Defending a single object in a defender-attacker game considering time

Many game theoretic models have been proposed to model the interplay between players using false targets. Time, as an important factor, tends to be ignored in the modeling process. This paper fills the gap by analyzing the optimal attack time in a two-period strategic defender-attacker game. In the first period, the attacker spends time and efforts in identifying false targets. Meanwhile, the defender invests efforts in deception or defense to deploy more false targets or strengthen the genuine target, respectively. In the second period, the attacker allocates resources evenly among all the undetected targets. We model and obtain analytical equilibrium results under the basic assumptions to verify the effectiveness and feasibility of the proposed model. Comparative study is also carried out to verify the influences of various parameters on the equilibrium. The results can provide decision makers with more insights into making enhanced policy- making decisions and improving the resource allocation process.

[1]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[2]  Gregory Levitin,et al.  Defending a single object against an attacker trying to detect a subset of false targets , 2016, Reliab. Eng. Syst. Saf..

[3]  Xiaojun Shan,et al.  Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..

[4]  Chen Wang,et al.  Expert Elicitation of Adversary Preferences Using Ordinal Judgments , 2013, Oper. Res..

[5]  Gregory Levitin,et al.  Is it wise to leave some false targets unprotected? , 2013, Reliab. Eng. Syst. Saf..

[6]  Gregory Levitin,et al.  False targets efficiency in defense strategy , 2009, Eur. J. Oper. Res..

[7]  Jun Wu,et al.  Attacker-defender game from a network science perspective. , 2018, Chaos.

[8]  Kjell Hausken Defence and attack of complex interdependent systems , 2019, J. Oper. Res. Soc..

[9]  S. Skaperdas Contest success functions , 1996 .

[10]  Bingfeng Ge,et al.  Consensus building in group decision making based on multiplicative consistency with incomplete reciprocal preference relations , 2016, Knowl. Based Syst..

[11]  Yuejin Tan,et al.  A game‐theoretic model for resource allocation with deception and defense efforts , 2019, Syst. Eng..

[12]  Jie Xu,et al.  Modeling costly learning and counter-learning in a defender-attacker game with private defender information , 2016, Ann. Oper. Res..

[13]  Gregory Levitin,et al.  Optimal defence of single object with imperfect false targets , 2011, J. Oper. Res. Soc..