Skip to main content
Log in

Attack against Layered Defense

  • MATHEMATICS
  • Published:
Doklady Mathematics Aims and scope Submit manuscript

Abstract

An attack–defense model is considered in which the defense party at each point of defense has several lines and uses a target allocation of its forces. The average damage caused by attack forces breaking through all defense points is used as a criterion for attack effectiveness. The problem of optimizing the defense force distribution over defense lines is solved, and optimal strategies of the parties in a zero-sum game are found.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

REFERENCES

  1. A. A. Vasin, P. S. Krasnoshchekov, and V. V. Morozov, Operations Research (Akademiya, Moscow, 2008) [in Russian].

  2. A. A. Vasin and V. V. Morozov, Game Theory and Models of Mathematical Economics (MAKS-Press, Moscow, 2008) [in Russian].

    Google Scholar 

  3. Yu. B. Germeier, Introduction to the Theory of Operations Research (Nauka, Moscow, 1971) [in Russian].

    Google Scholar 

  4. V. F. Ogaryshev, “Mixed strategies in a generalization of Gross’s problem,” USSR Comput. Math. Math. Phys. 13 (1), 73–88 (1973).

    Article  MathSciNet  Google Scholar 

  5. A. G. Perevozshchikov and I. A. Lesik, “Simplest model of layered air defense,” Vestn. Tver. Gos. Univ. Ser: Prikl. Mat., No. 3, 83–94 (2013).

  6. D. Acemoglu, A. Malekian, and A. Ozdaglar, “Network security and contagion,” J. Econ. Theory 166, 536–585 (2016).

    Article  MathSciNet  Google Scholar 

  7. D. W. Blackett, “Some Blotto games,” Naval Res. Logistic Q. 1 (1), 55–60 (1954).

    Article  MathSciNet  Google Scholar 

  8. D. J. Clark and K. A. Konrad, “Asymmetric conflict: Weakest link against best shot,” J. Conflict Resolution 51 (3), 457–469 (2007).

    Article  Google Scholar 

  9. O. Gross and R. Wagner, “A continuous colonel Blotto game,” U.S. Air Force Project RAND, Research Memorandum, 408 (1950).

  10. H. Haller and B. Hoyer, “The common enemy effect under strategic network formation and disruption,” J. Econ. Behav. Organ. 162, 146–163 (2019).

    Article  Google Scholar 

  11. D. Kovenock and B. Roberson, “Coalitional colonel Blotto games with application to the economics of alliances,” J. Public Econ. Theory 14 (4), 653–676 (2012).

    Article  Google Scholar 

  12. D. Kovenock and B. Roberson, “The optimal defense of networks of targets,” Econ. Inquiry 56 (4), 2195–2211 (2018).

    Article  Google Scholar 

  13. R. Powell, “Defending against terrorist attacks with limited resources,” Am. Polit. Sci. Rev. 101 (3), 527–541 (2007).

    Article  Google Scholar 

Download references

ACKNOWLEDGMENTS

The author is grateful to the anonymous reviewer, who significantly expanded the literature review and suggested several improvements of the manuscript.

Funding

This work was supported by the Russian Foundation for Basic Research, project no. 19-01-00533a.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. V. Morozov.

Ethics declarations

The author of this work declares that he has no conflicts of interest.

Additional information

Translated by I. Ruzanova

Publisher’s Note.

Pleiades Publishing remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Morozov, V.V. Attack against Layered Defense. Dokl. Math. 108 (Suppl 1), S128–S132 (2023). https://doi.org/10.1134/S1064562423600665

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S1064562423600665

Keywords:

Navigation