Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data.

[1]  Jr. Louis Anthony Cox,et al.  Game Theory and Risk Analysis , 2009 .

[2]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[3]  Niyazi Onur Bakir A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry , 2008, Decis. Anal..

[4]  J. Harsanyi Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .

[5]  Vicki M. Bier,et al.  Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .

[6]  Jun Zhuang,et al.  Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors , 2010 .

[7]  Arkadi Nemirovski,et al.  Robust solutions of uncertain linear programs , 1999, Oper. Res. Lett..

[8]  K. Hausken Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[9]  Melvyn Sim,et al.  Robust discrete optimization and network flows , 2003, Math. Program..

[10]  Rae Zimmerman,et al.  Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[11]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[12]  Gregory S Parnell,et al.  Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[13]  Jason R. W. Merrick,et al.  A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[14]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[15]  John R Hall The elephant in the room is called game theory. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[16]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[17]  Chen Wang,et al.  Impact of intelligence on target-hardening decisions , 2009, 2009 IEEE Conference on Technologies for Homeland Security.

[18]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[19]  Dimitris Bertsimas,et al.  A Robust Optimization Approach to Inventory Theory , 2006, Oper. Res..

[20]  Arkadi Nemirovski,et al.  Robust Convex Optimization , 1998, Math. Oper. Res..

[21]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[22]  Gregory Levitin,et al.  Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts , 2009, IEEE Transactions on Reliability.

[23]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[24]  Melvyn Sim,et al.  The Price of Robustness , 2004, Oper. Res..

[25]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[26]  Allen L. Soyster,et al.  Technical Note - Convex Programming with Set-Inclusive Constraints and Applications to Inexact Linear Programming , 1973, Oper. Res..

[27]  Gregory Levitin,et al.  False targets efficiency in defense strategy , 2009, Eur. J. Oper. Res..

[28]  Jun Zhuang,et al.  Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[29]  Henry H. Willis,et al.  Estimating Terrorism Risk , 2002 .

[30]  B. Roberson The Colonel Blotto game , 2006 .

[31]  George B. Dantzig,et al.  Linear Programming Under Uncertainty , 2004, Manag. Sci..

[32]  Peter Kall,et al.  Stochastic Programming , 1995 .

[33]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[34]  Ralph L Keeney,et al.  Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[35]  Martin Shubik,et al.  Systems Defense Games: Colonel Blotto, Command and Control , 1981 .

[36]  Jun Zhuang,et al.  Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .

[37]  John A. Sokolowski,et al.  Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[38]  Roberto Szechtman,et al.  Confronting Entrenched Insurgents , 2010, Oper. Res..

[39]  Vicki M. Bier,et al.  Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..

[40]  Bernard Harris Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[41]  Gregory Levitin,et al.  Resource Distribution in Multiple Attacks Against a Single Target , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[42]  Kai A. Konrad The Investment Problem in Terrorism , 2004 .

[43]  Uriel G. Rothblum,et al.  Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..

[44]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[45]  Donald Goldfarb,et al.  Robust convex quadratically constrained programs , 2003, Math. Program..