robust allocation of a defensive budget considering an attacker’s private information mohammad e....
TRANSCRIPT
![Page 1: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/1.jpg)
Robust Allocation of a Defensive Budget Considering
an Attacker’s Private Information
Mohammad E. Nikoofal and Jun Zhuang
Presenter: Yi-Cin LinAdvisor: Frank, Yeong-Sung Lin
![Page 2: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/2.jpg)
Agenda
• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions
![Page 3: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/3.jpg)
Agenda
• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions
![Page 4: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/4.jpg)
Introduction
Terrorist attacks
![Page 5: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/5.jpg)
Introduction
Understand the terrorist group
before an attack occurs
Deter an attack Decrease the
expected damage of an attack
![Page 6: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/6.jpg)
Introduction
• Deciding how, where, and when to allocate resources to protect critical infrastructure is a difficult problem, specifically when we have no accurate estimation about the attacker’s attributes
Defender’s private information
Common knowledge
Attacker’s private information
![Page 7: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/7.jpg)
Introduction
• Uncertainty– Precise estimation of the probability of an attack
– Exact assessment of the attacker’s effort
– Identification of actual targets and the attacker’s valuation of those targets
12
51
3
2
![Page 8: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/8.jpg)
Introduction
• There are two principal methods proposed to address data uncertainty over the years:
– Stochastic-optimization programming
– Robust optimization
![Page 9: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/9.jpg)
Introduction
• Stochastic-optimization programming– Assuming different scenarios for data to occur
with different probabilities– Optimize the expected value of some objective
function
• Difficulties with such an approach are • Knowing the exact distribution for the data• Computational challenges
![Page 10: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/10.jpg)
Introduction
• Robust optimization– Optimize the worst-case performance of the
system
Random parameters
Discrete(Scenario base)
Continuous
![Page 11: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/11.jpg)
Introduction
• We propose a robust-optimization game-theoretical approach to model the uncertainty in attacker’s attributes where uncertainty is characterized on bounded intervals based on the attacker’s target valuation.
![Page 12: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/12.jpg)
Agenda
• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions
![Page 13: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/13.jpg)
Problem Formulation
• Assumption
– The attacker could attack at most one target
– In the sequential game, some targets may be left undefended in equilibrium
![Page 14: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/14.jpg)
Problem Formulation
![Page 15: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/15.jpg)
Problem Formulation- Damage Function
• Damage Function Specifications:To define the player’s optimization problem, let us specify a damage function with the following properties-
and are twice differentiable with respect to the defender’s and attacker’s effort , where 0,
![Page 16: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/16.jpg)
Problem Formulation- Damage Function
• Let us define the expected damage from the standpoint of the defender and the attacker, respectively, as follows:
![Page 17: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/17.jpg)
Problem Formulation- Defender’s Optimization Model
• Defender’s Optimization ModelThe defender seeks to find the optimal defensive resource allocation, , which minimizes the total expected damage and the to tal defensive investment costs
![Page 18: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/18.jpg)
Problem Formulation- Defender’s Optimization Model
• The defender wishes to minimize her defense costs and expected losses
![Page 19: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/19.jpg)
Problem Formulation- Attacker’s Optimization Model
• We assume that the strategic attacker concentrates his attack budget to launch an attack on only one target, the target that maximizes his payoffs.
Attacker’s utility
![Page 20: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/20.jpg)
Agenda
• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions
![Page 21: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/21.jpg)
Stacklberg Equilibrium Approach- Attacker’s Best Response
• The concept in this part is based on the work by Zhuang and Bier [19]
• The defender employs the attacker’s best response to estimate the attacker’s effort
![Page 22: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/22.jpg)
Stacklberg Equilibrium Approach- Attacker’s Best Response
• Satisfying the optimality condition
• Yields the attacker’s best response as follows
is the least possible level of defense required to deter anattack on target
![Page 23: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/23.jpg)
Stacklberg Equilibrium Approach- Attacker’s Best Response
• Satisfying the optimality condition
• Yields the attacker’s best response as follows
![Page 24: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/24.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• We need first extract the attacker’s best response function (7) and then plug it into the defender’s optimization problem (3)–(5) to obtain her best response.
