EconPapers    
Economics at your fingertips  
 

Modeling costly learning and counter-learning in a defender-attacker game with private defender information

Jie Xu and Jun Zhuang ()
Additional contact information
Jie Xu: SUNY at Buffalo

Annals of Operations Research, 2016, vol. 236, issue 1, No 14, 289 pages

Abstract: Abstract In asymmetric war scenarios (e.g., counter-terrorism), the adversary usually invests a significant time to learn the system structure and identify vulnerable components, before launching attacks. Traditional game-theoretic defender-attacker models either ignore such learning periods or the entailed costs. This paper fills the gap by analyzing the strategic interactions of the terrorist’s costly learning and defender’s counter-learning and defense strategies in a game with private defender information. Our model allows six possible attacker strategies: (a) attack immediately; (b) learn and attack; (c) learn and not attack; (d) learn and attack when appearing vulnerable and not attack when appearing invulnerable; (e) learn and not attack when appearing vulnerable and attack when appearing invulnerable; and (f) not attack. Our results show that four of the six strategies (a, d, e, f) are possible at equilibrium and the other two (b, c) are strictly dominated. Interestingly, we find that the counterintuitive strategy (e) could be at equilibrium, especially when the probability that the target appears vulnerable given it is invulnerable is sufficiently high. Our results also show that the attacker’s learning cost has a significant impact on both the attacker’s best responses and the defender’s equilibrium deception and defense strategies. Finally, we study the attacker’s values of perfect information and imperfect information, which provide additional insights for defense and counter-learning strategies.

Keywords: Defender-attacker games; Costly learning; Counter-learning; Game theory; Value of perfect information; Value of imperfect information (search for similar items in EconPapers)
Date: 2016
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (12)

Downloads: (external link)
http://link.springer.com/10.1007/s10479-014-1722-3 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
Journal Article: Modeling costly learning and counter-learning in a defender-attacker game with private defender information (2016) Downloads
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:annopr:v:236:y:2016:i:1:d:10.1007_s10479-014-1722-3

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10479

DOI: 10.1007/s10479-014-1722-3

Access Statistics for this article

Annals of Operations Research is currently edited by Endre Boros

More articles in Annals of Operations Research from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:annopr:v:236:y:2016:i:1:d:10.1007_s10479-014-1722-3