The Attack and Defense of Weakest-Link Networks
31 Pages Posted: 24 Oct 2018
There are 2 versions of this paper
The Attack and Defense of Weakest-Link Networks
Date Written: May 25, 2018
Abstract
We experimentally test the qualitatively different equilibrium predictions of two theoretical models of attack and defense of a weakest-link network of targets. In such a network, the attacker’s objective is to assault at least one target successfully and the defender’s objective is to defend all targets. The models differ in how the conflict at each target is modeled — specifically, the lottery and auction contest success functions (CSFs). Consistent with equilibrium in the auction CSF model, attackers utilize a stochastic “guerrilla-warfare” strategy, which involves attacking at most one target arbitrarily with a random level of force. Inconsistent with equilibrium in the lottery CSF model, attackers use the “guerrilla-warfare” strategy and assault only one target instead of the equilibrium “complete-coverage” strategy that attacks all targets. Consistent with equilibrium in both models, as the attacker’s valuation increases, the average resource expenditure, the probability of winning, and the average payoff increase (decrease) for the attacker (defender).
Keywords: Colonel Blotto, weakest-link, best-shot, multi-dimensional resource allocation, experiments
JEL Classification: C72, C91, D72, D74
Suggested Citation: Suggested Citation