Contagion and observability in security domains

We examine security domains where defenders choose their security levels in the face of a possible attack by an adversary who attempts to destroy as many of them as possible. Though the attacker only selects one target, and only has a certain probability of destroying it depending on that defender's security level, a successful attack may infect other defenders. By choosing a higher security level the defenders increase their probability of survival, but incur a higher cost of security. We assume that the adversary observes the security levels chosen by the defenders before selecting whom to attack. We show that under this assumption the defenders over-protect themselves, exhausting all their surplus, so optimal policy requires taxing security, as opposed to the subsidies recommended by alternative models for contagious attacks which do not take into account the attacker's ability to observe the defenders' choices.

[1]  Todd Sandler,et al.  Chapter 20 Defense in a Globalized World: An Introduction , 2007 .

[2]  B. Roberson The Colonel Blotto game , 2006 .

[3]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[4]  S. Skaperdas Contest success functions , 1996 .

[5]  Yevgeniy Vorobeychik,et al.  Computing Optimal Security Strategies for Interdependent Assets , 2012, UAI.

[6]  Dan Kovenock,et al.  Suicide Terrorism and the Weakest Link , 2009, SSRN Electronic Journal.

[7]  Nicolas Christin,et al.  Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents , 2008, WEIS.

[8]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[9]  Sven Leyffer,et al.  Solving Multi-Leader-Follower Games , 2005 .

[10]  Sergiu Hart,et al.  Discrete Colonel Blotto and General Lotto games , 2008, Int. J. Game Theory.

[11]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[12]  Marc Lelarge,et al.  Network externalities and the deployment of security features and protocols in the internet , 2008, SIGMETRICS '08.

[13]  Todd Sandler,et al.  Handbook of Defense Economics , 1995 .

[14]  Sajal K. Das,et al.  Decision and Game Theory for Security , 2013, Lecture Notes in Computer Science.

[15]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[16]  Marc Lelarge,et al.  Economics of malware: Epidemic risks model, network externalities and incentives , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  Tim Roughgarden,et al.  Selfish routing and the price of anarchy , 2005 .

[18]  Stefan Arnborg,et al.  Bayesian Games for Threat Prediction and Situation Analysis , 2004 .

[19]  G. Tullock THE WELFARE COSTS OF TARIFFS, MONOPOLIES, AND THEFT , 1967 .

[20]  Vincent Conitzer,et al.  Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..

[21]  Sarit Kraus,et al.  An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.

[22]  Derek J. Clark,et al.  Asymmetric Conflict , 2007 .

[23]  Robert Powell,et al.  Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..

[24]  Vincent Conitzer,et al.  Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.

[25]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[26]  Debraj Ray,et al.  A Model of Ethnic Conflict , 2011 .

[27]  T. Sandler,et al.  Collective Action and Transnational Terrorism , 2003 .

[28]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[29]  Bo An,et al.  An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..

[30]  Firouz Gahvari,et al.  On Optimal Commodity Taxes When Consumption is Time Consuming , 2005 .

[31]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[32]  A. Dixit Strategic Behavior in Contests: Reply , 1999 .

[33]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[34]  Nicolas Christin,et al.  Uncertainty in Interdependent Security Games , 2010, GameSec.

[35]  R. Tollison,et al.  Toward a theory of the rent-seeking society , 1982 .

[36]  Martin Shubik,et al.  Systems Defense Games: Colonel Blotto, Command and Control , 1981 .

[37]  G. Tullock Efficient Rent Seeking , 2001 .

[38]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[39]  Timothy W. McLain,et al.  Multiple UAV cooperative search under collision avoidance and limited range communication constraints , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[40]  Luis E. Ortiz,et al.  Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks , 2012, UAI.

[41]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[42]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[43]  Milind Tambe,et al.  Urban Security: Game-Theoretic Resource Allocation in Networked Domains , 2010, AAAI.