IDEAS home Printed from https://ideas.repec.org/p/van/wpaper/1010.html
   My bibliography  Save this paper

Strategic Network Interdiction

Author

Listed:
  • Sunghoon Hong

    (Department of Economics, Vanderbilt University)

  • Myrna Wooders

    (Department of Economics, Vanderbilt University)

Abstract

We develop a strategic model of network interdiction in a non-cooperative game of flow. A security agency operates a network with arc capacities. An adversary, endowed with a bounded quantity of bads, chooses a flow that specifies a plan for carrying bads through the network from a base to a target. Simultaneously, the agency chooses a blockage, which specifies a plan for blocking the transport of bads through arcs in the network. However, the blockage of arcs disrupts the operation of the network. The adversary gains and the agency loses from the target damage and the network disruption. The adversary incurs the expense of carrying bads. We characterize the Nash equilibria in terms of the primitives of our model. Our model contributes to the literature of game theory by introducing non-cooperative behavior into a Kalai-Zemel type mode of a (cooperative) game of flow. Our research also advances models and results on network interdiction.

Suggested Citation

  • Sunghoon Hong & Myrna Wooders, 2010. "Strategic Network Interdiction," Vanderbilt University Department of Economics Working Papers 1010, Vanderbilt University Department of Economics.
  • Handle: RePEc:van:wpaper:1010
    as

    Download full text from publisher

    File URL: http://www.accessecon.com/pubs/VUECON/vu10-w10.pdf
    File Function: First version, June 2010
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Coralio Ballester & Antoni Calvó-Armengol & Yves Zenou, 2006. "Who's Who in Networks. Wanted: The Key Player," Econometrica, Econometric Society, vol. 74(5), pages 1403-1417, September.
    2. Aaron Clauset & Maxwell Young & Kristian Skrede Gleditsch, 2007. "On the Frequency of Severe Terrorist Events," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 58-87, February.
    3. Mariagiovanna Baccara & Heski Bar-Isaac, 2008. "How to Organize Crime -super-1," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 75(4), pages 1039-1067.
    4. Alan Washburn & Kevin Wood, 1995. "Two-Person Zero-Sum Games for Network Interdiction," Operations Research, INFORMS, vol. 43(2), pages 243-251, April.
    5. Heski Bar-Isaac & Mariagiovanna Baccara, 2008. "Interrogation Methods and Terror Networks," Working Papers 08-8, New York University, Leonard N. Stern School of Business, Department of Economics.
    6. Heski Bar-Isaac & Mariagiovanna Baccara, 2006. "How to Organize Crime," Working Papers 06-07, New York University, Leonard N. Stern School of Business, Department of Economics.
    7. Ehud Kalai & Eitan Zemel, 1982. "Generalized Network Problems Yielding Totally Balanced Games," Operations Research, INFORMS, vol. 30(5), pages 998-1008, October.
    8. Kelly J. Cormican & David P. Morton & R. Kevin Wood, 1998. "Stochastic Network Interdiction," Operations Research, INFORMS, vol. 46(2), pages 184-197, April.
    9. Potters, Jos & Reijnierse, Hans & Biswas, Amit, 2006. "The nucleolus of balanced simple flow networks," Games and Economic Behavior, Elsevier, vol. 54(1), pages 205-225, January.
    10. Reijnierse, Hans & Maschler, Michael & Potters, Jos & Tijs, Stef, 1996. "Simple Flow Games," Games and Economic Behavior, Elsevier, vol. 16(2), pages 238-260, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Qizhi Fang & Bo Li & Xiaohan Shan & Xiaoming Sun, 2018. "Path cooperative games," Journal of Combinatorial Optimization, Springer, vol. 36(1), pages 211-229, July.
    2. Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016. "Network security and contagion," Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
    3. B. Hoyer, 2012. "Network Disruption and the Common Enemy Effect," Working Papers 12-06, Utrecht School of Economics.
    4. Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
    5. McBride, Michael & Hewitt, David, 2013. "The enemy you can’t see: An investigation of the disruption of dark networks," Journal of Economic Behavior & Organization, Elsevier, vol. 93(C), pages 32-50.
    6. Deng, Liuchun & Sun, Yufeng, 2017. "Criminal network formation and optimal detection policy: The role of cascade of detection," Journal of Economic Behavior & Organization, Elsevier, vol. 141(C), pages 43-63.
    7. Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
    8. Giovanni Mastrobuoni & Eleonora Patacchini, 2010. "Understanding Organized Crime Networks: Evidence Based on Federal Bureau of Narcotics Secret Files on American Mafia," Carlo Alberto Notebooks 152, Collegio Carlo Alberto.
    9. Goyal, S., 2016. "Networks and Markets," Cambridge Working Papers in Economics 1652, Faculty of Economics, University of Cambridge.
    10. Antonio Acconcia & Giovanni Immordino & Salvatore Piccolo & Patrick Rey, 2014. "Accomplice Witnesses and Organized Crime: Theory and Evidence from Italy," Scandinavian Journal of Economics, Wiley Blackwell, vol. 116(4), pages 1116-1159, October.
    11. Emilie Dargaud & Armel Jacques, 2015. "Endogenous firms’ organization, internal audit and leniency programs," Working Papers 1524, Groupe d'Analyse et de Théorie Economique Lyon St-Étienne (GATE Lyon St-Étienne), Université de Lyon.
    12. Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017. "Optimal design and defense of networks under link attacks," Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
    13. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    14. Laan, Corine M. & van der Mijden, Tom & Barros, Ana Isabel & Boucherie, Richard J. & Monsuur, Herman, 2017. "An interdiction game on a queueing network with multiple intruders," European Journal of Operational Research, Elsevier, vol. 260(3), pages 1069-1080.
    15. Salvatore Piccolo & Giovanni Immordino, 2012. "Optimal Accomplice-Witnesses Regulation under Asymmetric Information," CSEF Working Papers 304, Centre for Studies in Economics and Finance (CSEF), University of Naples, Italy.
    16. Matteo Fischetti & Ivana Ljubić & Michele Monaci & Markus Sinnl, 2019. "Interdiction Games and Monotonicity, with Application to Knapsack Problems," INFORMS Journal on Computing, INFORMS, vol. 31(2), pages 390-410, April.
    17. Mariagiovanna Baccara, 2007. "Outsourcing, information leakage, and consulting firms," RAND Journal of Economics, RAND Corporation, vol. 38(1), pages 269-289, March.
    18. D’Hernoncourt, Johanna & Méon, Pierre-Guillaume, 2012. "The not so dark side of trust: Does trust increase the size of the shadow economy?," Journal of Economic Behavior & Organization, Elsevier, vol. 81(1), pages 97-121.
    19. Abumoslem Mohammadi & Javad Tayyebi, 2019. "Maximum Capacity Path Interdiction Problem with Fixed Costs," Asia-Pacific Journal of Operational Research (APJOR), World Scientific Publishing Co. Pte. Ltd., vol. 36(04), pages 1-21, August.
    20. Belhaj, Mohamed & Deroïan, Frédéric, 2018. "Targeting the key player: An incentive-based approach," Journal of Mathematical Economics, Elsevier, vol. 79(C), pages 57-64.

    More about this item

    Keywords

    Network interdiction; Noncooperative game of flow; Blockage; Nash equilibrium; Kalai- Zemel game of flow;
    All these keywords.

    JEL classification:

    • C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games
    • D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
    • H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:van:wpaper:1010. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: John P. Conley (email available below). General contact details of provider: http://www.vanderbilt.edu/econ/wparchive/index.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.