Warning Time: Optimizing Strategic Signaling for Security Against Boundedly Rational Adversaries

Defender-attacker Stackelberg security games (SSGs) have been applied for solving many real-world security problems. Recent work in SSGs has incorporated a deceptive signaling scheme into the SSG model, where the defender strategically reveals information about her defensive strategy to the attacker, in order to influence the attacker's decision making for the defender's own benefit. In this work, we study the problem of signaling in security games against a boundedly rational attacker.

[1]  Milind Tambe,et al.  Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games , 2018, CogSci.

[2]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[3]  Chris Hankin,et al.  Game Theory Meets Information Security Management , 2014, SEC.

[4]  Milind Tambe,et al.  Adversary Models Account for Imperfect Crime Data: Forecasting and Planning against Real-world Poachers , 2018, AAMAS.

[5]  Haifeng Xu,et al.  Strategic Coordination of Human Patrollers and Mobile Sensors With Signaling for Security Games , 2018, AAAI.

[6]  Haifeng Xu,et al.  Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.

[7]  swright National Security Strategy , 2015 .

[8]  Garret Ridinger,et al.  Attacker Deterrence and Perceived Risk in a Stackelberg Security Game , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[9]  Ryan Kendall Behavioral Models of Competition: A Theoretical, Experimental, and Empirical Analysis , 2013 .

[10]  Fernando Ordóñez,et al.  Risk Averse Stackelberg Security Games with Quantal Response , 2016, GameSec.

[11]  Kathleen J. McInnis 2017 National Security Strategy: Issues for Congress [December 19, 2017] , 2017 .

[12]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[13]  Bo An,et al.  Stackelberg Security Games: Looking Beyond a Decade of Success , 2018, IJCAI.

[14]  Viliam Lisý,et al.  Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security , 2015, Cyber Warfare.

[15]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[16]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[17]  Steven R. Grenadier,et al.  Real Options Signaling Games with Applications to Corporate Finance , 2011 .

[18]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[19]  Pierpaolo Battigalli Rationalization in Signaling Games: Theory and Applications , 2004 .

[20]  David M. Kreps,et al.  Signaling Games and Stable Equilibria , 1987 .

[21]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[22]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[23]  Bo An,et al.  GUARDS and PROTECT: next generation applications of security games , 2011, SECO.