![Page 25: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/25.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• To satisfy the optimality condition, first we need to relax the budget constraint. The common way to deal with such a condition is to penalize the objective function by where is the Lagrange multiplier
![Page 26: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/26.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• The Lagrangian function might be defined as follows:
• Lagrangian function above gives the defender’s optimization problem as follows
![Page 27: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/27.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• There is an optimal threshold for each target to be defended in equilibrium such that target i is defended if and only if the defender’s valuation of the target is greater than its optimal threshold
![Page 28: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/28.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• Before determining the defender’s robust-optimization equilibrium, let us assume that the defender can define a free-distribution interval for the attacker’s target valuation such that
![Page 29: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/29.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• Obstacle
• The decision maker can extend the length of an interval to satisfy her belief about uncertain parameters.
![Page 30: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/30.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• Assuming , alternatively we can say which is centered at its
nominal value and of half-length and of half-length , but its exact value is unknown
![Page 31: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/31.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• Assuming , alternatively we can say which is centered at its
nominal value and of half-length and of half-length , but its exact value is unknown
Nominal value=
Half length=
![Page 32: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/32.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
In particular, the defender may assume her valuation of Target , which is , as the nominal value for the attacker’s valuation of target , which is , and then define the extreme bounds as a fraction of , for example, [0.5 , 1.5 ]
Nominal value=
Half length=
![Page 33: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/33.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• We define the scaled deviation of the uncertain parameter from its nominal value as . It is clear that the scaled deviation takes on a value in [–1, 1]
![Page 34: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/34.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• Moreover, following Bertsimas and Sim, [33] we impose a constraint on uncertainty in the following way: the total scaled deviation of the uncertainty parameters cannot exceed some threshold , called the budget of uncertainty, which leads to:
![Page 35: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/35.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
(Nominal case) (Worst case)
• Bertsimas and Sim [33] show that having the threshold varied in allows greater flexibility to build a robust model without excessively affecting the optimal cost.
![Page 36: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/36.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• To define the defender’s robustoptimization equilibrium, consider the following set:
![Page 37: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/37.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• We now use the concept of robust game theory proposed by Aghassi and Bertsimas [34] to obtain the robust-optimization equilibrium for the defender
![Page 38: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/38.jpg)
Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium
• Defender’s robust-optimization problem as follows:
![Page 39: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/39.jpg)
Agenda
• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions
![Page 40: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/40.jpg)
Apply Robust Game to Real Data Monetary
value Mortality
value Political
value
Total defensive budget Total target valuation
![Page 41: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/41.jpg)
![Page 42: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/42.jpg)
![Page 43: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/43.jpg)
Apply Robust Game to Real Data
![Page 44: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/44.jpg)
![Page 45: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/45.jpg)
![Page 46: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/46.jpg)
Apply Robust Game to Real Data
![Page 47: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/47.jpg)
Apply Robust Game to Real Data
![Page 48: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/48.jpg)
Agenda
• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions
![Page 49: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/49.jpg)
Conclusions
• In this article, we model the attacker’s attributes as uncertain parameters on bounded intervals, we proposed robust-optimization equilibrium for the defender, which gives her the flexibility to adjust the robustness of the solution to the level of her conservatism.
![Page 50: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/50.jpg)
Conclusions
• By applying our proposed approach to real data, we studied the effect of the defender’s assumptions of the extreme bounds of the uncertain parameters on the robustness of her solution, and also the impacts of the effectiveness ratio of attack on the robustness of the defender’s solution.
![Page 51: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/51.jpg)
Conclusions
• This article can be extended by considering a sce nario when the attacker tries to attack on multiple targets in a simultaneous game, where the value of a set of targets is more than the sum of each individual target. Such a model would be a robust version of Colonel Blotto games.
![Page 52: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:](https://reader038.vdocument.in/reader038/viewer/2022110206/56649cff5503460f949d001e/html5/thumbnails/52.jpg)
Conclusions
• One can extend the proposed model in this article to focus on facing with nonstrategic attackers, as nonstrategic attacking is considered exogenously (e.g., he may only strike the most valuable target, regardless of the observed defense levels)