Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game

被引:37
作者
Shan, Xiaojun [1 ]
Zhuang, Jun [2 ]
机构
[1] Univ Houston Clear Lake, Dept Engn, Houston, TX 77058 USA
[2] Univ Buffalo State Univ New York, Dept Ind & Syst Engn, Buffalo, NY 14260 USA
关键词
Multi period game; Multi-target game; Defender-attacker game; Defensive resource allocation; Sequential game; RELIABILITY SYSTEMS; PRIVATE INFORMATION; HOMELAND SECURITY; TERRORIST; COMPETITION; TARGET; FACE;
D O I
10.1016/j.ress.2017.03.022
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper fills a literature gap by investigating the strategic interactions between an attacker and a defender with a multi-period multi-target game. At each period, the defender allocates a limited amount of defensive resources over multiple targets, and the attacker assigns some attack probabilities to those targets. We consider four scenarios where the defender could be either myopic or long-sighted, and the defense could be carried over to future periods or not. Our analyses characterize the defender's optimal allocations in these four scenarios and develop a n algorithm to identify the optimal allocations. We find that increases in defense carryover could lead to less allocation to defended targets from the second period at equilibrium, and lead to defending more targets. To gather empirical evidence regarding one key function of the model - success probability of attack, we conduct statistical analysis based on datasets from Global Terrorism Database, which is provided by National Consortium for the Study of Terrorism and Responses to Terrorism (START) and the Urban Area Security Initiative (UASI) grant allocations from FY 2004 to FY 2012. We conclude that in general, effects of defense resources on reducing success probability of attack are mixed due to scarcity of terrorism data.
引用
收藏
页码:12 / 26
页数:15
相关论文
共 50 条
[1]  
Anderson DavidR., 2011, INTRO MANAGEMENT SCI
[2]  
[Anonymous], 1953, Annals of Mathematics Studies, DOI DOI 10.1515/9781400881970-012
[3]  
[Anonymous], 1961, GAMES STRATEGY THEOR
[4]   Optimal resource allocation for security in reliability systems [J].
Azaiez, M. N. ;
Bier, Vicki M. .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 181 (02) :773-786
[5]   MULTIPERIOD COMPETITION WITH SWITCHING COSTS [J].
BEGGS, A ;
KLEMPERER, P .
ECONOMETRICA, 1992, 60 (03) :651-666
[6]   Optimal resource allocation for defense of targets based on differing measures of attractiveness [J].
Bier, Vicki M. ;
Haphuriwat, Naraphorn ;
Menoyo, Jaime ;
Zimmerman, Rae ;
Culpen, Alison M. .
RISK ANALYSIS, 2008, 28 (03) :763-770
[7]   Defending and attacking a network of two arcs subject to traffic congestion [J].
Bier, Vicki M. ;
Hausken, Kjell .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2013, 112 :214-224
[8]   What Do Transnational Terrorists Target? Has It Changed? Are We Safer? [J].
Brandt, Patrick T. ;
Sandler, Todd .
JOURNAL OF CONFLICT RESOLUTION, 2010, 54 (02) :214-236
[9]   Hostage taking: Understanding terrorism event dynamics [J].
Brandt, Patrick T. ;
Sandler, Todd .
JOURNAL OF POLICY MODELING, 2009, 31 (05) :758-778
[10]  
CANZONERI MB, 1985, AM ECON REV, V75, P1056