Next Article in Journal
Algorithm for Computing Approximate Nash Equilibrium in Continuous Games with Application to Continuous Blotto
Previous Article in Journal
Climate Change Sustainability: From Bargaining to Cooperative Balanced Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Spoofing the Limit Order Book: A Strategic Agent-Based Analysis

by
Xintong Wang
1,†,
Christopher Hoang
2,
Yevgeniy Vorobeychik
3 and
Michael P. Wellman
4,*
1
John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, MA 02138, USA
2
Computer Science and Engineering, University of Michigan, Ann Arbor, MI 48109, USA
3
Computer Science and Engineering, Washington University in St. Louis, St. Louis, MO 63130, USA
4
Lynn A. Conway Collegiate, Computer Science and Engineering, University of Michigan, Ann Arbor, MI 48109, USA
*
Author to whom correspondence should be addressed.
This work was completed while Xintong Wang was a research assistant at the University of Michigan.
Games 2021, 12(2), 46; https://doi.org/10.3390/g12020046
Submission received: 19 February 2021 / Revised: 16 April 2021 / Accepted: 22 April 2021 / Published: 24 May 2021

Abstract

:
We present an agent-based model of manipulating prices in financial markets through spoofing: submitting spurious orders to mislead traders who learn from the order book. Our model captures a complex market environment for a single security, whose common value is given by a dynamic fundamental time series. Agents trade through a limit-order book, based on their private values and noisy observations of the fundamental. We consider background agents following two types of trading strategies: the non-spoofable zero intelligence (ZI) that ignores the order book and the manipulable heuristic belief learning (HBL) that exploits the order book to predict price outcomes. We conduct empirical game-theoretic analysis upon simulated agent payoffs across parametrically different environments and measure the effect of spoofing on market performance in approximate strategic equilibria. We demonstrate that HBL traders can benefit price discovery and social welfare, but their existence in equilibrium renders a market vulnerable to manipulation: simple spoofing strategies can effectively mislead traders, distort prices and reduce total surplus. Based on this model, we propose to mitigate spoofing from two aspects: (1) mechanism design to disincentivize manipulation; and (2) trading strategy variations to improve the robustness of learning from market information. We evaluate the proposed approaches, taking into account potential strategic responses of agents, and characterize the conditions under which these approaches may deter manipulation and benefit market welfare. Our model provides a way to quantify the effect of spoofing on trading behavior and market efficiency, and thus it can help to evaluate the effectiveness of various market designs and trading strategies in mitigating an important form of market manipulation.

1. Introduction

Financial exchanges nowadays operate almost entirely electronically, supporting automation of trading and consequential scaling of volume and speed across geography and asset classes. With data and information streaming on an extremely short timescale, often below the limits of human response time, autonomous trading agents directed by algorithms operate on behalf of human traders. Such increasing automation has transformed the financial market landscape from a human decision ecosystem to an algorithmic one, where autonomous agents learn new information, make decisions and interact with each other at an unprecedented speed and complexity. Whereas these developments in market operation and trading technology may contribute to improved efficiency, they also introduce risks, such as the potential for new forms of manipulative practice driven by algorithms.
Market manipulation is defined by the U.S. Securities and Exchange Commission (SEC) as “intentional or willful conduct designed to deceive or defraud investors by controlling or artificially affecting the price of securities, or intentional interference with the free forces of supply and demand”. Although it has long been present, the practice has also evolved in its forms to exploit automated trading and the dissemination of market information offered by many trading platforms [1]. Computer programs are employed to inject deceitful information, as other investors use algorithms to extract information from all possible sources (including the misleading ones) and execute decisions accordingly. On 21 April 2015, nearly five years after the “Flash Crash”—a sudden trillion-dollar dip in U.S. stock markets on 6 May 2010, during which stock indexes collapsed and rebounded rapidly [2], the U.S. Department of Justice charged Navinder Singh Sarao with 22 criminal counts, including fraud and market manipulation. Prior to the Flash Crash, Sarao allegedly used an algorithm to place orders amounting to about $ 200 million seemingly betting that the market would fall and later replaced or modified those orders 19,000 times before cancellation. The U.S. Commodity Futures Trading Commission (CFTC) concluded that Sarao’s manipulative practice was responsible for significant order imbalances. Although recent analysis has cast doubt on the causal role of Sarao on the Flash Crash [3], many agree that such manipulation could increase the vulnerability of markets and exacerbate market fluctuations.
The specific form of manipulation we examine in this paper, spoofing, operates through a series of direct trading actions in a market. Traders interact with the market by submitting orders to buy or sell. Orders that do not transact immediately rest in the order book, a repository for outstanding orders to trade. At any given time, the order book for a particular security reflects the market’s expressed supply and demand. Spoofing refers to the practice of submitting large spurious buy or sell orders with the intent to cancel them before execution. The orders are spurious in that instead of expressing genuine trading intent, they feign a strong buy or sell interest in the market, thus corrupting the order book’s signal on supply and demand. Other traders are then misled by the spoof orders to believe that prices may soon rise or fall, thus altering their own behavior in a way that will directly move the price. To profit on its feint, the manipulator can submit a real order on the opposite side of the market and, as soon as the real order transacts, cancel all the spoof orders. Figure 1 illustrates an alleged spoofing activity conducted over the course of 0.6 s, demonstrating how quickly and effectively such manipulation behavior can affect the market and profit from the spoofed belief.
In 2010, the Dodd–Frank Wall Street Reform and Consumer Protection Act was signed into U.S. law, outlawing spoofing as a deceptive practice. In describing its concern about spoofing, the CFTC notes that “many market participants, relying on the information contained in the order book, consider the total relative number of bid and ask offers in the order book when making trading decisions”. In fact, spoofing can be effective only to the extent that traders actually use order book information to make trading decisions. In ideal markets without manipulation, traders may extract useful information from the order book, making more informed decisions over those that neglect such information. A manipulator exploits such learning process, minimizing its own risk in the process. Spoof orders are typically placed at price levels just outside the current best quotes to mislead other investors and withdrawn with high probability before any market movement could trigger a trade [4,5].
We aim to reproduce spoofing in a computational model, as a first step toward developing more robust measures to characterize and prevent spoofing. Figure 2 gives an overview of our agent-based market model. The model implements a continuous double auction (CDA) market with a single security traded. The CDA is a two-sided mechanism adopted by most financial and commodity markets [6]. Traders can submit limit orders at any time, and, whenever an incoming order matches an existing one, they trade at the incumbent order’s limit price. We adopt an agent-based modeling approach to simulate the interactions among players with different strategies. The market is populated with multiple background traders and in selected treatments, one manipulator who executes the spoofing strategy. Background traders are further divided to follow two types of trading strategies: zero intelligence (ZI) that ignores the order book and heuristic belief learning (HBL) that learns from the order book to predict price outcomes. Upon each arrival to trade, a background trader receives a noisy observation of the security’s fundamental value. Based on a series of fundamental observations and its private value, a ZI agent computes the limit-order price by shading a random offset from its valuation, and thus it is non-manipulable. An HBL agent, on the other hand, is susceptible to spoofing: it considers information about orders recently submitted to the market, estimates the probability that orders at various prices would be transacted and chooses the optimal price to maximize expected surplus. The manipulator in our model executes a spoofing strategy similar to that illustrated in Figure 1. The spoofer injects and maintains large spurious buy orders at one tick behind the best bid, designed to manipulate the market by misleading others about the level of demand.
We conduct extensive simulation over hundreds of strategy profiles across parametrically different market environments with and without manipulation. The simulation data are used to estimate normal-form game models over the strategies explored in agent-based simulation. From these models, we derive empirical equilibria, where every agent chooses its best response within the set of available strategies to both the market environment and others’ behavior. Studying behavior in (empirical) equilibrium provides robustness to designer choices in agent-based modeling, selecting behaviors based on a rationality criterion [7]. Although the strategies considered in this game model are restricted compared to the true underlying game (where any conceivable trading strategy is possible), imposing a rationality filter on the set considered accounts for strategic response to different settings and ensures that we are evaluating the most relevant configurations of available strategies.
Our fundamental goals of this work are: (1) to reproduce spoofing and understand its impact on market performance (Section 5); and (2) to propose and evaluate variations of market designs (Section 6) and learning-based trading strategies (Section 7) in mitigating manipulation. Below, we overview the structure of the paper and summarize our main contributions and results.

Roadmap

We start by reproducing spoofing in an agent-based model and evaluating its impact on background traders. Section 3 introduces the design of our CDA market model and parameterized trading strategies. Section 4 describes the empirical game-theoretic analysis (EGTA) methodology [7], which we adopt for finding equilibria in games defined by heuristic strategy space and simulated payoff data. Section 5 addresses the choice of background traders among HBL and ZI strategies in markets with and without spoofing. We demonstrate through EGTA that, in a range of non-spoofing environments, HBL is preferred in equilibrium and benefits price discovery and social welfare. However, this renders a market vulnerable to manipulation: by executing a spoofer against the equilibrium profiles, we show that simple spoofing strategies can manipulate prices in a desired direction. After re-equilibrating games with spoofing, we find HBL still persists in equilibria but with smaller mixture probability, suggesting a consistently spoofable market. Although the welfare benefits of HBL remain, the presence of spoofing decreases market surplus.
Building on our computational model of spoofing, we investigate market mechanisms and trading strategies to mitigate spoofing without directly detecting each individual activity. In Section 6, we propose a cloaking mechanism to deter spoofing. It adapts the way a standard order book discloses market information by symmetrically concealing a specified number of price levels from the inside of the book. The idea is to make it more difficult for the spoofer to post misleading bids, while not unduly degrading the general usefulness of market information. We characterize market conditions under which such cloaking may mitigate manipulation and benefit market welfare. We further design sophisticated spoofing strategies that probe to reveal cloaked information and demonstrate that the effort and risk of probing exceed the gains.
In Section 7, we explore two variations of the standard HBL strategy to reduce the vulnerability of learning traders to spoofing. The first selectively ignores orders at certain price levels, particularly where spoof orders are likely to be placed. The second considers the full order book, but adjusts its limit order price to correct for bias in decisions based on the learned heuristic beliefs. We evaluate these variations on two criteria: effectiveness in non-manipulated markets and robustness against manipulation.

2. Related Work

2.1. Agent-Based Modeling of Financial Markets

Agent-based modeling (ABM) takes a simulation approach to study complex domains with dynamically interacting decision makers. ABM has been frequently applied to modeling and understanding phenomena in financial markets [8], for example to study the Flash Crash [9] or to replicate the volatility persistence and leptokurtosis characteristic of financial time series [10]. A common goal of agent-based finance studies is to reproduce stylized facts of financial market behavior [11] and to support causal reasoning about market environments and mechanisms. Researchers have also use ABM to investigate the effects of particular trading practices, such as market making [12] and latency arbitrage [13]. ABM advocates argue that simulation is particularly well-suited to study financial markets [14], as analytic models in this domain typically require extreme stylization for tractability, and pure data-driven approaches cannot answer questions about changing market and agent designs.

2.2. Autonomous Bidding Strategies

There is a substantial literature on autonomous bidding strategies in CDA markets [15]. The basic zero intelligence (ZI) strategy [16] submits offers at random offsets from valuation. Despite its simplicity, ZI has been shown surprisingly effective for modeling some cases [17]. In this study, we adopt an extended and parameterized version of ZI to represent trading strategies that ignore order book information.
Researchers have also extended ZI with adaptive features that exploit observations to tune themselves to market conditions For example, the zero intelligence plus (ZIP) strategy outperforms ZI by adjusting an agent-specific profit margin based on successful and failed trades [18,19]. Vytelingum et al. [20] introduced another level of strategic adaptation, allowing the agent to control its behavior with respect to short and long time scales. We note that to some extent, the adaptive functions of these strategies are implicitly achieved by the game-theoretic equilibration process which we employ to determine the parametric configurations of the (non-adaptive) trading strategies [21].
Gjerstad proposed a more direct approach to learning from market observations, termed GD in its original version [22] and named heuristic belief learning (HBL) in a subsequent generalized form [23]. The HBL model estimates a heuristic belief function based on market observations over a specific memory length. Variants of HBL (or GD) have featured prominently in the trading agent literature. For example, Tesauro and Das [24] adapted the strategy to markets that support persistent orders. Tesauro and Bredin [25] showed how to extend beyond myopic decision making by using dynamic programming to optimize the price and timing of bids.
We adopt HBL as our representative class of agent strategies that exploit order book information. HBL can be applied with relatively few tunable strategic parameters, compared to other adaptive strategies in the literature. We extend HBL to a more complex market environment that supports persistent orders, combined private and fundamental values, noisy observations, stochastic arrivals and the ability to trade multiple units with buy or sell flexibility. The extended HBL strategy considers the full cycle of an order, including the times an order is submitted, accepted, canceled or rejected.

2.3. Spoofing in Financial Markets

The literature on spoofing and its impact on financial markets is fairly limited. Some empirical research based on historical financial market data has been conducted to understand spoofing. Lee et al. [26] empirically examined spoofing by analyzing a custom data set, which provides the complete intraday order and trade data associated with identified individual accounts in the Korea Exchange. They found investors strategically spoof the stock market by placing orders with little chance to transact to add imbalance to the order book. They also discovered that spoofing usually targets stocks with high return volatility but low market capitalization and managerial transparency. Wang investigated spoofing on the index futures market in Taiwan, identifying strategy characteristics, profitability and real-time impact [27]. Martinez-Miranda et al. [28] implemented spoofing behavior within a reinforcement learning framework to model conditions where such behavior is effective. Tao et al. [29] presented a micro-structural study of spoofing in a static setting, providing conditions under which a market is more likely to admit spoofing behavior as a function of the characteristics of the market.
To our knowledge, we provide the first computational model of spoofing a dynamic financial market and demonstrate the effectiveness of spoofing against approximate-equilibrium traders in this proposed model. Our model provides a way to quantify the effect of spoofing on trading behavior and efficiency, and thus it is a first step in the design of methods to deter or mitigate market manipulation.

2.4. Connections between Spoofing and Adversarial Machine Learning

If we view the market comprised of HBL and ZI agents as mapping a sequence of orders over time—distilled into a collection of features used by the HBL agents—to a market price, spoofing then can be viewed as a variant of decision-time attacks on machine learning models [30,31,32,33]. Prior work has also used conditional GANs to generate order streams submitted by HBL and ZI agents in market aggregate [34]. These attacks, commonly called adversarial examples, have demonstrated vulnerabilities in a broad array of algorithmic models from linear classification [35,36] to deep neural networks [32,37] and across a variety of problem domains, including vision [30,37,38], speech and natural language processing [39,40] and malware detection [41,42].
The spoofing attacks we study here can be viewed as examples of realizable attacks that explicitly account for domain constraints [40,42,43,44,45,46]. In our case, for example, manipulation is conducted in the form of submitting and canceling orders, and thus it only indirectly impacts the features extracted by HBL agents. Furthermore, an important aspect of the market context that is central to our analysis, yet rarely considered in prior adversarial learning literature, is market equilibrium behavior; a notable exception is a game-theoretic analysis of adversarial linear regression with multiple learners [47].
Finally, the proposed variations of HBL that increase its robustness to market manipulation are in the spirit of the literature investigating robustness of machine learning to decision-time attacks [42,48,49]. The principle difference is the particular attention we pay to the market structure in balancing robustness and efficacy of learning from order information.

3. Market Model

We present the general structure of the agent-based financial market environment in which we model spoofing. Our model comprises agents trading a single security through a continuous double auction (CDA), the mechanism adopted by most financial markets today. We first describe the market mechanism in Section 3.1. Our model is designed to capture key features of market microstructure (e.g., fundamental shocks and observation noise), supporting a configurable simulator to understand the effect of spoofing under different market conditions. The market is populated with multiple background traders who represent investors in the market, and in selected treatments, a spoofer who seeks trading profit through manipulative action. We specify the valuation model of background traders in Section 3.2 and the two families of background-trader strategies in Section 3.3. In Section 3.4, we discuss the behavior of the spoofing agent.

