Choosing what to protect when attacker resources and asset valuations are uncertain
Journal Title: Operations Research and Decisions - Year 2014, Vol 24, Issue 3
Abstract
The situation has been modelled where the attacker’s resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker’s resource capabilities. An attacker targets one of two assets. The attacker’s resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets) or downward sloping (e.g. when one asset has a low value or high unit defense cost). This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker’s resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker’s resources.
Authors and Affiliations
Kjell Hausken
Multi-Criteria Decision Analysis (MCDA) methods in Life-Cycle Assessment (LCA): A comparison of private passenger vehicles
Analogies between the life cycle assessment (LCA) and multicriteria decision analysis (MCDA) methodologies have been discussed as well as LCA as an MCDA problem for resolving the trade-offs between multiple environmental...
A collaborative strategy for a three echelon supply chain with ramp type demand, deterioration and inflation
A supply chain system has been investigated in which a single manufacturer procures raw materials from a single supplier, processes them to produce finished products, and then delivers the products to a single retailer....
Optimization of an M/M/1/N feedback queue with retention of reneged customers
Customer impatience has become a threat to the business world. Firms employ various customer retention strategies to retain their impatient (or reneged) customers. Customer retention mechanisms may help to retain some or...
Optimal ordering quantities for substitutable items under joint replenishment with cost of substitution
An inventory system of two mutually substitutable items has been studied where an item is out of stock, demand for it is met by the other item and any part of demand not met due to unavailability of the other item is los...
Theoretical and methodological bases of threats. The method of security management support
A new approach to threat analysis and management of security understood has been presented. Threats have been analyzed in a wide theoretical-methodological range with particular emphasis on the need for the system-wide a...