Modeling costly learning and counter-learning in a defender-attacker game with private defender information

被引:32
|
作者
Xu, Jie [1 ]
Zhuang, Jun [1 ]
机构
[1] SUNY Buffalo, Dept Ind & Syst Engn, Buffalo, NY 14260 USA
基金
美国国家科学基金会;
关键词
Defender-attacker games; Costly learning; Counter-learning; Game theory; Value of perfect information; Value of imperfect information; SECURITY; SECRECY; EQUILIBRIUM; PROTECTION; DECEPTION; TERRORISM; SERIES; FACE;
D O I
10.1007/s10479-014-1722-3
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
In asymmetric war scenarios (e.g., counter-terrorism), the adversary usually invests a significant time to learn the system structure and identify vulnerable components, before launching attacks. Traditional game-theoretic defender-attacker models either ignore such learning periods or the entailed costs. This paper fills the gap by analyzing the strategic interactions of the terrorist's costly learning and defender's counter-learning and defense strategies in a game with private defender information. Our model allows six possible attacker strategies: (a) attack immediately; (b) learn and attack; (c) learn and not attack; (d) learn and attack when appearing vulnerable and not attack when appearing invulnerable; (e) learn and not attack when appearing vulnerable and attack when appearing invulnerable; and (f) not attack. Our results show that four of the six strategies (a, d, e, f) are possible at equilibrium and the other two (b, c) are strictly dominated. Interestingly, we find that the counterintuitive strategy (e) could be at equilibrium, especially when the probability that the target appears vulnerable given it is invulnerable is sufficiently high. Our results also show that the attacker's learning cost has a significant impact on oth the attacker's best responses and the defender's equilibrium deception and defense strategies. Finally, we study the attacker's values of perfect information and imperfect information, which provide additional insights for defense and counter-learning strategies.
引用
收藏
页码:271 / 289
页数:19
相关论文
共 23 条
  • [1] Modeling costly learning and counter-learning in a defender-attacker game with private defender information
    Jie Xu
    Jun Zhuang
    [J]. Annals of Operations Research, 2016, 236 : 271 - 289
  • [2] Dynamic Defender-Attacker Blotto Game
    Shishika, Daigo
    Guan, Yue
    Dorothy, Michael
    Kumar, Vijay
    [J]. 2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4422 - 4428
  • [3] Modeling and mitigating the effects of supply chain disruption in a defender-attacker game
    Xu, Jie
    Zhuang, Jun
    Liu, Zigeng
    [J]. ANNALS OF OPERATIONS RESEARCH, 2016, 236 (01) : 255 - 270
  • [4] The Effect of Behavioral Probability Weighting in a Sequential Defender-Attacker Game
    Abdallah, Mustafa
    Cason, Timothy
    Bagchi, Saurabh
    Sundaram, Shreyas
    [J]. 2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 3255 - 3260
  • [5] Defending a single object in a defender-attacker game considering time
    Zhang, Xiaoxiong
    Li, Xin
    Yuan, Zhen
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2019, : 506 - 510
  • [6] Path Defense in Dynamic Defender-Attacker Blotto Games (dDAB) with Limited Information
    Chen, Austin K.
    Ferguson, Bryce L.
    Shishika, Daigo
    Dorothy, Michael
    Marden, Jason R.
    Pappas, George J.
    Kumar, Vijay
    [J]. 2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 447 - 453
  • [7] Resource allocation among multiple targets for a defender-attacker game with false targets consideration
    Zhang, Xiaoxiong
    Ding, Song
    Ge, Bingfeng
    Xia, Boyuan
    Pedrycz, Witold
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 211
  • [8] The role of risk preferences in a multi-target defender-attacker resource allocation game
    Zhang, Jing
    Zhuang, Jun
    Jose, Victor Richmond R.
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 169 : 95 - 104
  • [9] Modeling a Multitarget Attacker-Defender Game with Budget Constraints
    Guan, Peiqiu
    He, Meilin
    Zhuang, Jun
    Hora, Stephen C.
    [J]. DECISION ANALYSIS, 2017, 14 (02) : 87 - 107
  • [10] Modeling multi-target defender-attacker games with quantal response attack strategies
    Zhang, Jing
    Wang, Yan
    Zhuang, Jun
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 205 (205)