3.1. Market Mechanism

The market employs a CDA mechanism with a single security traded. Prices are fine-grained and take discrete values at integer multiples of the tick size. Time is also fine-grained and discrete, with trading over a finite horizon T. Agents in the model submit limit orders, which specify the maximum (minimum) price at which they would be willing to buy (sell) together with the number of units to trade. Orders are immediately matched as they arrive: if at any time, one agent’s maximum price to buy a unit is greater than or equal to another agent’s minimum price to sell a unit, a transaction will occur and the agents trade at the price of the incumbent order.
The CDA market maintains a limit order book of outstanding orders and provides information about the book to traders with zero delay. The buy side of the order book starts with BID t , the highest-price buy order at time t, and extends to lower prices. Similarly, the sell side starts with ASK t , the lowest-price sell order at time t, and extends to higher prices. On order cancellation or transaction, the market removes the corresponding orders and updates the order book. Agents may use order book information at their own discretion. In Section 6, we investigate how changes made in such order book disclosure may help to mitigate spoofing.

3.2. Valuation Model

Our valuation model combines individual (private) and fundamental (common) values for a security, following prior computational literature on financial markets [13,50]. The fundamental value  r t of the security at time t [ 0 , T ] changes throughout the trading period according to a mean-reverting stochastic process:
r t = max { 0 , κ r ¯ + ( 1 κ ) r t 1 + u t } ;   r 0 = r ¯ .
The parameter κ [ 0 , 1 ] specifies the degree to which the value reverts back to a fundamental mean r ¯ . A process with κ = 0 corresponds to a martingale Gaussian fundamental, whereas κ = 1 specifies a process of i.i.d. Gaussian draws around the fundamental mean. A mean-reverting time series of this sort has been empirically observed in financial markets such as foreign exchange and commodity markets [51]. The perturbation u t captures a systematic random shock upon the fundamental at time t and is normally distributed as u t N ( 0 , σ s 2 ) , where σ s 2 represents an environment-specific shock variance. The shock variance governs fluctuations in the fundamental time series and consequently affects the predictability of future price outcomes.
Our time-varying fundamental induces adverse selection, a situation where outstanding orders reflect outdated information and thus can be at a disadvantage at the current time. If the fundamental shifts significantly, subsequent agents are more likely to transact with orders on the side opposite to the direction of fundamental change. That is, a positive price shock will tend to trigger transactions with stale sell orders, and a negative shock with stale buys. An agent’s exposure to adverse selection in a market is jointly controlled by the fundamental shock variance σ s 2 , the degree of mean reversion κ and the arrival rate of that agent.
The entries of a background trader follow a Poisson process with an arrival rate λ a . Upon each entry, the trader observes an agent-and-time-specific noisy fundamental o t = r t + n t , where the observation noise n t is drawn from n t N ( 0 , σ n 2 ) . Just as in real financial markets, investors will never know the true value of the underlying security, such noisy observations represent each trader’s assessment of the security’s fundamental value at that time. Given its incomplete information about the fundamental, the agent can potentially benefit by considering market information, which is influenced by and therefore reflects the aggregate observations of other agents. When it arrives, the trader withdraws its previous order (if untransacted) and submits a new single-unit limit order, either to buy or sell as instructed with equal probability.
The individual (private) value of a background trader i represents its preferences over holdings of the security:
Θ i = ( θ i q max + 1 , , θ i 0 , θ i 1 , , θ i q max ) .
The vector has length 2 q max , where q max is the maximum position (long or short) a trader can hold at any time. Element θ i q in the vector specifies the incremental private benefit foregone by selling one unit of the security given a current net position of q. Alternatively, θ i q + 1 can be understood as the marginal private gain from buying an additional unit given current net position q.
Private values follow the law of diminishing marginal utility observed in many economic settings, as well as commonly assumed for assets trading in financial markets [13]. One natural example is when a trader is aiming for a target investment position. Before reaching this position, the private component is positive for each incremental share, and the more shares the trader needs to buy to reach the optimal position, the higher the marginal utility would be (as the agent is more eager to get close to the optimal position); after a trader passes her desired holding position, she gets negative private value an extra share (e.g., due to cumulative risk), and the more the position deviates from the optimal, the higher the penalty becomes. To capture this diminishing marginal utility, that is θ q θ q for all q q , we generate Θ i from a set of 2 q max values drawn independently from N ( 0 , σ P V 2 ) , sort elements in descending order and assign θ i q to its respective value in the sorted list.
Agent i’s incremental surplus for a trade can be calculated based on its position q before the trade, the value of the fundamental at the end of the trading horizon r T and the transaction price p:
incremental surplus = r T p + θ i q + 1 if buying 1 unit , p r T θ i q if selling 1 unit .
An agent’s total surplus is the sum of the agent’s incremental surplus over all transactions. Alternatively, we can also calculate an agent’s total surplus by adding its net cash from trading to the final valuation of holdings. Specifically, the market’s final valuation of trader i with ending holdings H is
v i = r T × H + k = 1 k = H θ i k for long position H > 0 , r T × H k = H + 1 k = 0 θ i k for short position H < 0 .
We define background-trader surplus as the sum of all background agents’ surpluses at the end of the trading period T.

3.3. Background Trading Agents

Recall that background traders represent investors with actual preferences for holding long or short positions in the underlying security. The limit-order price submitted by a background trader is jointly decided by its valuation and trading strategy, which we describe in detail below.

3.3.1. Estimating the Final Fundamental

As holdings of the security are evaluated at the end of a trading period (i.e., r T × H ), a background trader estimates the final fundamental value based on a series of its noisy observations. We assume the market environment parameters (mean reversion, shock variance, etc.) are common knowledge for background agents.
Given a new noisy observation o t , an agent estimates the current fundamental by updating its posterior mean r ˜ t and variance σ ˜ t 2 in a Bayesian manner. Let t denote the agent’s preceding arrival time. We first update the previous posteriors, r ˜ t and σ ˜ t 2 , by mean reversion for the interval since preceding arrival, denoted δ = t t :
r ˜ t ( 1 ( 1 κ ) δ ) r ¯ + ( 1 κ ) δ r ˜ t and σ ˜ t 2 ( 1 κ ) 2 δ σ ˜ t 2 + 1 ( 1 κ ) 2 δ 1 ( 1 κ ) 2 σ s 2 .
The estimates for the current arrive at time t are then given by
r ˜ t = σ n 2 σ n 2 + σ ˜ t 2 r ˜ t + σ ˜ t 2 σ n 2 + σ ˜ t 2 o t and σ ˜ t 2 = σ n 2 σ ˜ t 2 σ n 2 + σ ˜ t 2 .
Based on the posterior estimate of r ˜ t , the trader computes r ^ t , its estimate at time t of the terminal fundamental r T , by adjusting for mean reversion:
r ^ t = 1 ( 1 κ ) T t r ¯ + ( 1 κ ) T t r ˜ t .

3.3.2. Zero Intelligence (ZI) as a Background Trading Strategy

We consider parameterized trading strategies in the zero intelligence (ZI) family [16]. Background traders who choose to adopt ZI strategies compute limit-order prices solely based on fundamental observations and private values. ZI agents generate bids reflecting a requested surplus, determined by a random offset uniformly drawn from [ R min , R max ] . These bids shade from the agent’s valuation by this requested surplus. Specifically, a ZI trader i arriving at time t with position q generates a limit price
p i ( t ) U [ r ^ t + θ i q + 1 R max , r ^ t + θ i q + 1 R min ] if buying , U [ r ^ t θ i q + R min , r ^ t θ i q + R max ] if selling .
Our version of ZI further considers the market’s current best quotes, and it can choose to immediately trade to get a certain fraction of its requested surplus. This option is governed by a strategic threshold parameter η [ 0 , 1 ] : if the agent could achieve a fraction η of its requested surplus at the current price quote, it would simply take that quote rather than submitting a new limit order. Setting η to 1 is equivalent to the strategy without a threshold. Both shading and threshold-taking provide some non-learning ways for ZI agents to strategically adapt to different market environments and improve profitability.

3.3.3. Heuristic Belief Learning (HBL) as a Background Trading Strategy

The second background trading strategy family we consider is heuristic belief learning (HBL). Background traders who choose to adopt HBL go beyond their own observations and private values by also considering order book information. We make a set of changes to adapt the strategy to our dynamic market environment, supporting multiple-unit trading with a flexible buy or sell role.
The strategy is centered on the belief function that a background trader forms on the basis of its observed market data. The agent uses the belief function to estimate the probability that orders at various prices would be accepted in the market and then chooses a limit price that maximizes its expected surplus at current valuation estimates.
Specifically, an HBL agent constructs its belief function based on a dataset D that records accepted and rejected buy and sell orders during the last L trades. The strategic parameter L represents the agent’s memory length, which controls the size of D . Upon an arrival at time t, the HBL agent builds a belief function f t ( P ) , designed to represent the probability that an order at price P will result in a transaction. Specifically, the belief function is defined for any encountered price P as the following:
f t ( P D ) = TBL t ( P D ) + AL t ( P D ) TBL t ( P D ) + AL t ( P D ) + RBG t ( P D ) if buying , TAG t ( P D ) + BG t ( P D ) TAG t ( P D ) + BG t ( P D ) + RAL t ( P D ) if selling .
Here, T and R specify transacted and rejected orders, respectively; A and B represent asks and bids; and L and G describe orders with prices less than or equal to and greater than or equal to price P, respectively. For example, TBL t ( P D ) is the number of transacted bids found in the memory with price less than or equal to P up to time t. An HBL agent updates its dataset D whenever the market receives new order submissions, transactions or cancellations and computes the statistics in Equation (4) upon each arrival.
Since our market model supports persistent orders and cancellations, the classification of an order as rejected is non-obvious and remains to be defined. To address this, we associate orders with a grace period τ gp and an alive period τ al . We define the grace period as the average time interval per arrival, that is τ gp = 1 / λ a , and the alive period τ al of an order as the time interval from submission to transaction or withdrawal if it is inactive or to the current time if active. An order is considered as rejected only if its alive period τ al is longer than τ gp , otherwise it is partially rejected by a fraction of τ al / τ gp . As the belief function, Equation (4) is defined only at encountered prices; we further extend it over the full price domain by cubic spline interpolation. To speed the computation, we pick knot points and interpolate only between those points.
After formulating the belief function, an agent i with the arrival time t and current holdings q searches for the optimal price P i * ( t ) that maximizes its expected surplus:
P i * ( t ) = arg max P ( r ^ t + θ i q + 1 P ) f t ( P D ) if buying , arg max P ( P θ i q r ^ t ) f t ( P D ) if selling .
In the special cases when there are fewer than L transactions at the beginning of a trading period or when one side of the order book is empty, HBL agents behave the same as ZI agents until enough information is gathered to form the belief function. As those cases are rare, the specific ZI strategy that HBL agents adopt does not materially affect the overall performance. In Section 7, we explore variations of the HBL strategy to improve its learning robustness in the face of market manipulation.

3.4. The Spoofing Agent

The spoofing agent seeks profits only through manipulating prices. Unlike background traders, the spoofer has no private value for the security. We design a simple spoofing strategy which maintains a large volume of buy orders at one tick behind the best bid. Specifically, upon arrival at T sp [ 0 , T ] , the spoofing agent submits a buy order at price BID T sp 1 with volume Q sp 1 . Whenever there is an update on the best bid, the spoofer cancels its original spoof order and submits a new one at price BID t 1 with the same volume. Since in our model, background traders submit only single-unit orders, they cannot transact with the spoof order, which is always shielded by the order at a higher price BID T sp . If that higher-price order gets executed, the spoofer immediately cancels and replaces its spoof orders before another background trader arrives. Here, we assume in effect that the spoofing agent can react infinitely fast, in which case its spoof orders are guaranteed never to transact. Even without making any trade, the spoofer maneuvers HBL traders’ pricing beliefs (Equation (4)) via such submissions and cancellations of spoof orders, which ultimately affect their bidding behavior (Equation (5)) and move the price.
By continuously feigning buy interest in the market, this spoofing strategy specifically aims to raise market beliefs. To profit from such manipulation practice, a spoofing agent may first buy some shares of the security, manipulate the market to push prices up and later sell those previously bought shares at higher prices. Other spoofing strategies such as adding sell pressure or alternating between buy and sell pressure can be extended from the basic version.

4. Empirical Game-Theoretic Analysis

To reproduce spoofing and understand its effect, we employ a computational approach that combines agent-based modeling, simulation and equilibrium computation. The point of identifying equilibria of the agent-based model is to focus on the most relevant strategic contexts, where agents are making the best choices among their available strategies, given others’ choices. To derive Nash equilibria, we employ empirical game-theoretic analysis (EGTA), a methodology that finds approximate equilibria in games defined by heuristic strategy space and simulated payoff data [7]. We conduct systematic EGTA studies over a range of parametrically defined market environments, all based on the market model described in Section 3.
We model the market as a game with players in two roles: N background traders, treated symmetrically, and a single spoofer. In most of our games, the spoofing agent, when present, implements a fixed policy so is not considered a strategic player. Symmetry of the background traders means that each has the same set of available strategies (from the ZI and/or HBL families) to choose from, and their payoffs depend on their own strategy and the number of players choosing each of the other strategies (i.e., it does not matter which other-agent plays which other-strategy). For each game, we evaluate a wide variety of strategy profiles (i.e., agent-strategy assignments). For each strategy profile, we conduct thousands of simulation runs to account for stochastic effects such as the market fundamental series, agent arrival patterns and private valuations and get low-variance estimates of the expected payoffs for that profile. Given background trader symmetry, the payoff of a specific strategy in a profile can be taken as the average payoff over all agents playing that strategy in the profile. From the payoff data accumulated from these simulated samples of explored strategy profiles, we induce an empirical game model, and from that we derive an approximate Nash equilibrium.
We employ an iterative EGTA process. First, we find candidate equilibria in subgames, where a subgame here is defined as a normal-form game over strategy subsets (we note the contrast with the standard notion in extensive-form games of subgame as subtree). We then confirm or refute candidate solutions by examining deviations and incrementally extend subgames, until the termination criteria are satisfied. Below, we describe two key components of the EGTA process we follow: profile search (Section 4.1) and game reduction (Section 4.2).

4.1. Profile Search

We apply EGTA iteratively to guide the profile search over the strategy space. Exploration starts with singleton subgames, and then it incrementally considers each strategy outside the subgame strategy set. Specifically, the singleton subgames are profiles where the same strategy is adopted by all background agents. Starting from this base, we extend evaluation to neighboring profiles with single-agent deviations. Following such a procedure, we systematically explore profiles and incorporate their payoff estimates into the partial payoff matrix corresponding to the empirical game model.
After subgames are completed (all profiles explored for strategy subsets), we compute their equilibria and consider these as candidate solutions of the full game. We attempt to refute these candidates by evaluating deviations outside the subgame strategy set, constructing a new subgame when a beneficial deviation is found. If we examine all deviations without refuting, the candidate is confirmed. We continue to refine the empirical subgame with additional strategies and corresponding simulations until at least one equilibrium is confirmed and all non-confirmed candidates are refuted (up to a threshold support size). In this study, we have support sizes (i.e., numbers of strategies played with positive probability) up to five for background agents.
The procedure aims to confirm or refute promising equilibrium candidates found throughout our exploration of the strategy space. By following a fixed procedure and reporting all equilibria found meeting pre-specified criteria, we maintain consistency across the games analyzed. Since it is often not computationally feasible to search the entire profile space, additional distinct equilibria (e.g., with large support size) are possible. We are aware of no systematic biases in the search procedure with respect to properties of interest, and therefore consider it unlikely that we are missing qualitatively important phenomena across the range of environments analyzed. Finally, we note that equilibria identified in empirical games must generally be viewed as provisional, as they are subject to refutation by strategies outside the restricted set considered in the analysis.

4.2. Game Reduction

As the game size (i.e., number of possible strategy profiles) grows exponentially in the number of players and strategies, it is computationally prohibitive to directly analyze games with more than a moderate number of players. We therefore apply aggregation methods to approximate a many-player game by a game with fewer players. The specific technique we employ, called deviation-preserving reduction (DPR) [52], defines reduced-game payoffs in terms of payoffs in the full game as follows. Consider an N-player symmetric game, which we want to reduce to a k-player game. The payoff for playing strategy s 1 in the reduced game, with other agents playing strategies ( s 2 , , s k ) , is given by the payoff of playing s 1 in the full N-player game when the other N 1 agents are evenly divided among the k 1 strategies s 2 , , s k . To facilitate DPR, we choose values for N and k to ensure that the required aggregations come out as integers. For example, in one of the market environment, we reduce games with 28 background traders to games with four background traders. With one background player deviating to a new strategy, we can reduce the remaining 27 players to three. For games that vary smoothly with the number of other players choosing any particular strategy, we can expect DPR to produce reasonable approximations of the original many-player games with exponential reduction in simulation.

