Deterrence and Risk Preferences in Sequential Attacker “defender Games With Continuous Efforts Â
Innovative Applications of O.R.
Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker gameHighlights
► We develop a novel model where terrorists being either strategic or nonstrategic. ► The attack probabilities of a strategic terrorist are endogenously determined. ► The attack probabilities of a non-strategic terrorist are exogenously provided. ► We find that game models are preferred in almost all cases.
Introduction
Since September 11, 2001, homeland security in the United States has attracted hundreds of billions of dollars in expenditures (Fig. 1). The effectiveness of such large amounts of expenditure is frequently criticized as reflecting "pork-barrel politics", in which funds are directed towards low-risk targets for political reasons (e.g., McLaughlin, 2002; O'Beirne, 2003, de Rugy, 2005). Moreover, even though the DHS has implemented a risk-based method in guiding grant allocations since 2006, risk-related measures are still limited (U.S. Government Accountability Office, 2008).
Operations Research (OR) methods are useful in studying counter-terrorism. For example, Harris (2004) discussed the role of probabilistic risk analysis, randomization, and game theory in defending against terrorist attacks. Brown et al. (2005) developed a two-sided optimization model for pre-localization of defense missile platforms considering adaptive adversaries. Kaplan and Kress (2005) modeled and analyzed the operational effectiveness of suicide-bomber-detector schemes in reducing the casualties caused by suicide-bombing. Brown et al. (2005) developed bi-level and tri-level optimization models to study the defense strategies for critical infrastructures. Lin et al. (2009) built a M/G/1 queue to explore optimal scheduling policies for an antiterrorist surveillance system. Wein (2009) illustrated the close relationship between mathematical modeling and policy recommendations. Baveja and Wein (2009) evaluated and quantified the effectiveness of a two-finger, two-stage biometric strategy for the US-VISIT program using OR methods and Stakelberg game formulations. Jain et al. (2010) developed computer-aided randomized patrol planning systems for airplane transportation security. Recently, Kaplan (2010) employed queueing theory and Markov processes to study how undercover intelligence agents infiltrate and interdict terrorist plots.
One specific area of application of OR methods in homeland security is terrorism risk analysis. Traditional methods of decision and risk analysis do not explicitly take into account the ability of intelligent adversaries to adapt to defenses, and therefore, may overestimate the effectiveness of defensive measures. In contrast, while game theory has been widely applied in counter-terrorism analysis (Azaiez and Bier, 2007, Hausken, 2008, Sandler and Siqueira, 2009, Haphuriwat and Bier, 2011) and other strategic decision-making scenarios (Hausken and Zhuang, 2012), game-theoretic methods have been criticized as attributing excessive levels of knowledge and computational ability to potential terrorists (i.e., assuming players to be fully rational), and frequently recommending insufficient "hedging" (i.e., protecting against only the few most detrimental attack strategies). Similarly, the justification of defending low-risk targets as in "pork-barrel politics" from a game-theoretic perspective may depend critically on the assumption of game theory about terrorist's rationality, since irrational terrorists could attack low-risk targets even when that may not be optimal in a game-theoretic sense. Probably as a result, game theory has been less frequently mentioned in risk analysis in recent years (Hall, 2009).
In fact, game theory, and decision and risk analysis complement each other. Decision and risk analysis can model the probable outcomes of a game and evaluate the payoffs of those outcomes. On the other hand, instead of viewing adversary's decisions as random variables, game-theoretic formulation can help endogenously determine adversary's decisions (Cox, 2009).
