Fight or Flight?: Defending against Sequential Attacks in the Game of Siege

被引:47
|
作者
Deck, Cary [1 ,2 ]
Sheremeta, Roman M. [3 ]
机构
[1] Univ Arkansas, Dept Econ, Fayetteville, AR 72701 USA
[2] Chapman Univ, Econ Sci Inst, Orange, CA USA
[3] Chapman Univ, Argyros Sch Business & Econ, Orange, CA USA
关键词
Colonel Blotto; conflict resolution; weakest link; game of siege; multiperiod resource allocation; experiments; SYSTEMS DEFENSE GAMES; COLONEL-BLOTTO; WEAKEST-LINK; CONTESTS; RESOURCES; INFORMATION; COMPETITION; ALLOCATION; AUCTIONS; FALLACY;
D O I
10.1177/0022002712438355
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
This article examines theory and behavior in a two-player game of siege, sequential attack and defense. The attacker's objective is to successfully win at least one battle, while the defender's objective is to win every battle. Theoretically, the defender either folds immediately or, if his valuation is sufficiently high and the number of battles is sufficiently small, then he has a constant incentive to fight in each battle. Attackers respond to defense with diminishing assaults over time. Consistent with theoretical predictions, the authors' experimental results indicate that the probability of successful defense increases in the defenders valuation and it decreases in the overall number of battles in the contest. However, the defender engages in the contest significantly more often than predicted and the aggregate expenditures by both parties exceed predicted levels. Moreover, both defenders and attackers actually increase the intensity of the fight as they approach the end of the contest.
引用
收藏
页码:1069 / 1088
页数:20
相关论文
共 50 条
  • [21] Defending Distributed Systems Against Adversarial Attacks
    Su L.
    Performance Evaluation Review, 2020, 47 (03): : 24 - 27
  • [22] Defending Against Attacks on Main Memory Persistence
    Enck, William
    Butler, Kevin
    Richardson, Thomas
    McDaniel, Patrick
    Smith, Adam
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 65 - 74
  • [23] Practical Techniques for Defending against DDoS Attacks
    Chen, Eric Y.
    Yonezawa, Akinori
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [24] Fight Perturbations With Perturbations: Defending Adversarial Attacks via Neuron Influence
    Chen, Ruoxi
    Jin, Haibo
    Zheng, Haibin
    Chen, Jinyin
    Liu, Zhenguang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1582 - 1595
  • [25] Method research for defending against distributed denial-of-service attacks based on dynamic game theory
    Zhang, Shao-Jun
    Li, Jian-Hua
    Chen, Xiu-Zhen
    Hu, Wei
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2008, 42 (02): : 198 - 201
  • [26] CONTRA: Defending Against Poisoning Attacks in Federated Learning
    Awan, Sana
    Luo, Bo
    Li, Fengjun
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 455 - 475
  • [27] Defending Against Adversarial Attacks in Deep Neural Networks
    You, Suya
    Kuo, C-C Jay
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS, 2019, 11006
  • [28] Two Layer Defending Mechanism against DDoS Attacks
    Subramanian, Kiruthika
    Gunasekaran, Preetha
    Selvaraj, Mercy
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (04) : 317 - 324
  • [29] Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
    Xianjun Geng
    Yun Huang
    Andrew B. Whinston
    Mobile Networks and Applications, 2002, 7 : 213 - 223
  • [30] Defending against Contagious Attacks on a Network with Resource Reallocation
    Bai, Rufan
    Lin, Haoxing
    Yang, Xinyu
    Wu, Xiaowei
    Li, Minming
    Jia, Weijia
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 5135 - 5142