5. Spoofing the Limit Order Book

In this section, we reproduce spoofing in the agent-based market model and study its effect on background trading behavior and market outcomes. We start in Section 5.1 by exploring a range of market environments that can affect the effectiveness of both learning and spoofing. Section 5.2 addresses agents’ choices among ZI and HBL strategies in markets without spoofing. This is an important step, as spoofing can be effective only if some fraction of background traders choose to learn from the order book information. Section 5.3 investigates games with spoofing. We first illustrate that a market populated with HBL traders is susceptible to spoofing: a simple spoofing strategy can cause a rise in market prices and a redistribution of surplus between ZI and HBL traders. We finally re-equilibrate the game with spoofing to investigate the impact of spoofing on HBL adoption and market surplus.

5.1. Market Environments

Based on the defined market model, we conduct preliminary explorations over a range of market settings and include the most salient and meaningful ones for our study. We consider nine market environments that differ in fundamental shock, σ s 2 { 10 5 , 5 × 10 5 , 10 6 } , and in observation noise, σ n 2 { 10 3 , 10 6 , 10 9 } . Recall that shock variance controls fluctuations in the fundamental time series and observation variance governs the quality of information agents get about the true fundamental. The nine environments cover representative market conditions that can affect an agent’s ability and need to learn from market information. For example, when the market shock variance is large, prices fluctuate more and market history may become less predictive; when observation noise is high, agents can glean only limited information from their own observations and may gain more from the market’s aggregated order book information. We label the low, medium and high shock variances as { LS , MS , HS } and noisy observation variances as { LN , MN , HN } , respectively. For instance, the label LSLN refers to a market with low shock, σ s 2 = 10 5 , and low observation noise, σ n 2 = 10 3 .
The global fundamental time series is generated according to Equation (1) with fundamental mean r ¯ = 10 5 , mean reversion κ = 0.05 and specified shock variance σ s 2 . The minimum tick size is fixed at one. Each trading period lasts T = 10,000 time steps. For each environment, we consider markets populated with N { 28 , 65 } background traders and in selected treatments, a spoofer. Background traders arrive at the market according to a Poisson distribution with a rate λ a = 0.005 , and, upon each arrival, the trader observes a noisy fundamental o t = r t + n t , where n t N ( 0 , σ n 2 ) . The maximum number of units background traders can hold at any time is q max = 10 . Private values are drawn from a Gaussian distribution with zero mean and a variance of σ PV 2 = 5 × 10 6 . The spoofing agent starts to manipulate at time T sp = 1000 by submitting a large buy order at price BID T sp 1 with volume Q sp = 200 , and later maintains spoofing orders at price BID t 1 throughout the trading period.
To provide a benchmark for market surplus, we calculate the social optimum—the expected total possible gains from trade, which depends solely on the trader population size and valuation distribution. From 20,000 samples of the joint valuations, we estimate mean social optima of 18,389 and 43,526 for markets with 28 and 65 background traders, respectively. We further calculate the average order book depth (on either buy or sell side) in markets without spoofing. Throughout the trading horizon, the N = 28 market has a relatively thin order book with an average depth of 12 per side, whereas the N = 65 market has a thicker one with an average depth of 30.
The background trading strategy set (see Table 1) includes seven versions of ZI and four versions of HBL. Agents are allowed to choose from this restricted set of strategies. We have also explored ZI strategies with larger shading ranges and HBL strategies with longer memory lengths, but they fail to appear in equilibrium in games where they were explored.

5.2. Games without Spoofing

Since spoofing targets the order book and can be effective only to the extent traders exploit order book information, we investigate whether background agents adopt the HBL strategy in markets without spoofing. Applying EGTA to the eleven background strategies in Table 1, we found at least one equilibrium for each market environment. Detailed results on equilibrium mixture and outcomes of games without spoofing can be found in Appendix A.2.
Figure 3 (blue circles) depicts the proportion of background traders who choose trading strategies in the HBL family. In most non-spoofing environments, HBL is adopted with positive probability, suggesting that investors generally have incentives to make bidding decisions based on order book information. We find that HBL is robust and widely preferred in markets with more traders, low fundamental shocks and high observation noise. Intuitively, a larger population size implies a thick order book with more learnable aggregated data; low shocks in fundamental time series increase the predictability of future price outcomes; and high observation noise limits what an agent can glean about the true fundamental from its own information. This is further confirmed in the two exceptions where all agents choose ZI: HSLN and HSMN with N = 28 , the environments with fewer traders, high fundamental shocks and at most medium observation noise.
We further quantify how learning from market information may benefit overall market performance. We conduct EGTA in games where background traders are restricted to strategies in the ZI family ( ZI 1 ZI 7 in Table 1). This is tantamount to disallowing learning from order book information. Detailed equilibrium results on games restricted to ZI strategies can be found in Appendix A.4. We compare equilibrium outcomes for each environment, with and without HBL available to background traders, on two measures: surplus (Figure 4) and price discovery (Figure 5). Recall that we define background-trader surplus as the sum of all background agents’ surpluses at time T, the end of trading. Price discovery is defined as the root-mean-squared deviation (RMSD) of the transaction price from the estimate of the true fundamental in Equation (2) over the trading period. It reflects how well transactions reveal the true value of the security. Lower RMSD means better price discovery. We calculate the two measures by averaging the outcomes of 20,000 simulations of games with strategy profiles sampled according to each equilibrium mixture.
Overall, background traders achieve higher surplus (Figure 4) and better price discovery (Figure 5) when the market provides order book information and enables the HBL strategy option. When HBL exists in the equilibrium, we find transactions reveal fundamental estimates well, especially in markets with lower shock and observation variances (i.e., LSLN, LSMN, MSLN and MSMN). We also notice small exceptions in scenarios with high observation variance and more background traders (environments LSHN and HSHN with 65 players) where ZI-only equilibria exhibit higher surplus than equilibria combining HBL and ZI.

5.3. Games with Spoofing

5.3.1. Comparing across Fixed Strategy Profiles

We examine the effectiveness of our designed spoofing strategy (Section 3.4) by playing a spoofer against each HBL-and-ZI equilibrium found in Section 5.2. We perform controlled comparisons on these games with and without spoofing. As ZI agents are oblivious to spoofing, we ignore the ZI-only equilibria in this analysis. In the paired instances, background agents play identical strategies and are guaranteed to arrive at the same time, receive identical private values and observe the same fundamental values. Therefore, any change in behavior is an effect of spoof orders on HBL traders. For every setting, we simulate 20,000 paired instances, evaluate transaction price differences (Figure 6) and compare surplus attained by HBL and ZI traders. Transaction price difference at a specific time is defined as the most recent transaction price in the run with spoofing minus that of the paired instance without spoofing. Similarly, surplus difference of HBL or ZI is the aggregated surplus obtained in an environment with spoofing minus that of the corresponding environment without spoofing.
Figure 6 shows positive changes in transaction prices across all environments, subsequent to the arrival of a spoofing agent at T sp = 1000 . This suggests that HBL traders are tricked by the spoof buy orders: they believe the underlying security should be worth more and therefore submit or accept limit orders at higher prices. Although ZI agents do not change their bidding behavior directly, they may transact at higher prices due to the increased bids of HBL traders.
Several other interesting findings are revealed by the transaction-price difference series. First, the average price rise caused by spoofing the market with 28 background traders is higher than for N = 65 . This indicates that a market with fewer background traders can be more susceptible to spoofing, due to the limited pricing information a thin market could aggregate. Second, for markets populated with more HBLs than ZIs in the equilibrium mixture, the transaction price differences tend to increase throughout the trading period. This amplification can be explained by HBLs consistently submitting orders at higher prices and confirming each other’s spoofed belief. However, for markets with more ZIs, the spoofing effect diminishes as ZIs who do not change their limit-order pricing can partly correct the HBLs’ illusions. Finally, we observe that the spoofing effect tends to attenuate over time: differences in transaction prices first increase, and then stabilize or decrease. This is due to the mean-reverting property of the fundamental series and the way background traders estimate the final fundamental. As time approaches the end of the trading period, background agents rely more on accumulated fundamental observations and get better estimates of the final fundamental value. Therefore, spoofing tends to wear off in the face of accumulated observations and mean reversion.
We further compare background-trader payoffs attained in environments with and without spoofing. We find a redistribution of surplus between HBL and ZI agents: HBL aggregated surplus decreases, while that for ZI increases compared to the non-spoofing baselines. Specifically, across 28-trader market environments, HBL traders suffer an average surplus decrease of 184 across all equilibrium profiles, whereas the ZI traders have an average surplus gain of 19. For the 65-trader markets, the average surplus decrease for HBL traders is 238, while the average increase for ZI is 40. This suggests that the ZI agents benefit from the HBL agents’ spoofed beliefs. Since the decreases in HBL surplus are consistently larger than the increases for ZI, the overall market surplus decreases. We leave further discussion of spoofing’s impact on market surplus to Section 5.3.2, where background traders can choose other strategies to adjust to the presence of spoofing.
To examine the potential to profit from a successful price manipulation, we extend the spoofing agent with an exploitation strategy: buying, (optionally) spoofing to raise the price and then selling. The exploiting spoofer starts by buying when there is a limit sell order with price less than the fundamental mean in the market. It then optionally runs the spoofing trick, or alternatively waits, for 1000 time steps. Finally, the agent sells the previously bought unit (if any) when it finds a limit buy order with price more than fundamental mean. Note that, even without spoofing, this single-unit exploitation strategy is profitable in expectation due to the mean reversion captured by the fundamental process and the reliable arrivals of background traders with private preferences.
Figure 7 compares the exploitation profits with and without spoofing. In controlled experiments, we find that exploitation profits are consistently increased when the spoof action is also deployed. Across 28-trader market environments, the exploiter makes an average profit of 206.1 and 201.8 with and without spoofing, respectively, and the increases in profit range from 1.2 to 11.5. For the 65-trader market, the average profits of this exploitation strategy with and without spoofing are 50.5 and 46.3, respectively, with the increases in profit varying from 1.7 to 9.4 across environments. Statistical tests show all increases in profit are significantly larger than zero. Regardless of spoofing, the exploitation strategy profits more in the thinner market due to the greater variance in transaction prices.

5.3.2. Re-Equilibrating Games with Spoofing

To understand how spoofing changes background-trading behavior, we conduct EGTA again to identify Nash equilibria, allowing background traders to choose any strategy in Table 1, in games with spoofing. Detailed results on equilibrium mixture and outcomes of games with spoofing can be found in Appendix A.3. As indicated in Figure 3 (orange triangles), after re-equilibrating games with spoofing, HBL is generally adopted by a smaller fraction of traders, but it still persists in equilibrium in most market environments. HBL’s existence after re-equilibration indicates a consistently spoofable market: the designed spoofing tactic fails to eliminate HBL agents, and, in turn, the persistence of HBL may incentivize a spoofer to continue effectively manipulating the market.
We characterize the effect of spoofing on market surplus. Figure 8 compares the total surplus achieved by background traders in equilibrium with and without spoofing. Given the presence of HBL traders, spoofing generally decreases total surplus (as, in Figure 8, most filled orange triangles are below the filled blue circles). However, spoofing has ambiguous effect in the thicker market with large observation variance (environments LSHN and HSHN with 65 background agents). This may be because noise and spoofing simultaneously hurt the prediction accuracy of the HBL agents and therefore shift agents to other competitive ZI strategies with higher payoffs. Finally, we find the welfare effects of HBL strategies persist regardless of spoofing’s presence: markets populated with HBL agents in equilibrium achieve higher total surplus than those markets without HBL (as, in Figure 8, the hollow markers are below the filled markers).

5.4. Discussion

Our agent-based model of spoofing aims to capture the essential logic of manipulation through influencing belief about market demand. In our model, the order book reflects aggregate information about the market fundamental, and learning traders can use this to advantage in their bidding strategies. The presence of such learning traders benefits price discovery and social welfare, but it also renders the market vulnerable to manipulation. As we demonstrate, simple spoofing strategies can effectively mislead learning traders, thereby distorting prices and reducing surplus compared to the non-spoofing baseline. Moreover, the persistence of learning traders in equilibrium with manipulation suggests that the elimination of spoofing requires active measures.
We acknowledge several factors that can limit the accuracy of our equilibrium analysis in individual game instances; these include sampling error, reduced-game approximation and restricted strategy coverage. Despite such limitations (inherent in any complex modeling effort), we believe the model offers a constructive basis to evaluate manipulation practices and any preventive or deterrent proposals to mitigate manipulation under strategic settings. In the rest of the paper, we build on this model and conduct comprehensive analysis to investigate the following questions:
  • Are there more robust ways for exchanges to disclose order book information (Section 6)?
  • Are there strategies by which individual traders can adopt to exploit market information but in less vulnerable ways (Section 7)?

6. A Cloaking Mechanism to Mitigate Spoofing

Despite regulatory enforcement and detection efforts, an individual spoofing episode is hard to catch in high-volume, high-velocity data streams. Legal definitions cannot be easily translated to computer programs to direct detection, and the lack of datasets with labeled manipulation cases makes training a reliable detector infeasible with supervised machine learning techniques. Based on its definition, to determine that a pattern of activity constitutes spoofing requires establishing the manipulation intent behind submission and cancellation of placed orders. However, this is not easy, as order cancellation is in itself common and legitimate: according to one study, 95% of NASDAQ limit orders are canceled, with a median order lifetime less than one second [53]. Another challenge arises from the adversarial nature of a manipulator who may strategically adapt to evade detection and regulation [54]. Given difficulties in robustly detecting manipulation, we study systematic approaches to deter spoofing, by rendering manipulative practices difficult or uneconomical.
Along these lines, Prewit [55] and Biais and Woolley [56] advocated the imposition of cancellation fees to disincentivize manipulative strategies that rely on frequent cancellations of orders. Others argue that cancellation fees could discourage the beneficial activity of liquidity providers, and, in the event of a market crash, such a policy may lengthen the recovery process [57].
We propose here a cloaking mechanism to deter spoofing via the selective disclosure of order book information. The mechanism extends the traditional CDA market with a cloaking parameter K, which specifies the number of price levels to hide symmetrically from inside of the limit order book. The idea is to make it more difficult for the spoofer who relies on the instant order book information to post misleading bids, while not unduly degrading the general usefulness of market information. We focus on deterministic cloaking (i.e., a constant K throughout the trading period), as a stochastic mechanism may raise issues regarding verification of faithful market operations.
We extend our agent-based model of spoofing to support order book cloaking and conduct simulations to evaluate and find the optimal cloaking parameter under strategic settings, where both the learning traders and the spoofer adapt to the new mechanism. Section 6.1 formally defines the cloaking mechanism and describes how we modify the background trading and spoofing strategies accordingly. In Section 6.2, we present an EGTA study conducted to understand agents’ strategic responses to the proposed mechanism. Section 6.3 reports results from performing empirical mechanism design [58] to set cloaking parameters that maximize efficiency. Finally, in Section 6.4, we explore and evaluate sophisticated spoofing strategies that use probing to reveal cloaked information.