One key difference between terrorism and natural disasters is that terrorists are intelligent and adaptive while natural disasters are not. As a result, a certain government's optimal strategies in the face of terrorism may significantly differ from the strategies adopted against natural disasters (Powell, 2007, Zhuang and Bier, 2007, Golany et al., 2009, Levitin and Hausken, 2009). Intelligence plays a key role in informing the government of whether, and how much, the terrorist is strategic (Kress and Szechtman, 2009). In particular, Kaplan et al. (2010) found that when the government's intelligence is poor, it would be easier for strategic insurgents to survive attacks by the government. Overall, decision and risk analysis is useful in devising strategies to deal with natural disasters or non-adaptive threats, while game theory is powerful when coping with terrorism or adaptive threats but usually strongly assumes that the terrorists are fully rational or strategic.
This paper pioneers a novel hybrid approach by integrating the game-theoretic and non-game-theoretic defense allocation models using an adjustable parameter to represent the probability that the terrorist might behave strategically (i.e., will adapt to the observed defense). As a first solid step toward tackling this important problem, we assume that the target government knows the probability of the attacker being strategic and has complete information about the probabilities that each target will be attacked by a non-strategic attacker. Note that the main difference between a strategic and non-strategic attacker lies in their responses to the defender's allocation decision. On the other hand, the main distinction between game-theoretic and non-game-theoretic models is that game-theoretic models take into account the attacker's response to the defender's allocation decision while in non-game-theoretic models, the attacker's decision is exogenously determined and is not a function of the defender's allocation decision. As our results will show in Section 4, game-theoretic models are often preferred to non-game-theoretic models, since game-theoretic models often incur lower expected loss for the defender than non-game-theoretic models.
It is instructive to compare non-adaptive threats such as natural disasters and terrorism. Defensive resource allocations against a strategic attacker has been extensively studied in game theory. In particular, Colonel Blotto games were designed to tackle this type of problem (e.g., Shubik and Weber, 1981, Roberson, 2006). One difference between the game-theoretic portion of our model and traditional Colonel Blotto games is in that our model is sequential while in Colonel Blotto games decisions are made simultaneously. We note that extension of Colonel Blotto games to the realm of sequential, nonzero-sum games has been recently carried out by Powell (2009), which did not consider the scenario that the attacker is partially strategic.
Allowing multiple behavioral types of one player has been pioneered by Kreps et al. (1982). There exist several differences between Kreps et al. (1982) and the current paper. First, Kreps et al. (1982) only allowed the player to take on the alternative type with a very small probability while in the current model the attacker could be non-strategic with any probability between 0 and 1. Second, both behavioral types in the model from Kreps et al. (1982) are fully strategic and play best responses to the other player's moves while in the current model if the attacker is non-strategic, there is no decision to make and thus his moves are not influenced by the defender's decision at all.
The remainder of the paper is structured as follows. Section 2 formulates the model and discusses data sources. Section 3 provides analytic results, an algorithm, and a numerical example, investigating one particular type of non-strategic attack probabilities: evenly distributed to top N valuable targets. Section 4 introduces two types of false beliefs, defines robustness, and conducts both one-way and two-way sensitivity analyses to investigate the robustness of game-theoretic models. Finally, Section 5 provides conclusion and future research directions. Appendix A contains the proofs of the six theorems for this paper, and Appendix B presents illustrations to Theorem 2 and robustness analysis and sensitivity analyses for three other types of non-strategic terrorist as well as identifying the optimal defensive resource allocations for them.
Section snippets
Notation
We use the following notation throughout the paper:
- •
-
q ∈ [0, 1] and 1 − q: Probabilities that the terrorist is strategic and non-strategic, respectively.
- •
-
n: Number of targets in the system.
- •
-
c i ⩾ 0: Government's defensive resource allocation to target i, for i = 1, 2, … , n.
- •
-
c ≡ (c 1, c 2, … , c n ).
- •
-
C: Total budget of the defensive resources. That is,
- •
-
J: Set of defended targets. That is, J ≡ {i:c i > 0; i = 1, 2, … , n}
- •
-
r: Total probabilities of attacks for both the strategic and non-strategic attacker.
- •
-
h i (c):
Analytic results and illustrations
Theorem 1
Subgame perfect Nash equilibrium exists and is unique for the sequential game defined by (12), (13).
