 1995. "The All-Pay Auction with Complete Information," UFAE and IAE Working Papers 311.95, Unitat de Fonaments de l'Anàlisi Econòmica (UAB) and Institut d'Anàlisi Econòmica (CSIC).
- Baye, M.R. & Kovenock, D. & De Vries, C.G., 1991. "The All-Pay Auction With Complete Information," Purdue University Economics Working Papers 1007, Purdue University, Department of Economics.
- Shmuel Nitzan, 2008.
"Collective Rent Dissipation,"
Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 309-321,
Springer.
- Nitzan, Shmuel, 1991. "Collective Rent Dissipation," Economic Journal, Royal Economic Society, vol. 101(409), pages 1522-1534, November.
- Ray, Debraj & Vohra, Rajiv, 2015.
"Coalition Formation,"
Handbook of Game Theory with Economic Applications,,
Elsevier.
- Debraj Ray & Rajiv Vohra, 2013. "Coalition Formation," Working Papers 2013-1, Brown University, Department of Economics.
- Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
- Kjell Hausken, 2011. "Strategic defense and attack of series systems when agents move sequentially," IISE Transactions, Taylor & Francis Journals, vol. 43(7), pages 483-504.
- Kai A. Konrad, 2004.
"Bidding in hierarchies,"
Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 547-554,
Springer.
- Konrad, Kai A., 2004. "Bidding in hierarchies," European Economic Review, Elsevier, vol. 48(6), pages 1301-1308, December.
- Konrad, Kai A., 2003. "Bidding in hierarchies [Das Bieten in Hierarchien]," Discussion Papers, Research Unit: Market Processes and Governance SP II 2003-27, WZB Berlin Social Science Center.
- Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
- Stefano Barbieri & David Malueg & Iryna Topolyan, 2014. "The best-shot all-pay (group) auction with complete information," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 57(3), pages 603-640, November.
- Bergstrom, Theodore & Blume, Lawrence & Varian, Hal, 1986. "On the private provision of public goods," Journal of Public Economics, Elsevier, vol. 29(1), pages 25-49, February.
- Stefano Barbieri & David A. Malueg, 2019. "On the voluntary provision of “weakest‐link” public goods: The case of private information," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 21(5), pages 866-894, October.
- Kolmar, Martin & Rommeswinkel, Hendrik, 2013. "Contests with group-specific public goods and complementarities in efforts," Journal of Economic Behavior & Organization, Elsevier, vol. 89(C), pages 9-22.
- Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
- Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
- Tore Ellingsen, 2008.
"Strategic Buyers and the Social Cost of Monopoly,"
Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 399-408,
Springer.
- Ellingsen, Tore, 1991. "Strategic Buyers and the Social Cost of Monopoly," American Economic Review, American Economic Association, vol. 81(3), pages 648-657, June.
- Ellingsen, T., 1990. "Strategic Buyers and the Social Cost of Monopoly," Papers 05-90, Norwegian School of Economics and Business Administration-.
- Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
- Konrad, Kai A., 2014.
"Search duplication in research and design spaces — Exploring the role of local competition,"
International Journal of Industrial Organization, Elsevier, vol. 37(C), pages 222-228.
- Kai A. Konrad, 2014. "Search Duplication in Research and Design Spaces - Exploring the Role of Local Competition," Working Papers tax-mpg-rps-2014-19, Max Planck Institute for Tax Law and Public Finance.
- Konrad, Kai A., 2014. "Search duplication in research and design spaces - Exploring the role of local competition," Munich Reprints in Economics 22066, University of Munich, Department of Economics.
- Kjell Hausken, 2019. "Defence and attack of complex interdependent systems," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(3), pages 364-376, March.
- Katz, Eliakim & Nitzan, Shmuel & Rosenberg, Jacob, 1990. "Rent-Seeking for Pure Public Goods," Public Choice, Springer, vol. 65(1), pages 49-60, April.
- Joan Esteban & Debraj Ray, 2008.
"Collective Action and the Group Size Paradox,"
Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 379-388,
Springer.
- Esteban, Joan & Ray, Debraj, 2001. "Collective Action and the Group Size Paradox," American Political Science Review, Cambridge University Press, vol. 95(3), pages 663-672, September.
- Esteban, J. & Ray, D., 1999. "Collective Action and Group Size Paradox," Papers 23, El Instituto de Estudios Economicos de Galicia Pedro Barrie de la Maza.
- Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
- Barut, Yasar & Kovenock, Dan, 1998. "The symmetric multiple prize all-pay auction with complete information," European Journal of Political Economy, Elsevier, vol. 14(4), pages 627-644, November.
- Barbieri, Stefano & Malueg, David A., 2016. "Private-information group contests: Best-shot competition," Games and Economic Behavior, Elsevier, vol. 98(C), pages 219-234.
- Charlinda Santifort & Todd Sandler & Patrick T Brandt, 2013. "Terrorist attack and target diversity," Journal of Peace Research, Peace Research Institute Oslo, vol. 50(1), pages 75-90, January.
- Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
- Dan Kovenock J. & Brian Roberson, 2010.
"Conflicts with Multiple Battlefields,"
CESifo Working Paper Series
3165, CESifo.
- Dan Kovenock & Brian Roberson, 2010. "Conflicts with Multiple Battlefields," Purdue University Economics Working Papers 1246, Purdue University, Department of Economics.
- Stefano Barbieri & David A. Malueg, 2016. "Private Information in the BBV Model of Public Goods," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 18(6), pages 857-881, December.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Baik, Kyung Hwan & Kim, In-Gyu & Na, Sunghyun, 2001. "Bidding for a group-specific public-good prize," Journal of Public Economics, Elsevier, vol. 82(3), pages 415-429, December.
- Clark, Derek J & Riis, Christian, 1998. "Competition over More Than One Prize," American Economic Review, American Economic Association, vol. 88(1), pages 276-289, March.
- Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.
- Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
- Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
- Subhasish M. Chowdhury & Iryna Topolyan, 2016. "The Attack-And-Defense Group Contests: Best Shot Versus Weakest Link," Economic Inquiry, Western Economic Association International, vol. 54(1), pages 548-557, January.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
- Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
- Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
- Konrad, Kai A. & Morath, Florian, 2023.
"How to preempt attacks in multi-front conflict with limited resources,"
European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
- Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
- Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Konrad, Kai A. & Morath, Florian, 2023.
"How to preempt attacks in multi-front conflict with limited resources,"
European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
- Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
- Konrad, Kai A., 2007. "Strategy in contests: an introduction [Strategie in Turnieren – eine Einführung]," Discussion Papers, Research Unit: Market Processes and Governance SP II 2007-01, WZB Berlin Social Science Center.
- Baik, Kyung Hwan & Jung, Hanjoon Michael, 2021. "Contests with multiple alternative prizes: Public-good/bad prizes and externalities," Journal of Mathematical Economics, Elsevier, vol. 92(C), pages 103-116.
- Arye L. Hillman & Ngo Van Long, 2017. "Rent Seeking: The Social Cost of Contestable Benefits," CESifo Working Paper Series 6462, CESifo.
- Barbieri, Stefano & Malueg, David A., 2016. "Private-information group contests: Best-shot competition," Games and Economic Behavior, Elsevier, vol. 98(C), pages 219-234.
- Eliaz, Kfir & Wu, Qinggong, 2018. "A simple model of competition between teams," Journal of Economic Theory, Elsevier, vol. 176(C), pages 372-392.
- Arye Hillman & Ngo Van Long, 2017. "The social cost of contestable benefits," CIRANO Working Papers 2017s-11, CIRANO.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
- Brookins, Philip & Jindapon, Paan, 2021. "Risk preference heterogeneity in group contests," Journal of Mathematical Economics, Elsevier, vol. 95(C).
- Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Subhasish M. Chowdhury & Dongryul Lee & Iryna Topolyan, 2016. "The Max‐Min Group Contest: Weakest‐link (Group) All‐Pay Auction," Southern Economic Journal, John Wiley & Sons, vol. 83(1), pages 105-125, July.
- Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
- Subhasish M. Chowdhury & Iryna Topolyan, 2016. "Best-shot versus weakest-link in political lobbying: an application of group all-pay auction," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 47(4), pages 959-971, December.
- Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
- Konrad, Kai A., 2020.
"Attacking and defending multiple valuable secrets in a big data world,"
European Journal of Operational Research, Elsevier, vol. 280(3), pages 1122-1129.
- Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
More about this item
Keywords
Attack-and-defence; multiple targets; IT-Systems; Hackers; Private defence; Overarching defence; Deflection of attack;All these keywords.
JEL classification:
- C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games
- D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
- D82 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Asymmetric and Private Information; Mechanism Design
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:204:y:2020:i:c:s0951832020307067. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.