Attacker Deterrence and Perceived Risk in a Stackelberg Security Game

In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense involves the randomization of scarce security resources, yet how attackers perceive the risk given randomized defense is not well understood. We conducted an experiment where attackers chose whether to attack or not attack targets protected by randomized defense schemes, the key treatment variable being whether the defender picks one target at random to guard or imperfectly guards all targets. The two schemes are expected-payoff equivalent, and when provided separately we found no effect of having one scheme or the other. Yet, when both are present, we found that subjects had a preference for the fixed scheme, a preference that cannot be reduced to differences in beliefs. Overall, our results suggest that understanding how individuals perceive risk is vital to understand the behavior of attackers.

[1]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[2]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[3]  A. Tversky,et al.  The Causes of Preference Reversal , 1990 .

[4]  Roman M. Sheremeta,et al.  An experimental investigation of Colonel Blotto games , 2009, SSRN Electronic Journal.

[5]  Melissa L. Finucane,et al.  Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[6]  Sajal K. Das,et al.  Decision and Game Theory for Security , 2013, Lecture Notes in Computer Science.

[7]  É. Borel The Theory of Play and Integral Equations with Skew Symmetric Kernels , 1953 .

[8]  Yaakov Kareev,et al.  Do the Weak Stand a Chance? Distribution of Resources in a Competitive Environment , 2009, Cogn. Sci..

[9]  Xiaojun Shan,et al.  Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection - A Three-Stage Game , 2014, Decis. Anal..

[10]  Michael Caldara Bidding Behavior in Pay-to-Bid Auctions: An Experimental Study , 2012 .

[11]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[12]  S. Epstein Integration of the cognitive and the psychodynamic unconscious. , 1994, The American psychologist.

[13]  Christopher K. Hsee,et al.  Distinction Bias: Misprediction and Mischoice Due to Joint Evaluation , 2004 .

[14]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[15]  Martin Shubik,et al.  Systems Defense Games: Colonel Blotto, Command and Control , 1981 .

[16]  Pern Hui Chia,et al.  Colonel Blotto in the Phishing War , 2011, GameSec.

[17]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[18]  Jeffrey M. Wooldridge,et al.  Solutions Manual and Supplementary Materials for Econometric Analysis of Cross Section and Panel Data , 2003 .

[19]  Robert Powell Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..

[20]  A. Tversky,et al.  Contingent weighting in judgment and choice , 1988 .

[21]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[22]  Gelder van J.-L,et al.  Evaluating a dual-process model of risk: affect and cognition as determinants of risky choice , 2009 .

[23]  Richard S John,et al.  Perceptions of Randomized Security Schedules , 2014, Risk analysis : an official publication of the Society for Risk Analysis.

[24]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[25]  D. Kahneman A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.

[26]  Zora A. Sukabdi,et al.  Basic concepts and reasons behind the emergence of religious terror activities in Indonesia: An inside view , 2013 .

[27]  Dan Kovenock,et al.  Weakest‐link attacker‐defender games with multiple attack technologies , 2012 .

[28]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.

[29]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[30]  U. Fischbacher z-Tree: Zurich toolbox for ready-made economic experiments , 1999 .

[31]  Rae Zimmerman,et al.  Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[32]  K. J. Ray Liu,et al.  Optimal power allocation strategy against jamming attacks using the Colonel Blotto game , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[33]  Dennis M. Foster,et al.  Ballots, Bargains, and Bombs: Terrorist Targeting of Spoiler Opportunities , 2010 .

[34]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[35]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[36]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[37]  Oded Berman,et al.  Location of terror response facilities: A game between state and terrorist , 2007, Eur. J. Oper. Res..

[38]  P. Slovic,et al.  Risk Perception and Affect , 2006 .

[39]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[40]  B. Roberson The Colonel Blotto game , 2006 .

[41]  Menusch Khadjavi Deterrence works for criminals , 2018 .

[42]  Catherine C. Eckel,et al.  Forecasting Risk Attitudes: An Experimental Study Using Actual and Forecast Gamble Choices , 2008 .

[43]  K. Stanovich,et al.  Heuristics and Biases: Individual Differences in Reasoning: Implications for the Rationality Debate? , 2002 .

[44]  Vicki M. Bier,et al.  Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .

[45]  Gregory J. DeAngelo,et al.  Deterrence, expected cost, uncertainty and voting: Experimental evidence , 2012 .

[46]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[47]  Jeffrey M. Woodbridge Econometric Analysis of Cross Section and Panel Data , 2002 .

[48]  J. Pligt,et al.  Evaluating a dual-process model of risk: affect and cognition as determinants of risky choice , 2009 .

[49]  Lana Friesen,et al.  Certainty of Punishment versus Severity of Punishment: An Experimental Investigation , 2012 .

[50]  Paul Slovic,et al.  The affect heuristic , 2007, Eur. J. Oper. Res..

[51]  Kjell Hausken,et al.  The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..