Stackelberg Security Games with Multiple Uncoordinated Defenders

Stackelberg security games have received much attention in recent years. While most existing work focuses on single-defender settings, there are many real-world scenarios that involve multiple defenders (e.g., multi-national anti-crime actions in international waters, different security agencies patrolling the same area). In this paper, we consider security games with uncoordinated defenders who jointly protect a set of targets, but may have different valuations for these targets; each defender schedules their own resources and selfishly optimizes their own utility. We generalize the standard (single-defender) model of Stackelberg security games to this setting and formulate an equilibrium concept that captures the nature of strategic interaction among the players. We argue that an exact equilibrium may fail to exist, and, in fact, deciding whether it exists is NP-hard. However, under mild assumptions, every multi-defender security game admits an e-equilibrium for every e>0$, and the limit points corresponding to e\to 0$ can be efficiently approximated.

[1]  Zhen Wang,et al.  Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.

[2]  Sarit Kraus,et al.  Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications , 2008, AAAI.

[3]  Yevgeniy Vorobeychik,et al.  Multi-Defender Strategic Filtering Against Spear-Phishing Attacks , 2016, AAAI.

[4]  Bo An,et al.  Coalitional Security Games , 2016, AAMAS.

[5]  Hanif D. Sherali,et al.  A Multiple Leader Stackelberg Model and Analysis , 1984, Oper. Res..

[6]  Huifu Xu,et al.  A Stochastic Multiple-Leader Stackelberg Model: Analysis, Computation, and Application , 2009, Oper. Res..

[7]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[8]  Yevgeniy Vorobeychik,et al.  Decentralization and security in dynamic traffic light control , 2016, HotSoS.

[9]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[10]  Yevgeniy Vorobeychik,et al.  MultiDefender security games on networks , 2014, PERV.

[11]  Natalie Klein Can international litigation solve the India-Sri Lanka fishing dispute? , 2017 .

[12]  Luis E. Ortiz,et al.  Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks , 2012, UAI.

[13]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[14]  Nicola Basilico,et al.  Computing the Team-maxmin Equilibrium in Single-Team Single-Adversary Team Games , 2017, Intelligenza Artificiale.

[15]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[16]  Ankur A. Kulkarni,et al.  A Shared-Constraint Approach to Multi-Leader Multi-Follower Games , 2012, 1206.2968.

[17]  Stefano Coniglio,et al.  Pessimistic Leader-Follower Equilibria with Multiple Followers , 2017, IJCAI.

[18]  Milind Tambe,et al.  Bayesian Security Games for Controlling Contagion , 2013, 2013 International Conference on Social Computing.

[19]  Yevgeniy Vorobeychik,et al.  Equilibrium Analysis of Multi-Defender Security Games , 2015, IJCAI.

[20]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[21]  Milind Tambe,et al.  Defender (Mis)coordination in Security Games , 2013, IJCAI.

[22]  Yevgeniy Vorobeychik,et al.  Multidefender Security Games , 2015, IEEE Intelligent Systems.

[23]  Kalyanmoy Deb,et al.  Finding optimal strategies in a multi-period multi-leader-follower Stackelberg game using an evolutionary algorithm , 2013, Comput. Oper. Res..

[24]  Sarit Kraus,et al.  An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.

[25]  Bo An Game Theoretic Analysis of Security and Sustainability , 2017, IJCAI.

[26]  Sven Leyffer,et al.  Solving multi-leader–common-follower games , 2010, Optim. Methods Softw..

[27]  G. Leitmann On generalized Stackelberg strategies , 1978 .