Networks facilitate the exchange of goods and information and create benefits. We consider a network with n complementary nodes, i.e. nodes that need to be connected to generate a positive payoff. This network may face intelligent attacks on links. To study how the network should be designed and protected, we develop a strategic model inspired by Dziubiński and Goyal (2013) with two players: a Designer and an Adversary. First, the Designer forms costly protected and non-protected links. Then, the Adversary attacks at most k links given that attacks are costly and that protected links cannot be removed by her attacks. The Adversary aims at disconnecting the network shaped by the Designer. The Designer builds a protected network that minimizes her costs given that it has to resist the attacks of the Adversary. We establish that in equilibrium the Designer forms a minimal 1-link-connected network which contains only protected links, or a minimal (k + 1, n)-link-connected network which contains only non-protected links, or a network which contains one protected link and (n − 1)(k + 1)/2 non-protected links. We also examine situations where the Designer can only create a limited number of protected links and situations where protected links are imperfect, that is, protected links can be removed by attacks with some probabilities. We show that if the available number of protected links is limited, then, in equilibrium, there exists a network which contains several protected and non-protected links. In the imperfect defense framework, we provide conditions under which the results of the benchmark model are preserved.JEL Classification: D74, D85. . 1 A network is connected if no set of nodes is isolated from the others. 1 has no value. Recall that during the Second World War, the production units for the weapons (nodes) were buried, so they were impossible to target, and attacks had to target the roads (links) in order to destroy the production process of the enemy. Therefore, the issue was to design a communication network between the production units that the enemy could not disconnect.Our goal is to examine how to design and protect the network in an optimal way, such that the network remains connected after an intelligent link attack. 2 We say that a network is designed and protected in an optimal way if the costs associated with the design and the protection of the network are minimized.We consider a two-stage game with two players: a Designer (D) and an Adversary (A).• Stage 1. The Designer moves first and chooses both a set of protected, and a set of non-protected links. Protected links cannot be removed by the attacks of the Adversary.• Stage 2. After observing the protected network (strategy) formed by the Designer, the Adversary attacks the network by allocating attacks to specific links. Since the attacks are costly, the Adversary has an incentive to attack at most k links.Creating protected and non-protected links is costly for the Designer. The benefits obtained by the Designer at the end of the game depend ...