Comparing Strategic Secrecy and Stackelberg Commitment in Security Games

The Strong Stackelberg Equilibrium (SSE) has drawn extensive attention recently in several security domains. However, the SSE concept neglects the advantage of defender’s strategic revelation of her private information, and overestimates the observation ability of the adversaries. In this paper, we overcome these restrictions and analyze the tradeoff between strategic secrecy and commitment in security games. We propose a Disguised-resource Security Game (DSG) where the defender strategically disguises some of her resources. We compare strategic information revelation with public commitment and formally show that they have different advantages depending the payoff structure. To compute the Perfect Bayesian Equilibrium (PBE), several novel approaches are provided, including a novel algorithm based on support set enumeration, and an approximation algorithm for -PBE. Extensive experimental evaluation shows that both strategic secrecy and Stackelberg commitment are critical measures in security domain, and our approaches can efficiently solve PBEs for realistic-sized problems.

[1]  L. Goddard,et al.  Operations Research (OR) , 2007 .

[2]  M. Spence Job Market Signaling , 1973 .

[3]  J. Tobin,et al.  ハンセンと公共政策 (ハンセンとその業績(The Quarterly Journal of Economics,1976年2月号)) , 1976 .

[4]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[5]  A. Rubinstein A BARGAINING MODEL WITH INCOMPLETE INFORMATION ABOUT TIME PREFERENCES , 1985 .

[6]  Jstor The journal of economic perspectives , 1987 .

[7]  R. Lathe Phd by thesis , 1988, Nature.

[8]  Alice M. Obenchain-Leeson,et al.  Volume 6 , 1998 .

[9]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[10]  Daniel F. Spulber Journal of Economics and Management Strategy: Introduction , 2004 .

[11]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[12]  David L. Banks,et al.  Combining Game Theory and Risk Analysis in Counterterrorism: A Smallpox Example , 2006 .

[13]  Chuanyi Ji,et al.  Modeling and defending against internet worm attacks , 2007 .

[14]  G. Saridis,et al.  Journal of Optimization Theory and Applications Approximate Solutions to the Time-invariant Hamilton-jacobi-bellman Equation 1 , 1998 .

[15]  Tansu Alpcan,et al.  Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.

[16]  Tansu Alpcan,et al.  Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.

[17]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[18]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[19]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[20]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[21]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[22]  Bo An,et al.  Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.

[23]  Bo An,et al.  Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.

[24]  Milind Tambe,et al.  Robust Protection of Fisheries with COmPASS , 2014, AAAI.

[25]  Branislav Bosanský,et al.  Approximate Solutions for Attack Graph Games with Imperfect Information , 2015, GameSec.

[26]  Haifeng Xu,et al.  Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.

[27]  Haifeng Xu,et al.  Information Disclosure as a Means to Security , 2015, AAMAS.

[28]  Bo An,et al.  Security Games with Protection Externalities , 2015, AAAI.

[29]  Zhen Wang,et al.  Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.

[30]  Bo An,et al.  Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks , 2016, AAAI.

[31]  Bo An,et al.  Optimally Protecting Elections , 2016, IJCAI.

[32]  Bo An,et al.  Efficient Resource Allocation for Protecting Coral Reef Ecosystems , 2016, IJCAI.

[33]  Chunyan Miao,et al.  Optimal Interdiction of Illegal Network Flow , 2016, IJCAI.

[34]  Bo An,et al.  Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.