Adversarial Risk Analysis for Enhancing Combat Simulation Models

Abstract Adversarial Risk Analysis (ARA) builds on statistical risk analysis and game theory to analyze decision situations involving two or more intelligent opponents who make decisions under uncertainty. During the past few years, the ARA approach-which is based on the explicit modelling of the decision making processes of a rational opponent-has been applied extensively in areas such as counterterrorism and corporate competition. In the context of military combat modelling, however, ARA has not been used systematically, even if there have been attempts to predict the opponent’s decisions based on wargaming, application of game theoretic equilibria, and the use of expert judgements. Against this backdrop, we argue that combining ARA with military combat modelling holds promise for enhancing the capabilities of combat modelling tools. We identify ways of combining ARA with combat modelling and give an illustrative example of how ARA can provide insights into a problem where the defender needs to estimate the utility gained from hiding its troop movements from the attacker. Even if the ARA approach can be challenging to apply, it can be instructive in that relevant assumptions about the resources, expectations and goals that guide the adversary’s decisions must be explicated.

[1]  David Banks,et al.  Adversarial risk analysis: Borel games , 2011 .

[2]  Bernt Åkesson,et al.  COMPARING SIMULATED RESULTS AND ACTUAL BATTLE EVENTS FROM 1944 – A case study using Sandis software , 2015 .

[3]  Shahram Sarkani,et al.  Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent‐Based Simulation , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[4]  S. Meng,et al.  A game-theoretic approach to assess adversarial risks , 2014 .

[5]  Casey Rothschild,et al.  Adversarial risk analysis with incomplete information: a level-k approach. , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[6]  Paul K. Davis,et al.  The Base of Sand Problem: A White Paper on the State of Military Combat Modeling , 1991 .

[7]  Alan R. Washburn,et al.  Combat Modeling , 2009 .

[8]  R. Hall,et al.  Survey of Literature on Strategic Decision Making in the Presence of Adversaries Survey of Literature on Strategic Decision Making in the Presence of Adversaries Create Interim Report , 2005 .

[9]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[10]  Sarit Kraus,et al.  The adversarial activity model for bounded rational agents , 2010, Autonomous Agents and Multi-Agent Systems.

[11]  Ronald A. Howard,et al.  Analysis of National Strategies to Counter a Country's Nuclear Weapons Program , 2011, Decis. Anal..

[12]  Ronald A. Howard,et al.  Influence Diagrams , 2005, Decis. Anal..

[13]  David Banks,et al.  Adversarial Risk Analysis , 2015, IWSPA@CODASPY.

[14]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[15]  Debopam Bhattacharya,et al.  Inferring Optimal Peer Assignment From Experimental Data , 2009 .

[16]  Dan Kovenock,et al.  Conflicts with Multiple Battlefields , 2010, SSRN Electronic Journal.

[17]  Michael Buro,et al.  Fast Heuristic Search for RTS Game Combat Scenarios , 2012, AIIDE.

[18]  Patrick D. Larkey,et al.  Subjective Probability and the Theory of Games , 1982 .

[19]  Bernt Åkesson,et al.  An approximative method of simulating a duel , 2012, Proceedings Title: Proceedings of the 2012 Winter Simulation Conference (WSC).

[20]  William Reese 5 – Deception in a Game Theoretic Framework , 1981 .

[21]  Jesus Rios,et al.  Adversarial Risk Analysis for Counterterrorism Modeling , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[22]  Gerald G. Brown,et al.  The Fast Theater Model (FATHM) , 2007 .

[23]  Ahti Salo,et al.  Cost-efficiency analysis of weapon system portfolios , 2012, Eur. J. Oper. Res..

[24]  Esa Lappi Computational methods for tactical simulations , 2012 .

[25]  Andreas Tolk,et al.  Tutorial on the engineering principles of combat modeling and distributed simulation , 2016, 2016 Winter Simulation Conference (WSC).

[26]  Juho Roponen,et al.  Kaksintaistelun approksimatiivinen mallintaminen , 2013 .

[27]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[28]  Uriel G. Rothblum,et al.  Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..

[29]  Eugene Santos,et al.  Adversarial Models for Opponent Intent Inferencing , 2006 .

[30]  ปิยดา สมบัติวัฒนา Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .