Fight or Flight?: Defending against Sequential Attacks in the Game of Siege

被引:47
|
作者
Deck, Cary [1 ,2 ]
Sheremeta, Roman M. [3 ]
机构
[1] Univ Arkansas, Dept Econ, Fayetteville, AR 72701 USA
[2] Chapman Univ, Econ Sci Inst, Orange, CA USA
[3] Chapman Univ, Argyros Sch Business & Econ, Orange, CA USA
关键词
Colonel Blotto; conflict resolution; weakest link; game of siege; multiperiod resource allocation; experiments; SYSTEMS DEFENSE GAMES; COLONEL-BLOTTO; WEAKEST-LINK; CONTESTS; RESOURCES; INFORMATION; COMPETITION; ALLOCATION; AUCTIONS; FALLACY;
D O I
10.1177/0022002712438355
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
This article examines theory and behavior in a two-player game of siege, sequential attack and defense. The attacker's objective is to successfully win at least one battle, while the defender's objective is to win every battle. Theoretically, the defender either folds immediately or, if his valuation is sufficiently high and the number of battles is sufficiently small, then he has a constant incentive to fight in each battle. Attackers respond to defense with diminishing assaults over time. Consistent with theoretical predictions, the authors' experimental results indicate that the probability of successful defense increases in the defenders valuation and it decreases in the overall number of battles in the contest. However, the defender engages in the contest significantly more often than predicted and the aggregate expenditures by both parties exceed predicted levels. Moreover, both defenders and attackers actually increase the intensity of the fight as they approach the end of the contest.
引用
收藏
页码:1069 / 1088
页数:20
相关论文
共 50 条
  • [41] Lessons Learned: Defending Against Property Inference Attacks
    Stock, Joshua
    Wettlaufer, Jens
    Demmler, Daniel
    Federrath, Hannes
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 312 - 323
  • [42] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [43] Defending against spoofed DDoS attacks with path fingerprint
    Lee, FY
    Shieh, S
    COMPUTERS & SECURITY, 2005, 24 (07) : 571 - 586
  • [44] MATFL: Defending Against Synergetic Attacks in Federated Learning
    Yang, Wen
    Peng, Luyao
    Tang, Xiangyun
    Weng, Yu
    2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 313 - 319
  • [45] StackOFFence: A technique for defending against buffer overflow attacks
    Madan, BB
    Phoha, S
    Trivedi, KS
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 656 - 661
  • [46] Defending against Flooding Attacks in the Internet of Drones Environment
    Pu, Cong
    Zhu, Pingping
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [47] Defending Against Cooperative Attacks in Cooperative Spectrum Sensing
    Qin, Zhengrui
    Li, Qun
    Hsieh, George
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (06) : 2680 - 2687
  • [48] An unsupervised strategy for defending against multifarious reputation attacks
    Xin Wang
    Shu-juan Ji
    Yong-quan Liang
    Ho-fung Leung
    Dickson K.W. Chiu
    Applied Intelligence, 2019, 49 : 4189 - 4210
  • [49] Defending Against ROP Attacks with Nearly Zero Overhead
    Qin, Peng
    Tan, Cheng
    Zhao, Lei
    Cheng, Yueqiang
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [50] Defending LLMs against Jailbreaking Attacks via Backtranslation
    Wang, Yihan
    Shi, Zhouxing
    Bai, Andrew
    Hsieh, Cho-Jui
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: ACL 2024, 2024, : 16031 - 16046