6.1. A Cloaking Market Mechanism

The cloaking mechanism maintains a full limit order book just as the regular CDA market, but discloses only a selective part of the book to traders. Let BID t k denote the kth-highest buy price in the book at time t and ASK t k the kth-lowest sell price. In a standard order book, at any given time t, the buy side of the book starts with the best bid, BID t 1 , and extends to lower values; the sell side starts with the best ask, ASK t 1 , and extends to higher ones. The cloaking mechanism works by symmetrically hiding a deterministic number of price levels K from inside of the order book. Thus, the disclosed order book in a cloaking mechanism with parameter K starts with BID t K + 1 and ASK t K + 1 and extends to lower and higher values, respectively. Upon order submissions, cancellations and transactions, the market updates the full order book and then cloaks the K inside levels. Therefore, an order hidden in the past can be revealed later due to the arrival of new orders at more competitive prices, or it can be hidden throughout its lifetime due to a cancellation. The market discloses all the transaction information at zero delay.
Example 1
(A Cloaking Mechanism with Parameter K). When K = 0 , the market acts as a standard CDA, disclosing the full limit order book with zero delay. When K = 1 , the mechanism conceals orders at the best quotes, that is BID t 1 and ASK t 1 . When K = , the market does not reveal any part of the book and thus disallows learning from order book information.
Cloaking operates to deter spoofing in two ways. First, it mitigates the effect of spoof orders, pushing them further from the inside of the book. Second, it increases the spoofer’s transaction risks, as it cannot as easily monitor the quantity of orders ahead of the spoof. On the other hand, the information hiding also affects the non-manipulative traders, for instance in our model it may degrade the HBL traders’ learning capability. To quantify this tradeoff, we start by exploring a range of cloaking parameters, K { 0 , 1 , 2 , 4 } , which control the amount of information being concealed at any given time. We compare trading behavior and outcomes in markets with cloaking to that of a standard CDA. Among the nine market environments defined in Section 5.1, we consider three representatives that are increasingly challenging for the learning traders: LSHN with { σ s 2 = 10 5 , σ n 2 = 10 9 } , MSMN with { σ s 2 = 5 × 10 5 , σ n 2 = 10 6 } and HSLN with { σ s 2 = 10 6 , σ n 2 = 10 3 } . Together with the four cloaking parameters, this gives us a total of 12 market settings, or 24 games with and without spoofing.
The market is populated with 64 background traders and one exploitation agent. Therefore, when adopting DPR to approximate this many-player game, we use simulation data from the (64, 1)-agent environments to estimate reduced (4, 1)-player games, where four players are used to aggregate and represent the background traders. In each game, we consider background trading strategies and spoofing practice similar to those of Section 3, but they are slightly modified to adapt to order book cloaking. Below, we describe changes made to each strategy.

6.1.1. Zero Intelligence

Recall that our ZI strategy uses a threshold parameter η [ 0 , 1 ] to immediately transact with an existing order to grasp a portion of desired surplus. That is, if the agent could achieve a fraction η of its requested surplus at the market best quotes, it would simply take that quote rather than posting a limit order for a future transaction. Under a cloaking mechanism, however, ZI may take into account only the current visible best quotes that are less competitive compared to the hidden quotes. To adjust to cloaking, we explore a range of more aggressive (smaller) η values to ensure that ZI traders may still transact with incumbent orders to lock a certain fraction of surplus. Besides the seven ZI strategies in Table 1, we further include three ZI strategies with η = 0.4 (Table 2), which are competitive enough to appear in at least one equilibrium of our explored environments.

6.1.2. Heuristic Belief Learning

We modify HBL to consider only the revealed order book information under the corresponding cloaking markets. Orders at competitive price levels will be missed in the belief function (Equation (4)) if they are hidden throughout order lifetime, or they may be considered with delay if later exposed at visible levels. This reduction in bid information would naturally be expected to degrade HBL’s learning effectiveness and thus its trading performance.

6.1.3. Spoofing Strategy

We extend the original spoofing strategy (Section 3.4) to cloaking markets. The strategy includes three stages. At the beginning of a trading period [ 0 , T spoof ] , the agent buys by accepting any sell order at price lower than the fundamental mean r ¯ . In a cloaking market, this can be achieved by placing a one-unit limit buy order at price r ¯ and immediately withdrawing it if does not transact with an existing order.
During the second stage [ T spoof , T sell ] , the agent submits spoof buy orders at a tick behind the first visible bid BID T spoof K + 1 1 with volume Q sp 1 . Whenever there is an update on the first visible bid, the spoofer replaces its original spoof with new orders at price BID t K + 1 1 . This spoofing strategy aims to boost price, in the hope that the units purchased in Stage 1 can be later sold at higher prices. In controlled experiments, when the agent is not manipulating, it waits until the selling stage.
During the last stage [ T sell , T ] , the agent starts to sell the units it previously bought by accepting any buy orders at a price higher than r ¯ . Inverse to the first stage, this operates by placing one-unit limit sell orders at price r ¯ , followed by immediate cancellation if not filled. The agent who also manipulates continues to spoof until all the bought units are sold or the trading period ends. The pure exploitation strategy can be considered as a baseline for the spoofing strategy, allowing us to quantify how much more the agent may profit from spoofing the market.
We refer to the agent who employs the above strategy, whether places spoof orders or not, as an exploitation agent or exploiter. An exploiter who also spoofs is referred to as a spoofing agent or spoofer. Note that the spoofing strategy considered here does not face any execution risk on its spoof orders under the assumption it can immediately respond to quote changes. A more sophisticated strategy could probe the market to reveal the cloaked bids, and then spoof at a visible price higher than BID t K + 1 1 . We leave discussion of such probing strategies to Section 6.4.

6.2. Tradeoff Faced by Cloaking Mechanisms

We start by separately investigating the impact of cloaking on background traders and on the spoofer. Our first set of games cover the range of cloaking environments without spoofing (i.e., markets populated with background traders and the non-manipulative exploiter). Detailed results on equilibrium mixture and outcomes of cloaking mechanisms without spoofing can be found in Appendix B.1.
Figure 9 displays the HBL adoption rate (i.e., total probability over HBL strategies) at equilibrium across cloaking mechanisms, K { 0 , 1 , 2 , 4 } . We find that the competitiveness of HBL generally persists when the mechanism hides one or two price levels, but at higher cloaking levels the HBL fraction can drastically decrease. The information loss caused by cloaking weakens HBL’s ability to make predictions. The effect is strongest in environments with high fundamental shocks (e.g., HSLN), as previous hidden orders can become uninformative or even misleading by the time they are revealed. Such information loss is further confirmed in Figure 10, which compares the price discovery achieved at market equilibrium. We find that in markets where the fundamental shock is relatively high and a higher level of cloaking is adopted, transactions may not reveal fundamental estimates very well. Given the decreasing HBL prevalence and learning effectiveness, background-trader surplus achieved at equilibrium also decreases (as shown in Figure 11b (blue diamonds).
Next, we examine whether cloaking can effectively mitigate manipulation. We perform controlled experiments by letting the exploitation agent also execute the spoofing strategy against each found equilibrium and compare the impact of spoofing under the cloaking mechanism to the standard fully revealed order book ( K = 0 ). For every equilibrium, we simulate at least 10,000 paired instances and evaluate their differences on transaction price and agents’ payoffs.
From these controlled experiments, we find that cloaking can considerably diminish price distortion caused by spoofing across environments. Recall that we measure price distortion as the transaction price series in a market with spoofing minus that of its paired market without spoofing. Figure 12a demonstrates the case in a specific environment MSMN: without cloaking ( K = 0 ), transaction prices significantly rise subsequent to the execution of spoofing at T sp = 1000 , as HBL traders are tricked by the spoof buy orders; in cloaked markets, this price rise is effectively mitigated. Figure 12b further illustrates the surplus change in background traders and the exploiter when it also spoofs. We find the exploiter can robustly profit from manipulating the learning agents in the no-cloaking case. In contrast, partially hiding the order book can significantly reduce spoofing profits and prevent background traders from losing much. These findings indicate the cloaking mechanism may deter or even eliminate the exploiter’s incentive to spoof.

6.3. Finding the Optimal Cloaking

Given the tradeoff between preserving order book informativeness and mitigating manipulation, the question becomes: Under what circumstances do the deterrence benefits of cloaking exceed its efficiency costs? To answer this, we re-equilibrate games allowing the exploiter to strategically choose whether to spoof, with background traders able to execute any strategy in Table 1 or Table 2. This allows background traders and the exploitation agent to strategically respond to each other under a certain level of information cloaking. Detailed results on equilibrium mixture and outcomes can be found in Appendix B.2.
Our findings are presented in Figure 11. We compare market outcomes with and without cloaking on two metrics: the probability of spoofing and total background-trader surplus in equilibrium. (Due to the welfare benefits of HBL, equilibria with pure ZIs usually achieve much lower surplus than those with HBLs. For presentation simplicity, we omit all-ZI equilibria from Figure 11b. Environments with such cases are marked with asterisks.) As shown in Figure 11a, the cloaking mechanism effectively decreases the probability of spoofing under most environment settings—completely eliminating spoofing in some cases. Moreover, we find moderate cloaking can preserve the prevalence of HBL at equilibrium, which otherwise would be decreased by spoofing as we saw in Section 5.
This weakened spoofing effect is further confirmed by Figure 11b, which compares the total background-trader surplus achieved in equilibrium under mechanisms with and without cloaking. Without cloaking (i.e., K 0 columns), background surplus achieved in equilibrium where the exploiter strategically chooses to spoof (orange triangles) is much lower than the surplus attained when the exploiter is prohibited from spoofing (blue diamonds). We find the decrease in surplus due to spoofing can be considerably mitigated by order book cloaking. As shown in Figure 11b, the vertical distances between the blue diamonds and orange triangles get smaller with K > 0 . Moreover, we find the benefit of this improved robustness to spoofing can outweigh its associated efficiency costs in markets with moderate fundamental shocks (e.g., LSHN and MSMN). In those environments, background traders in mechanisms that cloak one or two price levels achieve higher surplus than those without cloaking. However, in a market with high shocks (e.g., HSLN), hiding or delaying even a little market information degrades learning to such a degree as to render cloaking counter-productive.

6.4. Probing the Cloaking Mechanism to Spoof

To this point, we have only considered spoofers who are unwilling to risk execution of their spoof orders. A more sophisticated manipulator could probe the market, submitting a series of orders at slightly higher prices, in an attempt to reveal the cloaked bids and spoof at a visible price higher than BID t K + 1 1 . In this section, we study the feasibility of such probing to the spoofing agent.
We design and evaluate parameterized versions of the spoofing strategy combined with probing. The strategy is governed by two parameters: the step size δ , which controls probing aggressiveness, and the maximum attempts allowed per time step l, which limits the probing effort.
The spoofer probes by submitting a unit buy order at BID t K + 1 + δ , a price inside the visible quotes, in the hopes of exposing BID t K . If the probe succeeds, it immediately cancels the probe order, and places a new spoof order at BID t K 1 , right behind the lowest hidden bid level. If probing fails because the price is too conservative, the spoofer re-probes by raising the price at a decreasing rate (as a function of δ and the attempt number), until a higher price is revealed or the number of probing attempts reaches l. If probing causes a transaction, the spoofer halves the price increment and re-probes. Algorithm 1 describes the detailed probing procedure.
Algorithm 1 Spoofing with probing in a cloaking market with K hidden price levels ( K > 0 )
  Input: The probing step size δ and the attempt limit l.
           The spoofer’s time to place spoof orders T spoof , and its current holding H.
1:
while t T spoof and H > 0 do
2:
    if no active spoof orders then
3:
         c 1 , Δ δ  ▹ track the number of probing attempts and the price increment
4:
        submit a single-unit probe buy order at price BID t K + 1 + Δ
5:
        while the visible BID t K + 1 remains unchanged and c < l  do
6:
            c c + 1
7:
           if the probe buy order gets transacted then
8:
                Δ Δ / 2
9:
               submit a single-unit probe buy order at price BID t K + 1 + Δ
10:
           else
11:
                Δ Δ + max { 0 . 9 c 1 δ , 1 }
12:
               substitute the probe order with a new one at price BID t K + 1 + Δ
13:
           end if
14:
        end while
15:
        submit spoof orders at price BID t K + 1 1
16:
        cancel the probe order
17:
    else
18:
        if spoof orders become hidden then
19:
           substitute spoof orders with new ones at price BID t K + 1 1
20:
        else if spoof orders are no longer one tick behind BID t K + 1  then
21:
           withdraw spoof orders
22:
        end if
23:
    end if
24:
end while
Table 3 reports, for cloaking-beneficial environments, the minimum l required for step sizes δ { 1 , 2 , 4 , 8 } to achieve higher payoffs than the equilibrium performance we found for the exploiter in Section 6.3. Multiple rows for the same cloaking parameter correspond to the multiple equilibria found in that market setting. Dashes in the table indicate that an exploiter cannot beat the equilibrium performance with the corresponding δ . We find that, to achieve higher payoffs, the spoofer has to probe with multiple attempts per time step, and conservative probing strategy with smaller δ usually requires more effort. In practice, such frequent cancellation and placement of orders may not be feasible and can largely increase the risk of the associated probing and spoofing intent being identified.
Figure 13 further quantifies the change in exploitation payoff and transaction risk (measured as the number of transactions caused by probing), as we vary the probing step δ and the attempt limit l. As shown Figure 13a, relaxing the maximum number of probing attempts steadily increases the transaction risk, but it does not necessarily improve payoff. Moreover, the spikiness we observe in the exploiter’s payoff suggests that the performance is highly sensitive and therefore it would be difficult to find a ( δ , l ) that robustly maximizes profit. Figure 13b further demonstrates that an exploiter can probe aggressively with larger step sizes to reduce effort, but it is usually at the cost of a higher transaction risk and consequently a lower payoff. In highly dynamic markets with frequently updated quotes, finding an appropriate δ to successfully probe a cloaking mechanism within a reasonable number of attempts would be quite challenging.
We have explored other more aggressive probing strategies, where the spoofer probes to expose multiple hidden levels and spoofs at even higher prices. To accomplish that, the spoofer is forced to keep at least one order in the cloaked levels to guarantee that its spoof orders are visible. However, according to our experiments, such aggressive probing strategies fail to beat the equilibrium performance, as orders kept in hidden levels are often accepted by background traders due to adverse selection. Those transactions tend to accumulate the spoofer’s position, and consequently they impose losses at the end of the trading period.

6.5. Discussion

Our cloaking mechanism offers a systematic approach to disincentivizing spoofing. We conduct EGTA to understand agents’ strategic responses to the proposed mechanism and evaluate the effectiveness and robustness of cloaking. Experimental results demonstrate that cloaking the order book can significantly diminish the efficacy of spoofing, but at the loss of useful information for the learning traders. With the goal of balancing this tradeoff to maximize background-trader surplus, we perform empirical mechanism design to choose the optimal cloaking across parametrically distinct environments. We find that, in markets with moderate shocks, the benefit of cloaking in mitigating spoofing can outweigh its efficiency cost, whereas, in markets with large fundamental fluctuations, hiding even a little order book information can largely degrade learning efficiency and render the cloaking mechanism counter-productive. By further exploring sophisticated spoofing strategies that probe to reveal cloaked information, we observe that associated effort and risk generally exceeds the gains and that finding reliably profitable probing regiments is quite difficult. We conclude that the proposed cloaking mechanism cannot be easily circumvented by probing.

7. Learning-Based Trading Strategies under the Presence of Market Manipulation

We next consider how individual traders may construct strategies that are more robust to manipulation. In realistic market scenarios, traders are aware of potential manipulation but unable to reliably detect spoofing behavior in real time. In the absence of manipulation, traders submit orders that reflect their private observations and preferences, and thus learning from others’ actions enables more informed decisions. Indeed, as shown above, learning as implemented by HBL agents is effective in a realistic market model and provides benefits to the learning agent as well as to market efficiency. HBL is vulnerable to spoofing, however, and agents adopting such learning are harmed by spoofing compared to non-learning strategies that are oblivious to spoofers and thus non-manipulable. The question we investigate in this section is whether learning-based strategies can be designed to be similarly robust to spoofing. We seek strategies by which individual traders can learn from market information, but in less vulnerable ways.
We treat the original HBL described in Section 3.3.3 as a baseline strategy and propose two variations that aim to reasonably trade off learning effectiveness in non-manipulated markets for robustness against manipulation. The first variation works by selectively ignoring orders at certain price levels, particularly where spoof orders are likely to be placed. The second variation considers the full order book, but has the flexibility to adjust the offer price by a stochastic offset. The adjustment serves to correct biases in learned price beliefs either caused by manipulation or the intrinsic limitation built in the belief function. We formally define the two variations in Section 7.1, and then evaluate the proposed strategies in terms of the effectiveness in non-manipulated markets and robustness against manipulation in Section 7.2.1.
We adopt the standard CDA market mechanism as described in Section 3.1. The market is populated with 64 background traders and one profitable exploiter. Background traders can choose from a select set of strategies that covers ZI, original HBL and the two proposed variations of HBL. The exploiter follows the three-stage exploitation strategy specified in Section 6.1 and executes spoofing in selected treatments. As in our study of cloaking mechanisms, we consider three representative market settings for our experiments, namely LSHN, MSMN and HSLN.

