Coalition Formation in Multi-defender Security Games

We study Stackelberg security game (SSG) with multiple defenders, where heterogeneous defenders need to allocate security resources to protect a set of targets against a strategic attacker. In such games, coordination and cooperation between the defenders can increase their ability to protect their assets, but the heterogeneous preferences of the selfinterested defenders often make such cooperation very difficult. In this paper, we approach the problem from the perspective of cooperative game theory and study coalition formation among the defenders. Our main contribution is a number of algorithmic results for the computation problems that arise in this model. We provide a poly-time algorithm for computing a solution in the core of the game and show that all of the elements in the core are Pareto efficient. We show that the problem of computing the entire core is NP-hard and then delve into a special setting where the size of a coalition is limited up to some threshold. We analyse the parameterized complexity of deciding if a coalition structure is in the core under this special setting, and provide a poly-time algorithm for computing successful deviation strategies for a given coalition.

[1]  Sang-Seung Yi Stable Coalition Structures with Externalities , 1997 .

[2]  Yevgeniy Vorobeychik,et al.  Multi-Defender Strategic Filtering Against Spear-Phishing Attacks , 2016, AAAI.

[3]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[4]  Sarit Kraus,et al.  On agent types in coalition formation problems , 2010, AAMAS.

[5]  Sarit Kraus,et al.  Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications , 2008, AAAI.

[6]  Bo An,et al.  Stackelberg Security Games: Looking Beyond a Decade of Success , 2018, IJCAI.

[7]  Oskar Skibski,et al.  The Stochastic Shapley Value for coalitional games with externalities , 2018, Games Econ. Behav..

[8]  Michael Wooldridge,et al.  Stackelberg Security Games with Multiple Uncoordinated Defenders , 2018, AAMAS.

[9]  Nicola Gatti,et al.  Be a Leader or Become a Follower: The Strategy to Commit to with Multiple Leaders (Extended Version) , 2019, IJCAI.

[10]  H. Moulin,et al.  Cores of effectivity functions and implementation theory , 1982 .

[11]  Nicholas R. Jennings,et al.  Anytime coalition structure generation in multi-agent systems with positive or negative externalities , 2012, Artif. Intell..

[12]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[13]  Michael Wooldridge,et al.  Computational Aspects of Cooperative Game Theory (Synthesis Lectures on Artificial Inetlligence and Machine Learning) , 2011 .

[14]  Milind Tambe,et al.  Defender (Mis)coordination in Security Games , 2013, IJCAI.

[15]  Yevgeniy Vorobeychik,et al.  Equilibrium Analysis of Multi-Defender Security Games , 2015, IJCAI.

[16]  Milind Tambe,et al.  Stackelberg Security Games ( SSG ) Basics and Application Overview , 2018 .

[17]  Michael Wooldridge,et al.  Computational Aspects of Cooperative Game Theory , 2011, KES-AMSTA.

[18]  Edith Elkind,et al.  Mechanism Design for Defense Coordination in Security Games , 2020, AAMAS.

[19]  P. Chander,et al.  Cores of games with positive externalities , 2010 .

[20]  Sarit Kraus,et al.  Solving coalitional resource games , 2010, Artif. Intell..

[21]  Bianca Rundshagen,et al.  A Non-Cooperative Foundation of Core-Stability in Positive Externality Ntu-Coalition Games , 2003 .