Handling Risk-aware Attackers in Security Games

Stackelberg security games (SSGs) are now established as a powerful tool in security domains. In this paper , we consider a new dimension of security games: the risk preferences of the attacker. Previous work assumes a risk-neutral attacker that maximizes his expected reward. However, extensive studies show that the attackers in some domains are in fact risk-averse, e.g., terrorist groups in counter-terrorism domains. The failure to incorporate the risk aversion in SSG models may lead the defender to suffer significant losses. Additionally, defenders are uncertain about the degree of attacker’s risk aversion. Motivated by this challenge this paper provides the following five contributions: (i) we propose a novel model for security games against risk-averse attackers with uncertainty in the degree of their risk aversion; (ii) we develop an intuitive MIBLP formulation based on previous security games research, but find that it finds locally optimal solutions and is unable to scale up; (iii) based on insights from our MIBLP formulation, we develop our scalable BeRRA algorithm that finds globally ǫ-optimal solutions; (iv) we extend our BeRRA algorithm to handle other risk-aware attackers, e.g., risk-seeking criminals; (v) we show that we do not need to consider attacker’s risk attitude in zero-sum games.

[1]  Jeffrey T. Grogger,et al.  Certainty vs. Severity of Punishment , 1991 .

[2]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[3]  M. K. Block,et al.  Some Experimental Evidence on Differences between Student and Prisoner Reactions to Monetary Penalties and Risk , 1995, The Journal of Legal Studies.

[4]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[5]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[6]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[7]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[8]  P. J. Phillips APPLYING MODERN PORTFOLIO THEORY TO THE ANALYSIS OF TERRORISM. COMPUTING THE SET OF ATTACK METHOD COMBINATIONS FROM WHICH THE RATIONAL TERRORIST GROUP WILL CHOOSE IN ORDER TO MAXIMISE INJURIES AND FATALITIES , 2009 .

[9]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[10]  Peter J. Phillips The Preferred Risk Habitat of Al-Qa'ida Terrorists , 2010 .

[11]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[12]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[13]  Milind Tambe,et al.  A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.

[14]  Vladik Kreinovich,et al.  Security games with interval uncertainty , 2013, AAMAS.

[15]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[16]  Milind Tambe,et al.  Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games , 2014, AAMAS.

[17]  Milind Tambe,et al.  Robust Strategy against Unknown Risk-averse Attackers in Security Games , 2015, AAMAS.