7.1. Two Variations of HBL

7.1.1. HBL with Selective Price Level Blocking

Our first HBL variation is inspired by the success of our cloaking mechanism. It takes advantage of the common placement of spoof orders closely behind the market best quotes. Instead of including all observed trading activities in its memory to construct the belief function just as the standard HBL, the idea is to neglect limit orders at a specified price level when assembling the dataset D to learn from. We extend standard HBL with a blocking parameter χ , which specifies the index of a single price level to ignore symmetrically from inside of the limit order book. For example, when χ = 1 , the trading agent constructs a dataset, D O χ = 1 , by considering only orders strictly outside the best bid and ask. The goal of this additional strategic parameter is to exclude price levels where spoof orders are likely to appear. However, ignoring orders may come at the cost of less effective learning, especially when information that conveys true insight is blocked from the belief function.

7.1.2. HBL with Price Offsets

Our second HBL variation considers all orders in its memory, but translates the target price P i * ( t ) derived by surplus maximization in Equation (5) with an offset uniformly drawn from [ R min , R max ] . Specifically, a background trader i who arrives the market at time t with the optimized price P i * ( t ) submits a limit order for a single unit of the security at price
p i ( t ) U [ P i * ( t ) R max , P i * ( t ) R min ] if buying , U [ P i * ( t ) + R min , P i * ( t ) + R max ] if selling .
A positive offset can be viewed as a hedge against misleading information, effectively shading the bid to compensate for manipulation risk. A negative offset increases the probability of near-term transaction, which may have benefits in reducing exposure to future spoofing. Offsets (positive or negative) may also serve a useful correction function even when manipulation is absent. In particular, negative offsets may compensate for the myopic nature of HBL optimization Equation (5), which considers only the current bid, ignoring subsequent market arrivals and opportunities to trade additional units. Our design here is in line with prior literature [24,25] that refines the original HBL to become more competitive.

7.2. Empirical Evaluation

7.2.1. Standard HBL

We start with our baseline market environments where background traders are restricted to choose from the standard HBL strategies and five parametrically different ZI strategies in Table 4. Figure 18 (dark grey columns) verifies what is observed in Section 5 within this restrictive set of background-trading strategies: (1) the learning-based trading strategy is more widely preferred in environments where fundamental shock is low and observation noise is high (e.g., LSHN is the most learning-friendly environment); and (2) the presence of spoofing generally hurts the learning-based strategy and reduces background-trader surplus. Detailed equilibrium outcomes can be found in Appendix C.1. We next evaluate the two HBL variations.

7.2.2. HBL with Selective Price Level Blocking

Learning traders who choose to ignore certain orders face a natural tradeoff between losing useful information and correctly blocking spoof orders to avoid manipulation. We first examine, under non-spoofing environments, how learning effectiveness may be compromised by excluding orders at each price level. Starting with the equilibrium strategy profile of each non-spoofing market environment found in Section 7.2.1 (we arbitrarily select one if there are multiple equilibria found in a certain environment), we perform controlled experiments by letting background traders who adopt the standard HBL strategy ignore orders from a selected price level throughout the trading period. Table 5 compares the payoffs obtained by HBL in its standard form and variations that, respectively, block orders at the first, second and third price level in the order book. We find that, consistently across market settings, HBL agents benefit the most by learning from market best bids and asks and can achieve fairly similar performance even when orders at a selected level beyond the market best quotes are ignored.
In response to the HBL variation that ignores price levels, we extend the exploiter to be able to place spoof orders behind a chosen price level, denoted by ψ . For example, when ψ = 2 , the exploiter injects spoof orders at one tick behind the second-best bid. We start with the same set of equilibrium strategy profiles and conduct controlled experiments to evaluate how injecting spoof orders at different levels can change the manipulation effect, even when learning traders are considering the full order book (i.e., adopting standard HBL). We measure the effectiveness of each spoofing strategy by profits from trade as well as the price deviation caused by spoof orders. Experimental results (Table 5) show that the exploiter benefits the most by placing spoof orders behind the best bid (i.e., ψ = 1 ) and moving spoof orders to less competitive levels reduces exploitation profit. We further confirm this weakened manipulation effect in Figure 14, which showcases market price deviations caused by different spoofing strategies in the MSMN environment. We find the price rise diminishes as spoof orders are placed further away from the best bid.
Although our exploration of possible spoofing strategies here is limited, the results suggest that spoof orders near the market quotes tend to maximize manipulation effect. In response, HBL traders who adapt to the presence of spoofing may naturally block orders around such levels. Figure 15 shows that, when blocking the correct level, HBL traders can significantly increase their payoffs and reduce the amount the exploiter could profit via manipulation. This mitigated manipulation effect is further verified by the dashed blue line in Figure 14, which shows price deviations close to zero. Price differences are not strictly zero before spoofing (time 1000), as traders who adopt HBL χ = 2 consistently block orders throughout the trading period.
Given these beneficial payoff deviations, in the final set of experiments, we conduct EGTA to find approximate Nash equilibria in games where background traders may choose trading strategies from the ZI family and HBLs that block a selected price level (any strategy in Table 4 or Table 6). Detailed equilibrium results can be found in Appendix C.2. As shown in Figure 18 (light grey columns), we find that: (1) adding the blocking strategic parameter does not affect the competitiveness of learning-based strategies with respect to ZI (HBL adoption rates in equilibrium remain in similar ranges as those of markets where only the standard HBL strategy is provided); and (2) the extended order blocking ability improves the learning robustness of HBL traders (compared to surplus decreases caused by manipulation in markets where background agents are restricted to the standard HBL, background-trader surpluses are no longer significantly reduced when agents can strategically block orders in the face of manipulation). In other words, background traders who learn from market information but also strategically ignore orders can achieve robustness against manipulation and retain comparable effectiveness in non-manipulated markets.

7.2.3. HBL with Price Offsets

Our second HBL variation relies on a price adjustment rather than information selection to adapt to different market conditions. We start by exploring a set of price offset intervals [ R min , R max ] , ranging from positive values that understate the learned offer prices (e.g., similar to price shading) to negative values that adjust prices to become more competitive. As in Section 7.2.2, we conduct controlled experiments starting from equilibrium profiles found in Section 7.2.1 and then deviating from standard HBL to allow price offsets. Figure 16 shows for the MSMN non-spoofing environment how HBL surplus and number of transactions vary in markets where HBL traders adopt different offset intervals. (HBL with positive offset usually generates much lower payoff. For presentation simplicity, we cropped the surplus decrease at −400 in Figure 16.) We find adjusting learned prices with a range of negative offsets can be generally beneficial in our setting where agents have reentry opportunities. It increases HBL payoff and facilitates transactions, thus improving overall price convergence in markets.
To test the effectiveness of spoofing against the new HBL variation, we further have the SP ψ = 1 spoof in markets where the learning background traders, respectively, adopt the standard HBL, HBL [ 10 , 0 ] , HBL [ 20 , 0 ] , HBL [ 40 , 0 ] and HBL [ 80 , 0 ] . Figure 17 compares market price deviations caused by spoof orders in those markets. We find that, although all markets experience initial price rise as a result of misled pricing beliefs, the spoofing effect tends to wear off faster in markets where HBL traders adopt negative price offsets. This may be because negative offsets promote near-term transaction: as more transactions happen, HBL traders can glean true information from the transaction prices to construct more accurate belief functions, and the SP ψ = 1 places spoof orders at lower prices due to the widened bid-ask spreads. Indeed, we find that markets populated with the standard HBL, HBL [ 10 , 0 ] , HBL [ 20 , 0 ] and HBL [ 40 , 0 ] , respectively, have average spoof-order prices of 99,972, 99,951, 99,945 and 99,950.
Finally, we conduct EGTA in games with and without spoofing to find Nash equilibria where background traders can choose from ZI strategies and HBL variations that adjust learned prices with certain offsets (Table 4 and Table 7). Detailed equilibrium results can be found in Appendix C.3. Equilibrium results (Figure 18 white columns) show that the extended price offsets tend to largely improve HBL’s profitability and background-trader surpluses, in markets both with and without manipulation. Such price adjustments can especially help learning traders to better adapt to high shock environments where prices are less predictable from past observations. However, the extended offsets may not directly address manipulation and improve learning robustness against spoofing.

7.3. Combine Order Blocking and Price Offsets

We observe that HBL with price offsets is overall competitive across different market settings, but its performance still degrades in markets with spoofing (refer to Figure 18, white columns). Since the second HBL variation demonstrates a general improvement in both settings with and without manipulation, we augment this variation with price level blocking to reduce vulnerability to spoofing. Specifically, we extend the background trading strategy set in Table 6 with three strategies: HBL [ 10 , 0 ] K = 2 , HBL [ 20 , 0 ] K = 2 and HBL [ 40 , 0 ] K = 2 , which appear to be competitive in our preliminary explorations. We conduct EGTA in a similar manner across market environments with and without spoofing (detailed results can be found in Appendix C.4). Equilibrium outcomes (Figure 18, striped columns) show that: (1) compared to markets where only the standard and the price-blocking HBL are provided, HBL that combines the two variations is more widely preferred and can help to increase overall background-trader surplus in equilibrium; and (2) across all environments, background-trader surpluses in markets with and without spoofing fall roughly into the same ranges. These suggest that, by combining the two proposed variations, HBL traders can enjoy both improved competitiveness and robustness against manipulation.

8. Conclusions

In this paper, we construct a computational model of spoofing: the tactic of manipulating market prices by targeting the order book. We design an HBL strategy that uses order book information to make pricing decisions. Since HBL traders use the order book, they are potentially vulnerable to spoofing attacks, and we confirm this in simulation analysis. We demonstrate that, in the absence of spoofing, HBL is generally adopted in equilibrium and benefits price discovery and social welfare. Although the presence of spoofing decreases the HBL proportion in background traders, HBL’s persistence in equilibrium indicates a robustly spoofable market. By comparing equilibrium outcomes with and without spoofing, we find that spoofing tends to decrease market surplus. Comparisons across parametrically different environments reveal factors that may influence the adoption of HBL and the impact of spoofing.
We further propose a cloaking mechanism to deter spoofing. The mechanism discloses a partially cloaked order book by symmetrically concealing a deterministic number of price levels from the inside. Our results demonstrate that the proposed cloaking mechanism can significantly diminish the efficacy of spoofing, but at the cost of a reduced HBL proportion and surplus in equilibrium. With the goal of maximizing background trader surplus, we perform empirical game-theoretic analysis across parametrically different mechanisms and environments, and find in markets with moderate shocks, the benefit of cloaking in mitigating spoofing outweighs its efficiency cost. By further exploring sophisticated spoofing strategies that probe to reveal cloaked information, we demonstrate the associated effort and risk exceed the gains, and verified that the proposed cloaking mechanism cannot be circumvented.
Two strategy variations based on the standard HBL strategy are explored. The first variation considers common characteristics of spoofing activities and works by offering agents the flexibility to neglect limit orders at a specified price level when assembling a dataset to learn from. The second variation learns from full order book information and later adjusts the target price derived from surplus maximization with a random offset to correct any biases in the learning process. Our analysis shows that the first HBL variation offers learning traders a way to strategically block orders to improve robustness against spoofing, while achieving similar competitiveness in non-manipulated markets. Our second HBL variation exhibits a general improvement over baseline HBL, in markets both with and without manipulation. Further explorations suggest that traders can enjoy both improved profitability and robustness by combining the two HBL variations.

Author Contributions

Spoofing market model conceptualization, methodology, and game-theoretic analysis, X.W. and M.P.W.; implementation of the spoofing simulator and experiments, X.W.; the cloaking mechanism conceptualization and analysis, X.W., Y.V. and M.P.W.; variations of learning trading strategies conceptualization, implementation, and result analysis, X.W., C.H. and M.P.W.; writing—original draft preparation, X.W.; writing—review and editing, C.H., Y.V. and M.P.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by grant IIS-1421391 and CAREER Award IIS-1905558 from the US National Science Foundation.

Acknowledgments

We thank Uday Rajan and Erik Brinkman for helpful advice and discussions. This work extends and supersedes a series of conference papers: “Spoofing the Limit Order Book: An Agent-Based Model” presented at the 16th International Conference on Autonomous Agents and Multiagent Systems [59], “A Cloaking Mechanism to Mitigate Market Manipulation” presented at the 27th International Joint Conference on Artificial Intelligence [60], and “Learning-Based Trading Strategies in the Face of Market Manipulation” presented at the 1st ACM International Conference on AI in Finance [61].

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Detailed Equilibrium Results for Spoofing the Limit Order Book

Appendix A.1. Summary and Comparison of Markets without and with Spoofing

Table A1. Background-trader surplus and HBL proportion in equilibrium of markets without spoofing. Each row describes one Nash equilibrium found in a game (rounded to the nearest integer). Surpluses marked with asterisks indicate statistically significantly higher surpluses than those achieved in their corresponding markets with spoofing (see Table A3). N = 28 without spoofing.
Table A1. Background-trader surplus and HBL proportion in equilibrium of markets without spoofing. Each row describes one Nash equilibrium found in a game (rounded to the nearest integer). Surpluses marked with asterisks indicate statistically significantly higher surpluses than those achieved in their corresponding markets with spoofing (see Table A3). N = 28 without spoofing.
EnvSurplus95% CIHBL%
LSLN18,198 *[18,127, 18,269]88
LSLN18,246 *[18,177, 18,315]98
LSMN18,189 *[18,116, 18,262]100
LSHN18,265 *[18,200, 18,330]100
MSLN17,947 *[17,851, 18,043]58
MSLN16,693 *[16,613, 16,773]0
MSMN17,923 *[17,829, 18,017]62
MSMN17,927 *[17,839, 18,015]43
MSMN16,726[16,638, 16,814]0
MSHN18,266 *[18,188, 18,344]100
HSLN16,565[16,485, 16,645]0
HSLN17,143 *[17,055, 17,231]0
HSMN16,667[16,565, 16,769]0
HSHN18,253 *[18,179, 18,327]87
Table A2. Similar to Table A1 above. Surpluses marked with asterisks indicate statistically significantly higher surpluses than those achieved in their corresponding markets with spoofing (see Table A4). N = 65 without spoofing.
Table A2. Similar to Table A1 above. Surpluses marked with asterisks indicate statistically significantly higher surpluses than those achieved in their corresponding markets with spoofing (see Table A4). N = 65 without spoofing.
EnvSurplus95% CIHBL%
LSLN43,157 *[43,016, 43,298]71
LSLN43,102 *[42,980, 43,224]73
LSLN43,010 *[42,885, 43,135]95
LSMN43,249 *[43,106, 43,392]83
LSMN43,086 *[42,964, 43,208]79
LSHN42,946[42,817, 43,075]94
MSLN42,804 *[42,647, 42,961]57
MSMN42,807 *[42,652, 42,962]56
MSMN42,745 *[42,610, 42,880]56
MSHN43,265 *[43,128, 43,402]86
HSLN42,455 *[42,316, 42,594]37
HSMN42383 *[42,248, 42,518]37
HSMN42,144 *[41,999, 42,289]32
HSHN42,981[42,867, 43,095]89
Table A3. Background-trader surplus and HBL proportion in equilibrium of markets with spoofing. Each row describes one Nash equilibrium found in a game (rounded to the nearest integer). N = 28 with spoofing.
Table A3. Background-trader surplus and HBL proportion in equilibrium of markets with spoofing. Each row describes one Nash equilibrium found in a game (rounded to the nearest integer). N = 28 with spoofing.
EnvSurplus95% CIHBL%
LSLN18,076[18,000, 18,152]78
LSMN18,040[17,971, 18,109]91
LSHN18,125[18,054, 18,196]87
MSLN16,774[16,707, 16,841]0
MSMN17,883[17,795, 17,971]34
MSMN17,517[17,429, 17,605]24
MSMN16,796[16,708, 16,884]0
MSHN18,108[18,032, 18,184]81
HSLN16,749[16,680, 16,818]0
HSMN16,667[16,565, 16,769]0
HSHN17,999[17,923, 18,075]97
Table A4. Similar to Table A3 above, but with N = 65 with spoofing.
Table A4. Similar to Table A3 above, but with N = 65 with spoofing.
EnvSurplus95% CIHBL%
LSLN42,868[42,741, 42,995]70
LSLN42,993[42,850, 43,136]70
LSMN42,961[42,812, 43,110]80
LSHN43,061[42,943, 43,179]80
LSHN43,103[42,983, 43,223]74
MSLN42,639[42,508, 42,770]41
MSLN42,698[42,549, 42,847]50
MSMN42,624[42,477, 42,771]52
MSHN43,038[42,887, 43,189]75
MSHN43101[42,946, 43,256]76
HSLN41,815[41,664, 41,966]29
HSLN39,502[39,398, 39,606]0
HSMN40,091[39,968, 40,214]0
HSHN43,143[43,012, 43,274]71

