Abstract
The paper considers an object exposed to external intentional attacks. The defender distributes its resource between deploying false targets and protecting the object. The false targets are not perfect and there is a nonzero probability that a false target can be detected by the attacker. Once the attacker has detected a certain number of false targets, it ignores them and chooses such number of undetected targets to attack that maximizes the probability of the object destruction. The defender decides how many false targets to deploy in order to minimize the probability of the object destruction assuming that the attacker uses the most harmful strategy to attack. The optimal number of false targets and the optimal number of attacked targets are obtained for the case of single and multiple types of the false targets. A methodology of finding the optimal defence strategy under uncertain contest intensity is suggested.
Similar content being viewed by others
References
Azaiez MN and Bier VM (2007). Optimal resource allocation for security in reliability systems . Eur J Opl Res 181: 773–786.
Bier V and Abhichandani V (2002). Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. Proceedings of the Engineering Foundation Conference on Risk-Based Decision Making in Water Resources X. American Society of Civil Engineers: Santa Barbara, CA.
Bier VM, Nagaraj A and Abhichandani V (2005). Protection of simple series and parallel systems with components of different values . Reliab Eng System Safety 87: 315–323.
Bier VM, Oliveros S and Samuelson L (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker . J Public Econ Theory 9: 563–587.
Bhaskar T and Kumar UD (2006). A cost model for N-version programming with imperfect debugging . J Opl Res Soc 57(8): 986–994.
Blanks KS (1994). An effectiveness analysis of the tactical employment of decoys. Master's thesis, Pentagon, Army Command and General Staff Coll Fort Leavenworth KS, Accession Number: ADA284608, http://www.stormingmedia.us/80/8064/A806482.html.
Dighe N, Zhuang J and Bier VM (2009). Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence . Int J Performability Eng 5(1): 31–43.
Forder RA (2004). Operational research in the UK Ministry of Defence: An overview . J Opl Res Soc 55(4): 319–332.
Hausken K (2005). Production and conflict models versus rent seeking models . Public Choice 123: 59–93.
Hausken K (2008). Strategic defense and attack for reliability systems . Reliab Eng System Safety 93: 1740–1750.
Levitin G (2007). Optimal defense strategy against intentional attacks . IEEE Trans Reliab 56(1): 148–157.
Levitin G and Hausken K (2008). Protection vs. redundancy in homogeneous parallel systems . Reliab Eng System Safety 93: 1444–1451.
Levitin G and Hausken K (2009). False targets efficiency in defense strategy . Eur J Opl Res 194: 155–162.
Levitin G and Hausken K (2010). Defense and attack of systems with variable attacker system structure detection probability. J Opl Res Soc 61: 124–133.
Lugtigheid D, Jiang X and Jardine AKS (2008). A finite horizon model for repairable systems with repair restrictions . J Opl Res Soc 59(10): 1321–1331.
Patterson S and Apostolakis G (2007). Identification of critical locations across multiple infrastructures for terrorist actions . Reliab Eng System Safety 92(9): 1183–1203.
Powell R (2007a). Allocating defensive resources with private information about vulnerability . Am Polit Sci Rev 101(4): 799–809.
Powell R (2007b). Defending against terrorist attacks with limited resources . Am Polit Sci Rev 101(3): 527–541.
Skaperdas S (1996). Contest success functions . Econ Theory 7: 283–290.
Spedding B (2006). Maintenance, replacement, and reliability . J Opl Res Soc 57(12): 1501–1502.
Tullock G (1980). Efficient rent-seeking. In: Buchanan JM, Tollison RD, and Tulluck G (eds). Toward a Theory of The Rent-seeking Society 1980. Texas A&M. University Press: College Station, pp 97–112.
Xiao S, Xiao GX and Cheng TH (2008). Tolerance of intentional attacks in complex communication networks . IEEE Commun Mag 46(1): 146–152.
Zhuang J and Bier VM (2007). Balancing terrorism and natural disasters–Defensive strategy with endogenous attacker effort . Opns Res 55(5): 976–991.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Peng, R., Levitin, G., Xie, M. et al. Optimal defence of single object with imperfect false targets. J Oper Res Soc 62, 134–141 (2011). https://doi.org/10.1057/jors.2009.171
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/jors.2009.171