An interdiction game on a queueing network with multiple intruders

Security forces are deployed to protect networks that are threatened by multiple intruders. To select the best deployment strategy, we analyze an interdiction game that considers multiple simultaneous threats. Intruders route through the network as regular customers, while interdictors arrive at specific nodes as negative customers. When an interdictor arrives at a node where an intruder is present, the intruder is removed from the network. Intruders and interdictors compete over the value of this network, which is the throughput of unintercepted intruders. Intruders attempt to maximize this throughput by selecting a fixed route through the network, while the interdictors aim to minimize the throughput selecting their arrival rate at each node. We analyze this game and characterize optimal strategies. For special cases, we obtain explicit formulas to evaluate the optimal strategies and use these to compute optimal strategies for general networks. We also consider the network with probabilistic routing of intruders and show that for this case, the value and optimal strategies of the interdictor of the resulting game remain the same.

[1]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[2]  Kevin D. Glazebrook,et al.  Optimal patrol to uncover threats in time when detection is imperfect , 2014 .

[3]  Erol Gelenbe,et al.  Queues with negative arrivals , 1991, Journal of Applied Probability.

[4]  Herman Monsuur,et al.  The Cooperative Ballistic Missile Defence Game , 2013, GameSec.

[5]  Sarit Kraus,et al.  A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.

[6]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[7]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[8]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[9]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[10]  Richard D. Wollmer,et al.  Removing Arcs from a Network , 1964 .

[11]  David P. Morton,et al.  Models for nuclear smuggling interdiction , 2007 .

[12]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[13]  Marcel F. Neuts A Multistage Search Game , 1963 .

[14]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[15]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[16]  Stephen P. Boyd,et al.  Graph Implementations for Nonsmooth Convex Programs , 2008, Recent Advances in Learning and Control.

[17]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[18]  Alan R. Washburn,et al.  Allocation of clearance assets in IED warfare , 2011 .

[19]  M G H Bell,et al.  Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[20]  E. Gelenbe Product-form queueing networks with negative and positive customers , 1991 .

[21]  Lyn C. Thomas,et al.  Dynamic Search Games , 1991, Oper. Res..

[22]  Stephen P. Boyd,et al.  Disciplined Convex Programming , 2006 .

[23]  Michael P. Atkinson,et al.  The Last Line of Defense: Designing Radiation Detection-Interdiction Systems to Protect Cities From a Nuclear Terrorist Attack , 2007, IEEE Transactions on Nuclear Science.

[24]  J. C. Smith,et al.  Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .

[25]  Delbert Ray Fulkerson,et al.  Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..

[26]  S. Sastry,et al.  Probabilistic pursuit-evasion games: a one-step Nash approach , 2000, Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187).