Appendix A.2. Markets without Spoofing

Table A5. Equilibria for games without spoofing, N = 28 , calculated from the four-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus, HBL adoption rate and the equilibrium mixture probabilities of strategies included.
Table A5. Equilibria for games without spoofing, N = 28 , calculated from the four-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus, HBL adoption rate and the equilibrium mixture probabilities of strategies included.
EnvSurplusHBL ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7 HBL 1 HBL 2 HBL 3 HBL 4
LSLN18,1980.8800.12000000.88000
LSLN18,2460.9800000.020000.920.060
LSMN18,189100000000.8200.180
LSHN18,265100000001000
MSLN17,9470.580000.400.020000.400.180
MSLN16,6930000000.740.260000
MSMN17,9230.6200000.38000.440.1800
MSMN17,9270.4300.040.5300000.43000
MSMN16,7260000000.800.200000
MSHN18,266100000000.740.2400.02
HSLN16,5650000000.730.270000
HSLN17,1430000.530000.470000
HSMN16,667000000100000
HSHN18,2530.87000.1300000.84000.03
Table A6. Equilibria for games without spoofing, N = 65 , calculated from the five-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus, HBL adoption rate and the equilibrium mixture probabilities of strategies included.
Table A6. Equilibria for games without spoofing, N = 65 , calculated from the five-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus, HBL adoption rate and the equilibrium mixture probabilities of strategies included.
EnvSurplusHBL ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7 HBL 1 HBL 2 HBL 3 HBL 4
LSLN43,1570.7100.29000000.5900.120
LSLN43,1020.73000.2700000.73000
LSLN43,0100.95000.0500000.2200.730
LSMN43,2490.83000.1700000.5700.260
LSMN43,0860.7900.050.16000000.7900
LSHN42,9460.9400.040.0200000.750.1900
MSLN42,8040.57000.4300000.310.2600
MSMN42,8070.56000.4400000.310.2500
MSMN42,7450.560.01000.4300000.5600
MSHN43,2650.8600.0600.080000.670.1900
HSLN42,4550.37000.63000000.180.190
HSMN42,3830.37000.6300000.2600.110
HSMN42,1440.320000.540.1400000.320
HSHN42,9810.8900.080000.0300.89000

Appendix A.3. Markets with Spoofing

Table A7. Equilibria for games with spoofing, N = 28 , calculated from the four-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus, HBL adoption rate and the equilibrium mixture probabilities of strategies included.
Table A7. Equilibria for games with spoofing, N = 28 , calculated from the four-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus, HBL adoption rate and the equilibrium mixture probabilities of strategies included.
EnvSurplusHBL ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7 HBL 1 HBL 2 HBL 3 HBL 4
LSLN18,0760.78000.2200000.78000
LSMN18,0400.910000.090000.91000
LSHN18,1250.87000.1300000.87000
MSLN16,774000000100000
MSMN17,8830.34000.110.5500000.3400
MSMN17,5170.24000.540000.210.24000
MSMN16,796000000100000
MSHN18,1080.81000.120.070000.81000
HSLN16,749000000.040.9600000
HSMN16,667000000100000
HSHN17,9990.970000.030000.7500.220
Table A8. Equilibria for games with spoofing, N = 65 , calculated from the five-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus, HBL adoption rate and the equilibrium mixture probabilities of strategies included.
Table A8. Equilibria for games with spoofing, N = 65 , calculated from the five-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus, HBL adoption rate and the equilibrium mixture probabilities of strategies included.
EnvSurplusHBL ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7 HBL 1 HBL 2 HBL 3 HBL 4
LSLN42,8680.700.2100.0900000.70000
LSLN42,9930.7000.30000000.540.1600
LSMN42,9610.80000.2000000.510.2900
LSHN43,0610.80000.2000000.80000
LSHN43,1030.7400.26000000.74000
MSLN42,6390.410000.5900000.4100
MSLN42,6980.50000.5000000.3200.180
MSMN42,6240.52000.48000000.380.140
MSHN43,0380.7500.25000000.480.2700
MSHN43,1010.7600.24000000.410.3500
HSLN41,8150.29000.50000.21000.2900
HSLN39,502000000010000
HSMN40,0910000000.770.230000
HSHN43,1430.710.1000.1900000.71000

Appendix A.4. Markets with Background Agents Restricted to ZI Strategies

Table A9. Equilibria for games where agents are restricted to ZI strategies, N = 28 , calculated from the four-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus and the equilibrium mixture probabilities of strategies included.
Table A9. Equilibria for games where agents are restricted to ZI strategies, N = 28 , calculated from the four-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus and the equilibrium mixture probabilities of strategies included.
EnvSurplus95% CI ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7
LSLN16,929[16,862, 16,996]000000.980.02
LSMN16,914[16,841, 16,987]000000.890.11
LSHN18,213[18,137, 18,289]0.220.7800000
MSLN16,693[16,613, 16,773]000000.740.26
MSMN17,192[17,106, 17,278]000.420000.58
MSMN16,726[16,638, 16,814]000000.800.20
MSHN16,746[16,675, 16,817]000.090000.91
MSHN17,516[17,438, 17,594]0.3800000.620
HSLN16,565[16,485, 16,645]000000.730.27
HSLN17,143[17,055, 17,231]000.530000.47
HSMN16,667[16,565, 16,769]0000010
HSHN17,861[17,787, 17,935]0.310.390000.300
Table A10. Equilibria for games where agents are restricted to ZI strategies, N = 65 , calculated from the five-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus and the equilibrium mixture probabilities of strategies included.
Table A10. Equilibria for games where agents are restricted to ZI strategies, N = 65 , calculated from the five-player DPR approximation. Each row of the table describes one equilibrium found with its corresponding surplus and the equilibrium mixture probabilities of strategies included.
EnvSurplus95% CI ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7
LSLN42,938[42,840, 43,036]0100000
LSLN40,779[40,677, 40,881]0000010
LSMN42,972[42,870, 43,074]00.9700000.03
LSMN40,557[40,439, 40,675]000000.830.17
LSHN43,327[43,192, 43,462]0.440.5600000
LSHN43,173[43,063, 43,283]0.110.8900000
MSLN40,444[40,342, 40,546]0000010
MSMN39,622[39,518, 39,726]0000010
MSHN43,140[43,017, 43,263]00.730.270000
HSLN40,523[40,398, 40,648]000.280000.72
HSLN40,038[39,903, 40,173]000000.600.40
HSMN40,458[40,327, 40,589]0000.0800.730.19
HSHN43,197[43,087, 43,307]00.8800.12000

Appendix B. Detailed Equilibrium Results for a Cloaking Mechanism to Mitigate Spoofing

Table A11. Background trading strategies included in EGTA for cloaking mechanisms.
Table A11. Background trading strategies included in EGTA for cloaking mechanisms.
Strategy ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7 ZI 8 ZI 9 HBL 1 HBL 2 HBL 3 HBL 4
L---------2358
R min 000000250250250250250250250
R max 100010001000200020002000500500500500500500500
η 0.40.810.40.810.40.811111

Appendix B.1. Cloaking Markets without Spoofing

Table A12. Equilibria for games where the exploiter does not spoof. Each row of the table describes one equilibrium found with its corresponding background surplus, total surplus and HBL adoption rate. The results reported are based on at least 20,000 simulation runs.
Table A12. Equilibria for games where the exploiter does not spoof. Each row of the table describes one equilibrium found with its corresponding background surplus, total surplus and HBL adoption rate. The results reported are based on at least 20,000 simulation runs.
EnvK95% CI Background Surplus95% CI Total SurplusHBL Fraction
LSHNK0[42,121, 42,329][42,548, 42,694]1.00
LSHNK1[41,848, 42,048][42,254, 42,396]0.98
LSHNK1[41,769, 41,977][42,264, 42,406]0.92
LSHNK2[41,788, 42,000][42,205, 42,347]0.997
LSHNK4[41,572, 41,772][42,046, 42,188]0.89
MSMNK0[41,958, 42,220][42,274, 42,388]0.67
MSMNK1[41,902, 42,164][42,210, 42,324]0.67
MSMNK1[41,849, 42,107][42,170, 42,284]0.60
MSMNK1[41,801, 42,067][42,167, 42,281]0.68
MSMNK2[41,742, 42,000][42,123, 42,237]0.66
MSMNK4[41,693, 41,924][42,116, 42,230]0.47
MSMNK4[38,809, 39,025][39,367, 39,485]0.012
HSLNK0[41,529, 41,871][41,974, 42,088]0.59
HSLNK0[41,698, 42,040][42,102, 42,216]0.67
HSLNK0[41,625, 41,973][42,021, 42,135]0.67
HSLNK1[41,417, 41,769][41,869, 41,983]0.66
HSLNK2[41,377, 41,655][41,776, 41,890]0.38
HSLNK2[39,728, 39,972][40,484, 40,594]0
HSLNK2[38,691, 38,965][39,419, 39,537]0
HSLNK4[39,557, 39,803][40,256, 40,374]0
HSLNK4[39,558, 39,804][40,290, 40,408]0
Table A13. Detailed equilibria for games where the exploiter does not spoof. Each row of the table describes one equilibrium found with its corresponding mixture of background strategies.
Table A13. Detailed equilibria for games where the exploiter does not spoof. Each row of the table describes one equilibrium found with its corresponding mixture of background strategies.
EnvK ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7 ZI 8 ZI 9 HBL 1 HBL 2 HBL 3 HBL 4
LSHNK00000000000.70000.30
LSHNK1000.020000000.73000.25
LSHNK10.0500.0300000000.8800.04
LSHNK20000000.0030000.85600.141
LSHNK4000.110000000.290.6000
MSMNK0000.330000000.510.1600
MSMNK10.110.010.2100000000.140.530
MSMNK100.200.200000000.200.150.250
MSMNK1000.320000000.140.390.030.12
MSMNK200.1500.19000000.110.400.150
MSMNK40.2000.330000000.4000.070
MSMNK40000000.6740.3120.002000.0120
HSLNK0000.120000.29000.490.1000
HSLNK00000.33000000.66000.01
HSLNK00000.190.14000000.500.170
HSLNK10.05000.290000000.090.570
HSLNK20.270.3500000000.0800.300
HSLNK20.030.290.13000000.550000
HSLNK20000000.250.340.410000
HSLNK400.3500000.65000000
HSLNK400.3600000.64000000

Appendix B.2. Cloaking Markets with Spoofing

Table A14. Equilibria for games where the exploiter strategically chooses to spoof. Each row of the table describes one equilibrium found with its corresponding background surplus, total surplus, HBL and spoofing adoption rate. The results reported are based on at least 20,000 simulation runs.
Table A14. Equilibria for games where the exploiter strategically chooses to spoof. Each row of the table describes one equilibrium found with its corresponding background surplus, total surplus, HBL and spoofing adoption rate. The results reported are based on at least 20,000 simulation runs.
EnvK95% CI Background Surplus95% CI Total SurplusHBL FractionSpoofing Fraction
LSHNK0[41,693, 41,893][42,243, 42,389]0.951.00
LSHNK1[41,848, 42,048][42,254, 423,96]0.980.00
LSHNK2[41,788, 42,000][42,205, 42,347]0.9970.00
LSHNK4[41,564, 41,764][42,010, 42,152]0.900.08
LSHNK4[41,572, 41,772][42,046, 42,188]0.890.00
MSMNK0[41,652, 41,902][42,151, 42,265]0.651.00
MSMNK0[41,622, 41,884][42,106, 42,220]0.661.00
MSMNK1[41,902, 42,164][42,210, 42,324]0.670.00
MSMNK1[41,849, 42,107][42,170, 42,284]0.600.00
MSMNK1[41,801, 42,067][42,167, 42,281]0.680.00
MSMNK1[41,749, 42,031][42,146, 42,260]0.720.71
MSMNK2[41,700, 41,946][42,109, 42,223]0.540.90
MSMNK4[41,655, 41,883][42,111, 42,225]0.480.62
MSMNK4[38,809, 39,025][39,367, 39,485]0.0120.00
HSLNK0[41,538, 41,882][42,047, 42,161]0.691.00
HSLNK1[41,417, 41,769][41,869, 41,983]0.660.00
HSLNK1[41,039, 41,345][41,593, 41,707]0.481.00
HSLNK2[41,080, 41,342][41,719, 41,833]0.281.00
HSLNK4[39,557, 39,803][40,256, 40,374]00.00
HSLNK4[39,558, 39,804][40,290, 40,408]00.00
Table A15. Detailed Equilibria for games where the exploiter strategically chooses to spoof. Each row of the table describes one equilibrium found with its corresponding mixture of background strategies.
Table A15. Detailed Equilibria for games where the exploiter strategically chooses to spoof. Each row of the table describes one equilibrium found with its corresponding mixture of background strategies.
EnvK ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7 ZI 8 ZI 9 HBL 1 HBL 2 HBL 3 HBL 4
LSHNK00000.05000000.95000
LSHNK1000.020000000.73000.25
LSHNK20000000.0030000.85600.141
LSHNK4000.100000000.380.5200
LSHNK4000.110000000.290.6000
MSMNK000.1900.16000000.65000
MSMNK000.2000000.14000.610.0500
MSMNK10.110.010.2100000000.140.530
MSMNK100.200.200000000.200.150.250
MSMNK1000.320000000.140.390.030.12
MSMNK10.280000000000.510.210
MSMNK2000.460000000.3500.190
MSMNK400.5200000000.46000.02
MSMNK40000000.6740.3120.002000.0120
HSLNK00000.31000000.69000
HSLNK10.05000.290000000.090.570
HSLNK10000.33000.19000.080.4000
HSLNK200.720000000000.280
HSLNK400.3500000.65000000
HSLNK400.3600000.64000000

Appendix C. Detailed Equilibrium Results for Learning-Based Trading Strategies under the Presence of Market Manipulation

Table A16. Background trading strategies used in EGTA for HBL variations. HBL n L in tables below means HBL n with memory length of L.
Table A16. Background trading strategies used in EGTA for HBL variations. HBL n L in tables below means HBL n with memory length of L.
Strategy ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 HBL 1 HBL 2 HBL 3 HBL 4 HBL 5 HBL 6 HBL 7 HBL 8 HBL 9 HBL 10
χ NANANANANANA12NANANANA222
R min 00000000−10−20−40−80−10−20−40
R max 1000100010005002500000000000
η 0.40.810.80.81111111111

Appendix C.1. Standard HBL

Table A17. Equilibria for games where the learning-based trading strategy set is restricted to standard HBL. Each row describes an equilibrium found for the game described by the Env column, detailing the adoption rate of each strategy considered and the corresponding background surplus. The equilibrium strategy profiles with checkmarks in the “Baseline” column indicates those used as baseline strategy profiles for controlled experiments.
Table A17. Equilibria for games where the learning-based trading strategy set is restricted to standard HBL. Each row describes an equilibrium found for the game described by the Env column, detailing the adoption rate of each strategy considered and the corresponding background surplus. The equilibrium strategy profiles with checkmarks in the “Baseline” column indicates those used as baseline strategy profiles for controlled experiments.
EnvBaseline ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 HBL 1 2 HBL 1 5 95% CI Background Surplus
LSHN0000001.00[42,050, 42,142]
000001.000[41,609, 41,703]
LSHN—Spoof0000001.00[41,641, 41,733]
000001.000[41,300, 41,393]
MSMN0.01000000.99[41,820, 41,978]
00000.250.750[41,779, 41,965]
000.27000.730[41,693, 41,866]
MSMN—Spoof000.37000.630[41,493, 41,669]
0.2200000.780[41,702, 41,876]
00.270000.730[41,642, 41,814]
HSLN0.23000000.77[41,659, 41,907]
0.3400000.660[41,568, 41,816]
0000.43000.57[41,339, 41,599]
000.620000.38[41,071, 41,281]
00.500000.500[41,218, 41,452]
00.4400000.56[41,304, 41,546]
HSLN—Spoof0.31000000.69[41,427, 41,670]
000.700000.30[40,944, 41,127]
00.590000.410[41,120, 41,335]
0.3900000.610[41,420, 41,665]
000.68000.320[41,014, 41,208]

