Toward Addressing Collusion Among Human Adversaries in Security Games

Security agencies including the US Coast Guard, the Federal Air Marshal Service and the Los Angeles Airport police are several major domains that have been deploying Stackelberg security games and related algorithms to protect against a single adversary or multiple, independent adversaries strategically. However, there are a variety of real-world security domains where adversaries may benefit from colluding in their actions against the defender. Given the potential negative effect of these collusive actions, the defender has an incentive to break up collusion by playing off the self-interest of individual adversaries. This paper deals with problem of collusive security games for rational and bounded rational adversaries. The theoretical results verified with human subject experiments showed that behavior model which optimizes against bounded rational adversaries provides demonstrably better performing defender strategies against human subjects.

[1]  Pervaze A. Sheikh,et al.  International Illegal Trade in Wildlife: Threats and U.S. Policy [July 23, 2013] , 2013 .

[2]  Bo An,et al.  Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.

[3]  Andrés López Restrepo,et al.  From Smugglers to Warlords: Twentieth Century Colombian Drug Traffickers , 2003 .

[4]  Bo An,et al.  Coalitional Security Games , 2016, AAMAS.

[5]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[6]  Vincent Conitzer,et al.  Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.

[7]  Creola Johnson America’s First Consumer Financial Watchdog Is on a Leash: Can the CFPB Use Its Authority to Declare Payday-Loan Practices Unfair, Abusive, and Deceptive? , 2012 .

[8]  Greg L. Warchol,et al.  Transnational Criminality: An Analysis of the Illegal Wildlife Market in Southern Africa , 2003 .

[9]  Rhona C. Free,et al.  21st century economics : a reference handbook , 2010 .

[10]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[11]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[12]  Horace A. Bartilow,et al.  Free Traders and Drug Smugglers: The Effects of Trade Openness on States' Ability to Combat Drug Trafficking , 2009, Latin American Politics and Society.

[13]  Milind Tambe,et al.  "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.

[14]  M. Gelfand,et al.  Converging measurement of horizontal and vertical individualism and collectivism , 1998 .

[15]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[16]  E. Fehr A Theory of Fairness, Competition and Cooperation , 1998 .