Equilibrium Refinement in Security Games with Arbitrary Scheduling Constraints

Significant research effort in security games has focused in devising strategies that perform well even when the attacker deviates from optimal (rational) behavior. In most of these frameworks, a price needs to be paid to ensure robustness against this unpredictability. However, equilibrium refinement is an attractive alternative to boost solution robustness at no cost even though it has not received as much attention in security game literature. In this framework, resources are strategically allocated to secure an optimal outcome against a rational adversary while simultaneously protecting other targets to ensure good outcomes against boundedly rational or constrained attackers. Unfortunately, existing approaches for equilibrium refinement in security games cannot effectively address scheduling constraints that arise frequently in real-world applications. In this paper, we aim to fill this gap and make several key contributions. First, we show that existing approaches for equilibrium refinement can fail in the presence of scheduling constraints. Second, we investigate the properties of the best response of the attacker. Third, we leverage these properties to devise novel iterative algorithms to compute the optimally refined equilibrium, with polynomially many calls to an LP oracle for zero-sum games. Finally, we conduct extensive experimental evaluations that showcase (i) the superior performance of our approach in the face of a boundedly rational attacker and (ii) the attractive scalability properties of our algorithm that can solve realistic-sized instances.

[1]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[2]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[3]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[4]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[5]  Sarit Kraus,et al.  Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..

[6]  Dipankar Dasgupta,et al.  Game theory for cyber security , 2010, CSIIRW '10.

[7]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[8]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[9]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[10]  Bo An,et al.  Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.

[11]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[12]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[13]  Zhi Yuan,et al.  Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.

[14]  Sarit Kraus,et al.  Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.

[15]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[16]  Milind Tambe,et al.  Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.

[17]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[18]  Manish Jain,et al.  Efficiently Solving Joint Activity Based Security Games , 2013, IJCAI.

[19]  Viliam Lisý,et al.  Combining Online Learning and Equilibrium Computation in Security Games , 2015, GameSec.

[20]  Bo An,et al.  Security Games with Protection Externalities , 2015, AAAI.

[21]  Viliam Lisý,et al.  Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security , 2015, Cyber Warfare.

[22]  Sarit Kraus,et al.  Optimizing Traffic Enforcement: From the Lab to the Roads , 2017, GameSec.

[23]  Fernando Ordóñez,et al.  Building Real Stackelberg Security Games for Border Patrols , 2017, GameSec.

[24]  Michael P. Wellman,et al.  A Stackelberg Game Model for Botnet Data Exfiltration , 2017, GameSec.

[25]  Branislav Bosanský,et al.  Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers , 2017, GameSec.

[26]  Sarit Kraus,et al.  When Security Games Hit Traffic: Optimal Traffic Enforcement Under One Sided Uncertainty , 2017, IJCAI.