Appendix C.2. HBL with Price Level Blocking

Table A18. Equilibria for games where the learning-based trading strategy set is comprised of standard HBL and HBL with price level blocking. Each row describes an equilibrium found for the game described by the Env column, detailing the adoption rate of each strategy considered and the corresponding background surplus.
Table A18. Equilibria for games where the learning-based trading strategy set is comprised of standard HBL and HBL with price level blocking. Each row describes an equilibrium found for the game described by the Env column, detailing the adoption rate of each strategy considered and the corresponding background surplus.
Env ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 HBL 1 2 HBL 1 5 HBL 3 2 HBL 3 5 95% CI Background Surplus
LSHN000001.00000[41,609, 41,703]
0000001.0000[42,050, 42,142]
00000001.000[41,690, 41,784]
LSHN—Spoof000001.00000[41,300, 41,393]
0000001.0000[41,641, 41,733]
00000001.000[41,690, 41,784]
000000001.00[42,093, 42,139]
MSMN0.01000000.9900[41,820, 41,978]
00000.250.75000[41,779, 41,965]
000.27000.73000[41,693, 41,866]
0.240000000.760[41,651, 41,743]
00.170000000.83[41,801, 41,890]
MSMN—Spoof000.37000.63000[41,493, 41,669]
0.2200000.78000[41,702, 41,876]
000000001.00[41,841, 41,920]
0.25000000.7500[41,808, 41,988]
00.28000000.720[41,764, 41,853]
HSLN0.23000000.7700[41,659, 41,907]
0.3400000.66000[41,568, 41,816]
0000.43000.5700[41,339, 41,599]
000.620000.3800[41,071, 41,281]
0.360000000.640[41,608, 41,734]
000.62000000.38[41,087, 41,194]
000.6100000.390[41,122, 41,231]
HSLN—Spoof0.31000000.6900[41,427, 41,670]
0.3900000.61000[41,420, 41,665]
00.49000000.510[41,285, 41,405]
0.340000000.660[41,632, 41,759]
000.6200000.380[41,123, 41,230]
0.2800000000.72[41,720, 41,848]

Appendix C.3. HBL with Price Offsets

Table A19. Equilibria for games where the learning-based trading strategy set is comprised of standard HBL and HBL with price offsets. Each row describes an equilibrium found for the game described by the Env column, detailing the adoption rate of each strategy considered and the corresponding background surplus.
Table A19. Equilibria for games where the learning-based trading strategy set is comprised of standard HBL and HBL with price offsets. Each row describes an equilibrium found for the game described by the Env column, detailing the adoption rate of each strategy considered and the corresponding background surplus.
Env ZI 1 ZI 2 ZI 3 ZI 4 HBL 4 2 HBL 5 2 HBL 6 2 HBL 4 5 HBL 5 5 HBL 6 5 95% CI Background Surplus
LSHN000000001.000[41,518, 42,562]
00000001.0000[41,512, 42,556]
0000001.00000[42,420, 42,507]
000001.000000[42,551, 42,640]
00001.0000000[42,551, 42,639]
LSHN—Spoof00000001.0000[42,430, 42,474]
0000001.00000[42,406, 42,492]
000001.000000[42,527, 42,614]
00001.0000000[42,516, 42,603]
MSMN0000001.00000[42,085, 42,229]
0.0300000.970000[42,227, 42,383]
00001.0000000[42,219, 42,366]
000.210000000.79[41,702, 41,787]
0.1000000000.900[42,058, 42,142]
MSMN—Spoof0000.08000000.92[41,912, 41,991]
0000001.00000[42,054, 42,197]
00.160000.840000[41,951, 42,119]
00.130000.870000[42,021, 42,185]
HSLN0.1200000.880000[42,140, 42,255]
HSLN—Spoof0.16000000000.84[41,782, 41,893]
00.370000000.630[41,457, 41,578]

Appendix C.4. HBL Price Offsets and Price Level Blocking

Table A20. Equilibria for games where the learning-based trading strategy set is comprised of standard HBL, HBL with price level blocking, HBL with price offsets and HBL with both price offsets and price level blocking ( HBL 1 and HBL 2 are not shown because they do not appear in any equilibrium). Each row describes an equilibrium found for the game described by the Env column, detailing the adoption rate of each strategy considered and the corresponding background surplus.
Table A20. Equilibria for games where the learning-based trading strategy set is comprised of standard HBL, HBL with price level blocking, HBL with price offsets and HBL with both price offsets and price level blocking ( HBL 1 and HBL 2 are not shown because they do not appear in any equilibrium). Each row describes an equilibrium found for the game described by the Env column, detailing the adoption rate of each strategy considered and the corresponding background surplus.
Env ZI 1 ZI 2 ZI 3 HBL 3 2 HBL 4 2 HBL 5 2 HBL 6 2 HBL 8 2 HBL 9 2 HBL 10 2 HBL 4 5 HBL 5 5 HBL 6 5 HBL 8 5 HBL 9 5 HBL 10 5 95% CI
LSHN000000000000001.000[42,520, 42,565]
00000000000001.0000[42,511, 42,556]
000000000001.000000[41,518, 42,562]
00000000001.0000000[41,512, 42,556]
0000000001.00000000[42,423, 42,509]
000000001.000000000[42,550, 42,638]
00000001.0000000000[42,555, 42,642]
0000001.00000000000[42,420, 42,507]
000001.000000000000[42,551, 42,640]
00001.0000000000000[42,551, 42,639]
LSHN—Spoof00000000000001.0000[42,511, 42,556]
0000000001.00000000[42,422, 42,509]
000000001.000000000[42,551, 42,639]
00000001.0000000000[42,554, 42,641]
0000001.00000000000[42,406, 42,492]
000001.000000000000[42,527, 42,614]
00001.0000000000000[42,516, 42,603]
MSMN0.2200000000000000.780[41,877, 41,967]
0.1100000000.890000000[42,123, 42,291]
000.200000000.80000000[41,755, 41,921]
0000001.00000000000[42,085, 42,229]
0.0300000.970000000000[42,227, 42,383]
00001.0000000000000[42,219, 42,366]
MSMN—Spoof0000000000000001.00[42,060, 42,133]
000000001.000000000[42,246, 42,395]
00.13000.8700000000000[42,021, 42,185]
0.25000.75000000000000[41,808, 41,988]
HSLN0.2300000000.770000000[41,845, 42,085]
0.24000000000000000.76[41,705, 41,824]
HSLN—Spoof00.370000000000.630000[41,457, 41,578]
0.290000000.7100000000[41,754, 41,997]
00.320000000.680000000[41,639, 41,877]

