Advanced Search
MyIDEAS: Login to save this article or follow this journal

False targets efficiency in defense strategy

Contents:

Author Info

  • Levitin, Gregory
  • Hausken, Kjell

Abstract

The paper analyzes the efficiency of deploying false targets as part of a defense strategy. It is assumed that the defender has a single object that can be destroyed by the attacker. The defender distributes its resource between deploying false targets and protecting the object from outside attacks. The attacker cannot distinguish the false targets from the defended object (genuine target). Therefore the attacker has no preferences for attacking one target rather than another target. The defender decides how many false targets to deploy whereas the attacker decides how many targets to attack. The article assumes that both the defender and attacker have complete information and full rationality. The optimal number of false targets and the attacked targets are obtained for the case of fixed and variable resources of the defender and the attacker as solutions of a non-cooperative game between the two agents.

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://www.sciencedirect.com/science/article/B6VCT-4R98K5M-1/2/679ef42b045656673237baad08e8bb27
Download Restriction: Full text for ScienceDirect subscribers only

As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.

Bibliographic Info

Article provided by Elsevier in its journal European Journal of Operational Research.

Volume (Year): 194 (2009)
Issue (Month): 1 (April)
Pages: 155-162

as in new window
Handle: RePEc:eee:ejores:v:194:y:2009:i:1:p:155-162

Contact details of provider:
Web page: http://www.elsevier.com/locate/eor

Related research

Keywords: Game theory Vulnerability Defense Attack Protection False targets Decoy Contest success function;

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Hirshleifer, Jack, 1995. "Anarchy and Its Breakdown," Journal of Political Economy, University of Chicago Press, vol. 103(1), pages 26-52, February.
  2. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
  3. Drew Fudenberg & Jean Tirole, 1991. "Game Theory," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262061414, December.
  4. Stergios Skaperdas, 1996. "Contest success functions (*)," Economic Theory, Springer, vol. 7(2), pages 283-290.
  5. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
  6. Levitin, Gregory, 2003. "Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes," European Journal of Operational Research, Elsevier, vol. 150(2), pages 406-419, October.
  7. Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
  8. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
  9. Kunreuther, Howard & Heal, Geoffrey, 2003. " Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-49, March-May.
Full references (including those not matched with items on IDEAS)

Citations

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:194:y:2009:i:1:p:155-162. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Zhang, Lei).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.