A two-resource allocation algorithm with an application to large-scale zero-sum defensive games

This paper investigates efficient computation schemes for allocating two defensive resources to multiple sites to protect against possible attacks by an adversary. The availability of the two resources is constrained and the effectiveness of each may vary over the sites. The problem is formulated as a two-person zero-sum game with particular piecewise linear utility functions: the expected damage to a site that is attacked linearly decreases in the allocated resource amounts up to a point that a site is fully protected. The utility of the attacker, equivalently the defender's disutility, is the total expected damage over all sites. A fast algorithm is devised for computing the game's Nash equilibria; it is shown to be more efficient in practice than both general purpose linear programming solvers and a specialized method developed in the mid-1980s. To develop the algorithm, optimal solution properties are explored. HighlightsWe explore structure of Nash equilibria of a defensive two-resource allocation game.A fast algorithm is developed with intuition that stems from the revealed structure.Experiments show an order-of-magnitude improvement over a state-of-the-art LP solver.Experiments show that it outperforms a method based on Megiddo and Ichimori (1985).

[1]  P. Douglas The Cobb-Douglas Production Function Once Again: Its History, Its Testing, and Some New Empirical Values , 1976, Journal of Political Economy.

[2]  Stephan Dempe,et al.  A Minimax Resource Allocation Problem with Variable Resources , 2002, Eur. J. Oper. Res..

[3]  Zhen Xie,et al.  Optimal response to attacks on the open science grid , 2011, Comput. Networks.

[4]  Natalia Alguacil,et al.  A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..

[5]  Hanan Luss,et al.  On Equitable Resource Allocation Problems: A Lexicographic Minimax Approach , 1999, Oper. Res..

[6]  Uriel G. Rothblum,et al.  Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..

[7]  Vicki M. Bier,et al.  Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..

[8]  Hanan Luss Equitable Resource Allocation: Models, Algorithms and Applications , 2012 .

[9]  Tagish iSite,et al.  The George B , 2010 .

[10]  Naoki Katoh,et al.  Resource Allocation Problems , 1998 .

[11]  Kim-Chuan Toh,et al.  SDPT3 -- A Matlab Software Package for Semidefinite Programming , 1996 .

[12]  Martin C. Libicki Cyberdeterrence and Cyberwar , 2009 .

[13]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[14]  Uriel G. Rothblum,et al.  Allocating multiple defensive resources in a zero-sum game setting , 2015, Ann. Oper. Res..

[15]  Wei Yuan,et al.  Optimal power grid protection through a defender-attacker-defender model , 2014, Reliab. Eng. Syst. Saf..

[16]  Ronald L. Rivest,et al.  Introduction to Algorithms, third edition , 2009 .

[17]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[18]  R. Wets,et al.  George B . Dantzig ( 1914 – 2005 ) , 2007 .

[19]  Stephen J. Wright Primal-Dual Interior-Point Methods , 1997, Other Titles in Applied Mathematics.

[20]  R. Armstrong,et al.  An Efficient Algorithm for a Class of Two-Resource Allocation Problems , 1998, INFORMS J. Comput..

[21]  G. Cho A NEW PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR OPTIMIZATION , 2009 .

[22]  L. Berkovitz Convexity and Optimization in Rn , 2001 .

[23]  T. Basar,et al.  A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[24]  Gregory Levitin,et al.  Redundancy vs. Protection vs. False Targets for Systems Under Attack , 2009, IEEE Transactions on Reliability.

[25]  R. K. Shyamasundar,et al.  Introduction to algorithms , 1996 .

[26]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[27]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[28]  Nimrod Megiddo,et al.  A Two-Resource Allocation Problem Solvable in Linear Time , 1985, Math. Oper. Res..

[29]  Lorenz T. Biegler,et al.  On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..