References

  1. Lin, T.C.W. The new market manipulation. Emory Law J. 2015, 66, 1253–1314. [Google Scholar]
  2. Kirilenko, A.A.; Kyle, A.S.; Samadi, M.; Tuzun, T. The Flash Crash: High frequency trading in an electronic market. J. Financ. 2017, 72, 967–998. [Google Scholar] [CrossRef] [Green Version]
  3. Aldrich, E.M.; Grundfest, J.; Laughlin, G. The Flash Crash: A New Deconstruction. 2017. Available online: http://dx.doi.org/10.2139/ssrn.2721922 (accessed on 10 May 2017).
  4. Hope, B. How ‘Spoofing’ Traders Dupe Markets. Wall Str. J. 2015. Available online: https://www.google.com.hk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwib2uakquHwAhXDBKYKHfjXAvAQFjACegQIAxAD&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fhow-spoofing-traders-dupe-markets-1424662202&usg=AOvVaw0E29hp4F8GCnGgut00lkzm (accessed on 22 February 2015).
  5. Montgomery, J.D. Spoofing, Market Manipulation, and the Limit-Order Book. 2016. Available online: http://dx.doi.org/10.2139/ssrn.2780579 (accessed on 3 May 2016).
  6. Friedman, D. The double auction market institution: A survey. In The Double Auction Market: Institutions, Theories, and Evidence; Addison-Wesley: Boston, MA, USA, 1993; pp. 3–25. [Google Scholar]
  7. Wellman, M.P. Putting the agent in agent-based modeling. Auton. Agents Multi Agent Syst. 2016, 30, 1175–1189. [Google Scholar] [CrossRef]
  8. Lebaron, B. Agent-based computational finance. In Handbook of Computational Economics, 1st ed.; Tesfatsion, L., Judd, K.L., Eds.; Elsevier: Amsterdam, The Netherlands, 2006; Volume 2. [Google Scholar]
  9. Paddrik, M.; Hayes, R.; Todd, A.; Yang, S.; Beling, P.; Scherer, W. An agent based model of the E-Mini S&P 500 applied to Flash Crash analysis. In Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering and Economics, New York, NY, USA, 29–30 March 2012; pp. 1–8. [Google Scholar]
  10. LeBaron, B.; Arthur, W.B.; Palmer, R. Time series properties of an artificial stock market. J. Econ. Dyn. Control 1999, 23, 1487–1516. [Google Scholar] [CrossRef] [Green Version]
  11. Palit, I.; Phelps, S.; Ng, W.L. Can a zero-intelligence plus model explain the stylized facts of financial time series data? In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, Valencia, Spain, 4–8 June 2012; pp. 653–660. [Google Scholar]
  12. Wah, E.; Wright, M.; Wellman, M.P. Welfare effects of market making in continuous double auctions. J. Artif. Intell. Res. 2017, 59, 613–650. [Google Scholar] [CrossRef]
  13. Wah, E.; Wellman, M.P. Latency arbitrage in fragmented markets: A strategic agent-based analysis. Algorithmic Financ. 2016, 5, 69–93. [Google Scholar] [CrossRef] [Green Version]
  14. Bookstaber, R. Using Agent-Based Models for Analyzing Threats to Financial Stability; Working paper; Office of Financial Research: Washington, DC, USA, 2012. [Google Scholar]
  15. Wellman, M.P. Trading Agents; Morgan & Claypool: San Rafael, CA, USA, 2011. [Google Scholar]
  16. Gode, D.K.; Sunder, S. Allocative efficiency of markets with zero-intelligence traders: Market as a partial substitute for individual rationality. J. Political Econ. 1993, 101, 119–137. [Google Scholar] [CrossRef]
  17. Farmer, J.D.; Patelli, P.; Zovko, I.I. The predictive power of zero intelligence in financial markets. Proc. Natl. Acad. Sci. USA 2005, 102, 2254–2259. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  18. Cliff, D. Minimal-Intelligence Agents for Bargaining Behaviors in Market-Based Environments; Technical report; Hewlett-Packard Labs: Palo Alto, CA, USA, 1997. [Google Scholar]
  19. Cliff, D. ZIP60: Further explorations in the evolutionary design of trader agents and online auction-market mechanisms. IEEE Trans. Evol. Comput. 2009, 13, 3–18. [Google Scholar] [CrossRef]
  20. Vytelingum, P.; Cliff, D.; Jennings, N.R. Strategic bidding in continuous double auctions. Artif. Intell. 2008, 172, 1700–1729. [Google Scholar] [CrossRef] [Green Version]
  21. Wright, M.; Wellman, M.P. Evaluating the stability of non-adaptive trading in continuous double auctions. In Proceedings of the 17th International Conference on Autonomous Agents and Multi-Agent Systems, Stockholm, Sweden, 10–15 July 2018; pp. 614–622. [Google Scholar]
  22. Gjerstad, S.; Dickhaut, J. Price formation in double auctions. Games Econ. Behav. 1998, 22, 1–29. [Google Scholar] [CrossRef] [Green Version]
  23. Gjerstad, S. The competitive market paradox. J. Econ. Dyn. Control 2007, 31, 1753–1780. [Google Scholar] [CrossRef]
  24. Tesauro, G.; Das, R. High-performance bidding agents for the continuous double auction. In Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, FL, USA, 14–17 October 2001; pp. 206–209. [Google Scholar]
  25. Tesauro, G.; Bredin, J.L. Strategic sequential bidding in auctions using dynamic programming. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 2, Bologna, Italy, 15–19 July 2002; pp. 591–598. [Google Scholar]
  26. Lee, E.J.; Eom, K.S.; Park, K.S. Microstructure-based manipulation: Strategic behavior and performance of spoofing traders. J. Financ. Mark. 2013, 16, 227–252. [Google Scholar] [CrossRef]
  27. Wang, Y.Y. Strategic spoofing order trading by different types of investors in Taiwan Index futures market. J. Financ. Stud. 2019, 27, 65. [Google Scholar]
  28. Martínez-Miranda, E.; McBurney, P.; Howard, M. Learning unfair trading: A market manipulation analysis from the reinforcement learning perspective. In Proceedings of the IEEE International Conference on Evolving and Adaptive Intelligent Systems, Natal, Brazil, 23–25 May 2016; pp. 103–109. [Google Scholar]
  29. Tao, X.; Day, A.; Ling, L.; Drapeau, S. On detecting spoofing strategies in high frequency trading. arXiv 2020, arXiv:2009.14818. [Google Scholar]
  30. Athalye, A.; Carlini, N.; Wagner, D. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In Proceedings of the 35th International Conference on Machine Learning, Stockholm, Sweden, 10–15 July 2018; pp. 274–283. [Google Scholar]
  31. Goodfellow, I.; Shlens, J.; Szegedy, C. Explaining and harnessing adversarial examples. In Proceedings of the International Conference on Learning Representations, San Diego, CA, USA, 7–9 May 2015. [Google Scholar]
  32. Szegedy, C.; Zaremba, W.; Sutskever, I.; Bruna, J.; Erhan, D.; Goodfellow, I.; Fergus, R. Intriguing properties of neural networks. In Proceedings of the International Conference on Learning Representations, Banff, AB, Canada, 14–16 April 2014. [Google Scholar]
  33. Vorobeychik, Y.; Kantarcioglu, M. Adversarial Machine Learning; Morgan & Claypool: San Rafael, CA, USA, 2018. [Google Scholar]
  34. Li, J.; Wang, X.; Lin, Y.; Sinha, A.; Wellman, M.P. Generating realistic stock market order streams. In Proceedings of the 34th AAAI Conference on Artificial Intelligence, New York, NY, USA, 7–12 February 2020; pp. 727–734. [Google Scholar]
  35. Dalvi, N.; Domingos, P.; Mausam; Sanghai, S.; Verma, D. Adversarial classification. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 22–25 August 2004; pp. 99–108. [Google Scholar]
  36. Lowd, D.; Meek, C. Adversarial learning. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, USA, 21–24 August 2005. [Google Scholar]
  37. Carlini, N.; Wagner, D.A. Towards evaluating the robustness of neural networks. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 39–57. [Google Scholar]
  38. Papernot, N.; McDaniel, P.; Jha, S.; Fredrikson, M.; Celik, Z.B.; Swami, A. The limitations of deep learning in adversarial settings. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P), Saarbruecken, Germany, 21–24 March 2016; pp. 372–387. [Google Scholar]
  39. Alzantot, M.; Sharma, Y.; Elgohary, A.; Ho, B.J.; Srivastava, M.; Chang, K.W. Generating natural language adversarial examples. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, 31 October–4 November 2018; pp. 2890–2896. [Google Scholar]
  40. Carlini, N.; Mishra, P.; Vaidya, T.; Zhang, Y.; Sherr, M.; Shields, C.; Wagner, D.; Zhou, W. Hidden voice commands. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016. [Google Scholar]
  41. Grosse, K.; Papernot, N.; Manoharan, P.; Backes, M.; McDaniel, P.D. Adversarial examples for malware detection. In European Symposium on Research in Computer Security; Foley, S.N., Gollmann, D., Snekkenes, E., Eds.; Springer International Publishing: New York City, NY, USA, 2017; pp. 62–79. [Google Scholar]
  42. Tong, L.; Li, B.; Hajaj, C.; Xiao, C.; Zhang, N.; Vorobeychik, Y. Improving robustness of ML classifiers against realizable evasion attacks using conserved features. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA, 14–16 August 2019; pp. 285–302. [Google Scholar]
  43. Boloor, A.; He, X.; Gill, C.; Vorobeychik, Y.; Zhang, X. Simple physical adversarial examples against end-to-end autonomous driving models. In Proceedings of the IEEE International Conference on Embedded Software and Systems, Las Vegas, NV, USA, 2–3 June 2019. [Google Scholar]
  44. Eykholt, K.; Evtimov, I.; Fernandes, E.; Li, B.; Rahmati, A.; Xiao, C.; Prakash, A.; Kohno, T.; Song, D.X. Robust physical-world attacks on deep learning visual classification. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–23 June 2018; pp. 1625–1634. [Google Scholar]
  45. Sharif, M.; Bhagavatula, S.; Bauer, L.; Reiter, M.K. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 1528–1540. [Google Scholar]
  46. Wu, T.; Tong, L.; Vorobeychik, Y. Defending against physically realizable attacks on image classification. In Proceedings of the International Conference on Learning Representation, Virtual Conference, 26 April–1 May 2020. [Google Scholar]
  47. Tong, L.; Yu, S.; Alfeld, S.; Vorobeychik, Y. Adversarial regression with multiple learners. In Proceedings of the 35th International Conference on Machine Learning, Stockholm, Sweden, 10–15 July 2018; pp. 4946–4954. [Google Scholar]
  48. Madry, A.; Makelov, A.; Schmidt, L.; Tsipras, D.; Vladu, A. Towards deep learning models resistant to adversarial attacks. In Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada, 30 Apirl–3 May 2018. [Google Scholar]
  49. Wong, E.; Kolter, J.Z. Provable defenses against adversarial examples via the convex outer adversarial polytope. In Proceedings of the International Conference on Machine Learning, Stockholm, Sweden, 10–15 July 2018. [Google Scholar]
  50. Goettler, R.L.; Parlour, C.A.; Rajan, U. Informed traders and limit order markets. J. Financ. Econ. 2009, 93, 67–87. [Google Scholar] [CrossRef]
  51. Chakraborty, T.; Kearns, M. Market making and mean reversion. In Proceedings of the 12th ACM Conference on Electronic Commerce, San Jose, CA, USA, 5–9 June 2011; pp. 307–314. [Google Scholar]
  52. Wiedenbeck, B.; Wellman, M.P. Scaling simulation-based game analysis through deviation-preserving reduction. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, Valencia Spain, 4–8 June 2012; pp. 931–938. [Google Scholar]
  53. Hautsch, N.; Huang, R. Limit order flow, market impact, and optimal order sizes: Evidence from NASDAQ TotalView-ITCH data. In Market Microstructure: Confronting Many Viewpoints; Abergel, F., Bouchaud, J.P., Foucault, T., Lehalle, C.A., Rosenbaum, M., Eds.; Wiley: Hoboken, NJ, USA, 2012. [Google Scholar]
  54. Wang, X.; Wellman, M.P. Market manipulation: An adversarial learning framework for detection and evasion. In Proceedings of the 29th International Joint Conference on Artificial Intelligence, Virtual Conference, 7–15 January 2020; pp. 4626–4632. [Google Scholar]
  55. Prewit, M. High-frequency trading: Should regulators do more. Mich. Telecommun. Technol. Law Rev. 2012, 19, 131–161. [Google Scholar]
  56. Biais, B.; Woolley, P. High Frequency Trading; Technical report; Toulouse University: Toulouse, France, 2012. [Google Scholar]
  57. Leal, S.J.; Napoletano, M. Market stability vs. market resilience: Regulatory policies experiments in an agent-based model with low- and high-frequency trading. J. Econ. Behav. Organ. 2019, 157, 15–41. [Google Scholar] [CrossRef] [Green Version]
  58. Vorobeychik, Y.; Kiekintveld, C.; Wellman, M.P. Empirical mechanism design: Methods, with application to a supply-chain scenario. In Proceedings of the 7th ACM Conference on Electronic Commerce, Ann Arbor, MI, USA, 11–15 June 2006; pp. 306–315. [Google Scholar]
  59. Wang, X.; Wellman, M.P. Spoofing the limit order book: An agent-based model. In Proceedings of the 16th International Conference on Autonomous Agents and Multi-Agent Systems, Sao Paulo, Brazil, 8–12 May 2017; pp. 651–659. [Google Scholar]
  60. Wang, X.; Vorobeychik, Y.; Wellman, M.P. A cloaking mechanism to mitigate market manipulation. In Proceedings of the 27th International Joint Conference on Artificial Intelligence, Stockholm, Sweden, 10–15 July 2018; pp. 541–547. [Google Scholar]
  61. Wang, X.; Hoang, C.; Wellman, M.P. Learning-based trading strategies in the face of market manipulation. In Proceedings of the 1st ACM International Conference on AI in Finance, Virtual Conference, 15–16 October 2020. [Google Scholar]
Figure 1. Example of alleged spoofing. Source: UK Financial Conduct Authority Final Notice 2013. A series of large out-of-the money manipulation sell orders (red triangles) are first placed to drive the price down and make the buy order accepted (the filled blue triangle). These sell orders are immediately replaced with large buy ones (blue triangles) to push the price up and profit from the sale at a higher price (the filled red triangle).
Figure 1. Example of alleged spoofing. Source: UK Financial Conduct Authority Final Notice 2013. A series of large out-of-the money manipulation sell orders (red triangles) are first placed to drive the price down and make the buy order accepted (the filled blue triangle). These sell orders are immediately replaced with large buy ones (blue triangles) to push the price up and profit from the sale at a higher price (the filled red triangle).
Games 12 00046 g001
Figure 2. An agent-based model of spoofing a CDA market with a single security traded.
Figure 2. An agent-based model of spoofing a CDA market with a single security traded.
Games 12 00046 g002
Figure 3. HBL adoption rates at equilibria in games with and without spoofing. Each blue (orange) marker specifies the HBL proportion at one equilibrium found in a specific game environment without (with) spoofing.
Figure 3. HBL adoption rates at equilibria in games with and without spoofing. Each blue (orange) marker specifies the HBL proportion at one equilibrium found in a specific game environment without (with) spoofing.
Games 12 00046 g003
Figure 4. Comparisons of background-trader surplus for equilibria in each environment, with and without the HBL strategies available to background traders. Blue circles represent equilibrium outcomes when agents can choose both HBL and ZI strategies; orange triangles represent equilibrium outcomes when agents are restricted to ZI strategies. Overlapped markers are outcomes from the same equilibrium mixture, despite the availability of HBL. The market generally achieves higher surplus when HBL is available.
Figure 4. Comparisons of background-trader surplus for equilibria in each environment, with and without the HBL strategies available to background traders. Blue circles represent equilibrium outcomes when agents can choose both HBL and ZI strategies; orange triangles represent equilibrium outcomes when agents are restricted to ZI strategies. Overlapped markers are outcomes from the same equilibrium mixture, despite the availability of HBL. The market generally achieves higher surplus when HBL is available.
Games 12 00046 g004
Figure 5. Comparisons of price discovery for equilibrium in each environment, with and without the HBL strategies available to background traders. Blue circles represent equilibrium outcomes when agents can choose both HBL and ZI strategies; orange triangles represent equilibrium outcomes when agents are restricted to ZI strategies. Overlapped markers are outcomes where the equilibrium mixture is ZI only, despite the availability of HBL. The market generally achieves better price discovery when HBL is available.
Figure 5. Comparisons of price discovery for equilibrium in each environment, with and without the HBL strategies available to background traders. Blue circles represent equilibrium outcomes when agents can choose both HBL and ZI strategies; orange triangles represent equilibrium outcomes when agents are restricted to ZI strategies. Overlapped markers are outcomes where the equilibrium mixture is ZI only, despite the availability of HBL. The market generally achieves better price discovery when HBL is available.
Games 12 00046 g005
Figure 6. Transaction price differences throughout the trading horizon with and without a spoofer against each HBL-and-ZI equilibrium found in non-spoofing games (Section 5.2). Multiple curves for the same market environment represent different equilibria. The designed spoofing tactic clearly raises market prices when HBL are present. The effect attenuates over time, generally more quickly in the thicker market environments.
Figure 6. Transaction price differences throughout the trading horizon with and without a spoofer against each HBL-and-ZI equilibrium found in non-spoofing games (Section 5.2). Multiple curves for the same market environment represent different equilibria. The designed spoofing tactic clearly raises market prices when HBL are present. The effect attenuates over time, generally more quickly in the thicker market environments.
Games 12 00046 g006
Figure 7. Exploitation profits with and without spoofing against each HBL-and-ZI equilibrium found in Section 5.2. Repetitions of the same market environment represent outcomes of multiple equilibria. Exploitation profits are consistently higher when the spoof action is also deployed.
Figure 7. Exploitation profits with and without spoofing against each HBL-and-ZI equilibrium found in Section 5.2. Repetitions of the same market environment represent outcomes of multiple equilibria. Exploitation profits are consistently higher when the spoof action is also deployed.
Games 12 00046 g007
Figure 8. Total surplus achieved at equilibria in games with and without spoofing. Each blue (orange) marker specifies the surplus at one equilibrium found in a specific game environment without (with) spoofing. Surplus achieved at equilibria combining HBL and ZI and equilibria with pure ZI are indicated by markers with and without fills, respectively.
Figure 8. Total surplus achieved at equilibria in games with and without spoofing. Each blue (orange) marker specifies the surplus at one equilibrium found in a specific game environment without (with) spoofing. Surplus achieved at equilibria combining HBL and ZI and equilibria with pure ZI are indicated by markers with and without fills, respectively.
Games 12 00046 g008
Figure 9. HBL adoption rate in equilibrium across different cloaking markets without spoofing.
Figure 9. HBL adoption rate in equilibrium across different cloaking markets without spoofing.
Games 12 00046 g009
Figure 10. Comparisons of price discovery for equilibrium in each environment with different cloaking.
Figure 10. Comparisons of price discovery for equilibrium in each environment with different cloaking.
Games 12 00046 g010
Figure 11. Equilibrium outcomes in games with and without cloaking. Each marker represents one equilibrium of the environment.
Figure 11. Equilibrium outcomes in games with and without cloaking. Each marker represents one equilibrium of the environment.
Games 12 00046 g011
Figure 12. The impact of cloaking on spoofing effectiveness. Cloaking mitigates price rise and the decrease in background surplus caused by spoofing.
Figure 12. The impact of cloaking on spoofing effectiveness. Cloaking mitigates price rise and the decrease in background surplus caused by spoofing.
Games 12 00046 g012
Figure 13. Exploitation payoff and transaction risk as we vary price increment δ and probing limit l.
Figure 13. Exploitation payoff and transaction risk as we vary price increment δ and probing limit l.
Games 12 00046 g013
Figure 14. Price deviations caused by spoof orders placed behind different price levels in the order book.
Figure 14. Price deviations caused by spoof orders placed behind different price levels in the order book.
Games 12 00046 g014
Figure 15. Correctly blocking spoof orders increases background-trader surplus and decreases manipulation profits.
Figure 15. Correctly blocking spoof orders increases background-trader surplus and decreases manipulation profits.
Games 12 00046 g015
Figure 16. Average HBL surplus differences and total number of transactions in non-spoofing markets where HBL traders use different price offsets.
Figure 16. Average HBL surplus differences and total number of transactions in non-spoofing markets where HBL traders use different price offsets.
Games 12 00046 g016
Figure 17. Market price deviations caused by spoofing in markets where HBL traders use different price offsets.
Figure 17. Market price deviations caused by spoofing in markets where HBL traders use different price offsets.
Games 12 00046 g017
Figure 18. Total background-trader surpluses and HBL strategy adoption rates achieved at equilibria across different market settings. For each market environment, we compare four settings where background traders are, respectively, provided with the standard HBL strategy (dark grey), HBL with selective price blocking (light grey), HBL with price offsets (white) and HBL that combines the two variations (striped). Each marker specifies one equilibrium outcome in markets with spoofing (orange) and without spoofing (blue).
Figure 18. Total background-trader surpluses and HBL strategy adoption rates achieved at equilibria across different market settings. For each market environment, we compare four settings where background traders are, respectively, provided with the standard HBL strategy (dark grey), HBL with selective price blocking (light grey), HBL with price offsets (white) and HBL that combines the two variations (striped). Each marker specifies one equilibrium outcome in markets with spoofing (orange) and without spoofing (blue).
Games 12 00046 g018aGames 12 00046 g018b
Table 1. Background trading strategies included in empirical game-theoretic analysis.
Table 1. Background trading strategies included in empirical game-theoretic analysis.
Strategy ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 ZI 6 ZI 7 HBL 1 HBL 2 HBL 3 HBL 4
L2358
R min 00000250250
R max 250500100010002000500500
η 110.810.80.81
Table 2. Additional background trading strategies included in EGTA for cloaking mechanisms.
Table 2. Additional background trading strategies included in EGTA for cloaking mechanisms.
Strategy ZI 8 ZI 9 ZI 10
R min 00250
R max 10002000500
η 0.40.40.4
Table 3. Lowest number of probing attempts required to beat equilibrium performance.
Table 3. Lowest number of probing attempts required to beat equilibrium performance.
Env ( δ , l)
LSHNK1(1, 16)(2, 9)
K2(1, 8)(2, 5)(4, 3)(8, 3)
K4(1, 19)(2, 3)
K4(1, 10)(2, 5)(4, 3)
MSMNK1(1, 7)(2, 5)(4, 4)(8, 3)
K1(1, 7)(2, 4)(4, 2)(8, 1)
K1(1, 5)(2, 3)(4, 2)
K1(1, 9)(2, 4)(4, 2)
K2(1, 11)(2, 3)(4, 4)(8, 3)
K4(1, 5)(2, 3)(4, 3)(8, 3)
Table 4. A set of basic background trading strategies that we include to compare to the two HBL variations.
Table 4. A set of basic background trading strategies that we include to compare to the two HBL variations.
Strategy ZI 1 ZI 2 ZI 3 ZI 4 ZI 5 HBL 1 HBL 2
L-----25
R min 00000--
R max 100010001000500250--
η 0.40.810.80.8--
Table 5. Average payoffs of learning-based background traders and the exploiter, as they deviate from the equilibrium strategy profiles found in Section 7.2.1. We deviate either background traders or the exploiter to its corresponding strategy variation. We refer to the exploiter who spoofs as SP and the one who only executes trades as EXP. Asterisks denote statistical significance at the 1 % level for the paired t-test in payoffs compared to the standard HBL (*), SP K = 1 (*) and EXP (**).
Table 5. Average payoffs of learning-based background traders and the exploiter, as they deviate from the equilibrium strategy profiles found in Section 7.2.1. We deviate either background traders or the exploiter to its corresponding strategy variation. We refer to the exploiter who spoofs as SP and the one who only executes trades as EXP. Asterisks denote statistical significance at the 1 % level for the paired t-test in payoffs compared to the standard HBL (*), SP K = 1 (*) and EXP (**).
EnvHBL HBL χ = 1 HBL χ = 2 HBL χ = 3 SP ψ = 1 SP ψ = 2 SP ψ = 3 EXP
LSHN658650 *658658525494 * , **488 *483 *
MSMN655645 *655655356312 *299 *295 *
HSLN649641 *649649295264 *268 * , **253 *
Table 6. A set of first HBL variation with different price level blocking parameters.
Table 6. A set of first HBL variation with different price level blocking parameters.
Strategy HBL 3 HBL 4 HBL 5 HBL 6
L2255
χ 1212
Table 7. A set of second HBL variations with different price offsets.
Table 7. A set of second HBL variations with different price offsets.
Strategy HBL 7 HBL 8 HBL 9 HBL 10 HBL 11 HBL 12 HBL 13 HBL 14
L22225555
R min −10−20−40−80−10−20−40−80
R max 00000000
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, X.; Hoang, C.; Vorobeychik, Y.; Wellman, M.P. Spoofing the Limit Order Book: A Strategic Agent-Based Analysis. Games 2021, 12, 46. https://doi.org/10.3390/g12020046

AMA Style

Wang X, Hoang C, Vorobeychik Y, Wellman MP. Spoofing the Limit Order Book: A Strategic Agent-Based Analysis. Games. 2021; 12(2):46. https://doi.org/10.3390/g12020046

Chicago/Turabian Style

Wang, Xintong, Christopher Hoang, Yevgeniy Vorobeychik, and Michael P. Wellman. 2021. "Spoofing the Limit Order Book: A Strategic Agent-Based Analysis" Games 12, no. 2: 46. https://doi.org/10.3390/g12020046

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop