Fight or Flight?: Defending against Sequential Attacks in the Game of Siege

被引:47
|
作者
Deck, Cary [1 ,2 ]
Sheremeta, Roman M. [3 ]
机构
[1] Univ Arkansas, Dept Econ, Fayetteville, AR 72701 USA
[2] Chapman Univ, Econ Sci Inst, Orange, CA USA
[3] Chapman Univ, Argyros Sch Business & Econ, Orange, CA USA
关键词
Colonel Blotto; conflict resolution; weakest link; game of siege; multiperiod resource allocation; experiments; SYSTEMS DEFENSE GAMES; COLONEL-BLOTTO; WEAKEST-LINK; CONTESTS; RESOURCES; INFORMATION; COMPETITION; ALLOCATION; AUCTIONS; FALLACY;
D O I
10.1177/0022002712438355
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
This article examines theory and behavior in a two-player game of siege, sequential attack and defense. The attacker's objective is to successfully win at least one battle, while the defender's objective is to win every battle. Theoretically, the defender either folds immediately or, if his valuation is sufficiently high and the number of battles is sufficiently small, then he has a constant incentive to fight in each battle. Attackers respond to defense with diminishing assaults over time. Consistent with theoretical predictions, the authors' experimental results indicate that the probability of successful defense increases in the defenders valuation and it decreases in the overall number of battles in the contest. However, the defender engages in the contest significantly more often than predicted and the aggregate expenditures by both parties exceed predicted levels. Moreover, both defenders and attackers actually increase the intensity of the fight as they approach the end of the contest.
引用
收藏
页码:1069 / 1088
页数:20
相关论文
共 50 条
  • [31] Composite hybrid techniques for defending against targeted attacks
    Sidiroglou, Stelios
    Keromytis, Angelos D.
    MALWARE DETECTION, 2007, : 213 - +
  • [32] Defending Against Targeted Poisoning Attacks in Federated Learning
    Erbil, Pinar
    Gursoy, M. Emre
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 198 - 207
  • [33] Defending Against Model Stealing Attacks with Adaptive Misinformation
    Kariyappa, Sanjay
    Qureshi, Moinuddin K.
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 767 - 775
  • [34] Defending Against Cyber-Attacks on the Internet of Things
    Abdalrahman, Ghazi Abdalla
    Varol, Hacer
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [35] Defending Against Adversarial Attacks in Speaker Verification Systems
    Chang, Li-Chi
    Chen, Zesheng
    Chen, Chao
    Wang, Guoping
    Bi, Zhuming
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [36] Defending Transportation Networks Against Random and Targeted Attacks
    Lou, Yingyan
    Zhang, Lihui
    TRANSPORTATION RESEARCH RECORD, 2011, (2234) : 31 - 40
  • [37] On the Use of Neurosymbolic AI for Defending Against Cyber Attacks
    Grov, Gudmund
    Halvorsen, Jonas
    Eckhoff, Magnus Wiik
    Hansen, Bjorn Jervell
    Eian, Martin
    Mavroeidis, Vasileios
    NEURAL-SYMBOLIC LEARNING AND REASONING, PT I, NESY 2024, 2024, 14979 : 119 - 140
  • [38] Defending Against Poisoning Attacks in Federated Learning with Blockchain
    Dong N.
    Wang Z.
    Sun J.
    Kampffmeyer M.
    Knottenbelt W.
    Xing E.
    IEEE Transactions on Artificial Intelligence, 2024, 5 (07): : 1 - 13
  • [39] Defending Against Membership Inference Attacks on Beacon Services
    Venkatesaramani, Rajagopal
    Wan, Zhiyu
    Malin, Bradley A.
    Vorobeychik, Yevgeniy
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (03)
  • [40] Defending Against Byzantine Attacks in Quantum Federated Learning
    Xia, Qi
    Tao, Zeyi
    Li, Qun
    2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 145 - 152