IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v204y2020ics0951832020307067.html
   My bibliography  Save this article

Devil take the hindmost: Deflecting attacks to other defenders

Author

Listed:
  • Bose, Gautam
  • Konrad, Kai A.

Abstract

We study the indirect strategic interactions between several defenders and between several attackers if each attacker chooses one defender to attack and the force of the attack. If the target choice is based on observations about chosen defence efforts, this choice behavior incentivizes the individual defenders and the defenders compete against each other to not being among the weakest targets. If defence effort is unobservable, this competition between defenders is absent. We also compare the fully non-cooperative equilibria with the outcome if the defenders cooperate and study possible non-cooperative contributions to collective defence.

Suggested Citation

  • Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
  • Handle: RePEc:eee:reensy:v:204:y:2020:i:c:s0951832020307067
    DOI: 10.1016/j.ress.2020.107205
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832020307067
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2020.107205?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    2. H. Peyton Young & Shmuel Zamir (ed.), 2015. "Handbook of Game Theory with Economic Applications," Handbook of Game Theory with Economic Applications, Elsevier, edition 1, volume 4, number 4.
    3. Dan Kovenock & Michael R. Baye & Casper G. de Vries, 1996. "The all-pay auction with complete information (*)," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 8(2), pages 291-305.
    4. Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
    5. Konrad, Kai A. & Kovenock, Dan, 2012. "The lifeboat problem," European Economic Review, Elsevier, vol. 56(3), pages 552-559.
    6. Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
    7. Kolmar, Martin & Rommeswinkel, Hendrik, 2013. "Contests with group-specific public goods and complementarities in efforts," Journal of Economic Behavior & Organization, Elsevier, vol. 89(C), pages 9-22.
    8. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    9. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    10. Ellingsen, Tore, 1991. "Strategic Buyers and the Social Cost of Monopoly," American Economic Review, American Economic Association, vol. 81(3), pages 648-657, June.
    11. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    12. Nitzan, Shmuel, 1991. "Collective Rent Dissipation," Economic Journal, Royal Economic Society, vol. 101(409), pages 1522-1534, November.
    13. Konrad, Kai A., 2014. "Search duplication in research and design spaces — Exploring the role of local competition," International Journal of Industrial Organization, Elsevier, vol. 37(C), pages 222-228.
    14. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    15. Barut, Yasar & Kovenock, Dan, 1998. "The symmetric multiple prize all-pay auction with complete information," European Journal of Political Economy, Elsevier, vol. 14(4), pages 627-644, November.
    16. Brian Roberson, 2006. "The Colonel Blotto game," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 29(1), pages 1-24, September.
    17. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    18. Dan Kovenock & Brian Roberson, 2010. "Conflicts with Multiple Battlefields," Purdue University Economics Working Papers 1246, Purdue University, Department of Economics.
    19. Baik, Kyung Hwan & Kim, In-Gyu & Na, Sunghyun, 2001. "Bidding for a group-specific public-good prize," Journal of Public Economics, Elsevier, vol. 82(3), pages 415-429, December.
    20. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    21. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    22. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    23. repec:wly:soecon:v:83:1:y:2016:p:105-125 is not listed on IDEAS
    24. Konrad, Kai A., 2020. "Attacking and defending multiple valuable secrets in a big data world," European Journal of Operational Research, Elsevier, vol. 280(3), pages 1122-1129.
    25. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    26. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    27. Qiang Fu & Jingfeng Lu & Yue Pan, 2015. "Team Contests with Multiple Pairwise Battles," American Economic Review, American Economic Association, vol. 105(7), pages 2120-2140, July.
    28. Ray, Debraj & Vohra, Rajiv, 2015. "Coalition Formation," Handbook of Game Theory with Economic Applications,, Elsevier.
    29. Kjell Hausken, 2011. "Strategic defense and attack of series systems when agents move sequentially," IISE Transactions, Taylor & Francis Journals, vol. 43(7), pages 483-504.
    30. Konrad, Kai A., 2004. "Bidding in hierarchies," European Economic Review, Elsevier, vol. 48(6), pages 1301-1308, December.
    31. Stefano Barbieri & David Malueg & Iryna Topolyan, 2014. "The best-shot all-pay (group) auction with complete information," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 57(3), pages 603-640, November.
    32. Bergstrom, Theodore & Blume, Lawrence & Varian, Hal, 1986. "On the private provision of public goods," Journal of Public Economics, Elsevier, vol. 29(1), pages 25-49, February.
    33. Stefano Barbieri & David A. Malueg, 2019. "On the voluntary provision of “weakest‐link” public goods: The case of private information," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 21(5), pages 866-894, October.