Theorem 2
Let (h ∗ ,c ∗ ) be a pair of strategies with corresponding , and J ∗ .
- (i)
-
If and for all i ∈ J ∗ , then (h ∗ , c ∗ ) qualifies to be a subgame perfect Nash equilibrium.
- (ii)
-
for all i ∉ J ∗ .
Remark 1
With definitions of (6), (7) of A i and R i , Theorem 2 implies that the government desires to equalize: (a) the total expected losses for all the defended targets (set J ∗), when q ∈ (0, 1] and J ∗ ≠ P ∗; (b) the
Two false beliefs and definitions of robustness
In this section, we compare optimal defensive resource allocations c ∗ and the corresponding optimal total expected loss, , with two other alternative allocation schemes. The motivation is that, in practice, the government may (falsely) believe that the terrorist is fully strategic (or non-strategic) and use game-theoretic (or non-game theoretic) models to guide defensive resource allocations. We are interested in evaluating the costs of these two false beliefs:
Conclusion and future research directions
In this paper, we develop a novel hybrid model, where a centralized government allocates defensive resources among multiple potential targets to minimize expected loss caused by an unknown adversary, who could be either strategic or non-strategic. In general, we find that the optimal defensive strategies facing a partially strategic attacker differs from those facing a fully strategic or a fully non-strategic attacker. The defender can achieve a lower expected loss when the probability of
Acknowledgement
This research was partially supported by the United States Department of Homeland Security (DHS) through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under award number 2010-ST-061-RE0001. This research was also patricianly supported by the United States National Science Foundation under award number 1200899. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the
References (45)
- et al.
Modeling secrecy and deception in a multiple-period attacker–defender signaling game
European Journal of Operational Research
(2010)
- et al.
Balancing congestion and security in the presence of strategic applicants with private information
European Journal of Operational Research
(2011)
-
Sequential, nonzero-sum "Blotto": allocating defensive resources prior to attack
Games and Economic Behavior
(2009)
- et al.
Rational cooperation in the finitely repeated prisoners' dilemma
Journal of Economic Theory
(1982)
-
Strategic defense and attack for series and parallel reliability systems
European Journal of Operational Research
(2008)
- et al.
Trade-offs between target hardening and overarching protection
European Journal of Operational Research
(2011)
- et al.
Nature plays with dice-terrorists do not: allocating resources to counter strategic versus probabilistic risks
European Journal of Operational Research
(2009)
- et al.
Location of terror response facilities: a game between state and terrorist
European Journal of Operational Research
(2007)
- et al.
Optimal resource allocation for security in reliability systems
European Journal of Operational Research
(2007)
- et al.
An effective two-finger, two-stage biometric strategy for the US-VISIT program
Operations Research
(2009)
Optimal resource allocation for defense of targets based on differing measures of attractiveness
Risk Analysis
(2008)
A two-sided optimization for theater ballistic missile defense
Operations Research
(2005)
Game theory and risk analysis
Risk Analysis
(2009)
Games of Strategy—Theory and Application
(1961)
Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers
Risk Analysis
(2011)
The elephant in the room is called game theory
Risk Analysis
(2009)
Mathematical methods in combating terrorism
Risk Analysis
(2004)
The impact of disaster on the interaction between company and government
European Journal of Operational Research in press
(2012)
Risk adjusted budget allocation models with application in homeland security
IIE Transactions
(2011)
Software assistants for randomized patrol planning for the lax patrol police and the federal air marshals service
Interfaces
(2010)
Cited by (106)
Recommended articles (6)
Copyright © 2013 Elsevier B.V. All rights reserved.
Source: https://www.sciencedirect.com/science/article/pii/S0377221713000763
0 Response to "Deterrence and Risk Preferences in Sequential Attacker “defender Games With Continuous Efforts Â"
Publicar un comentario