    34. Kjell Hausken, 2019. "Defence and attack of complex interdependent systems," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(3), pages 364-376, March.
    35. Katz, Eliakim & Nitzan, Shmuel & Rosenberg, Jacob, 1990. "Rent-Seeking for Pure Public Goods," Public Choice, Springer, vol. 65(1), pages 49-60, April.
    36. Esteban, Joan & Ray, Debraj, 2001. "Collective Action and the Group Size Paradox," American Political Science Review, Cambridge University Press, vol. 95(3), pages 663-672, September.
    37. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    38. Barbieri, Stefano & Malueg, David A., 2016. "Private-information group contests: Best-shot competition," Games and Economic Behavior, Elsevier, vol. 98(C), pages 219-234.
    39. Charlinda Santifort & Todd Sandler & Patrick T Brandt, 2013. "Terrorist attack and target diversity," Journal of Peace Research, Peace Research Institute Oslo, vol. 50(1), pages 75-90, January.
    40. Stefano Barbieri & David A. Malueg, 2016. "Private Information in the BBV Model of Public Goods," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 18(6), pages 857-881, December.
    41. Clark, Derek J & Riis, Christian, 1998. "Competition over More Than One Prize," American Economic Review, American Economic Association, vol. 88(1), pages 276-289, March.
    42. Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.
    43. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    44. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    45. Subhasish M. Chowdhury & Iryna Topolyan, 2016. "The Attack-And-Defense Group Contests: Best Shot Versus Weakest Link," Economic Inquiry, Western Economic Association International, vol. 54(1), pages 548-557, January.
    46. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    47. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    48. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
    49. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
    2. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    3. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    2. Konrad, Kai A. & Morath, Florian, 2023. "How to preempt attacks in multi-front conflict with limited resources," European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
    3. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    4. Konrad, Kai A., 2007. "Strategy in contests: an introduction [Strategie in Turnieren – eine Einführung]," Discussion Papers, Research Unit: Market Processes and Governance SP II 2007-01, WZB Berlin Social Science Center.
    5. Baik, Kyung Hwan & Jung, Hanjoon Michael, 2021. "Contests with multiple alternative prizes: Public-good/bad prizes and externalities," Journal of Mathematical Economics, Elsevier, vol. 92(C), pages 103-116.
    6. Arye L. Hillman & Ngo Van Long, 2017. "Rent Seeking: The Social Cost of Contestable Benefits," CESifo Working Paper Series 6462, CESifo.
    7. Barbieri, Stefano & Malueg, David A., 2016. "Private-information group contests: Best-shot competition," Games and Economic Behavior, Elsevier, vol. 98(C), pages 219-234.
    8. Eliaz, Kfir & Wu, Qinggong, 2018. "A simple model of competition between teams," Journal of Economic Theory, Elsevier, vol. 176(C), pages 372-392.
    9. Arye Hillman & Ngo Van Long, 2017. "The social cost of contestable benefits," CIRANO Working Papers 2017s-11, CIRANO.
    10. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    11. Brookins, Philip & Jindapon, Paan, 2021. "Risk preference heterogeneity in group contests," Journal of Mathematical Economics, Elsevier, vol. 95(C).
    12. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    13. Subhasish M. Chowdhury & Dongryul Lee & Iryna Topolyan, 2016. "The Max‐Min Group Contest: Weakest‐link (Group) All‐Pay Auction," Southern Economic Journal, John Wiley & Sons, vol. 83(1), pages 105-125, July.
    14. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    15. Subhasish M. Chowdhury & Iryna Topolyan, 2016. "Best-shot versus weakest-link in political lobbying: an application of group all-pay auction," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 47(4), pages 959-971, December.
    16. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    17. Konrad, Kai A., 2020. "Attacking and defending multiple valuable secrets in a big data world," European Journal of Operational Research, Elsevier, vol. 280(3), pages 1122-1129.
    18. Stefano Barbieri & David Malueg & Iryna Topolyan, 2014. "The best-shot all-pay (group) auction with complete information," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 57(3), pages 603-640, November.
    19. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    20. Emmanuel Dechenaux & Dan Kovenock & Roman Sheremeta, 2015. "A survey of experimental research on contests, all-pay auctions and tournaments," Experimental Economics, Springer;Economic Science Association, vol. 18(4), pages 609-669, December.

    More about this item

    Keywords

    Attack-and-defence; multiple targets; IT-Systems; Hackers; Private defence; Overarching defence; Deflection of attack;
    All these keywords.

    JEL classification:

    • C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games
    • D74 - Microeconomics - - Analysis of Collective Decision-Making - - - Conflict; Conflict Resolution; Alliances; Revolutions
    • D82 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Asymmetric and Private Information; Mechanism Design

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:204:y:2020:i:c:s0951832020307067. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.