Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System

Attacker-Defender Stackelberg security games (SSGs) have emerged as an important research area in multi-agent systems. However, existing SSGs models yield fixed, static, schedules which fail in dynamic domains where defenders face execution uncertainty, i.e., in domains where defenders may face unanticipated disruptions of their schedules. A concrete example is an application involving checking fares on trains, where a defender's schedule is frequently interrupted by fare evaders, making static schedules useless. To address this shortcoming, this paper provides four main contributions. First, we present a novel general Bayesian Stackelberg game model for security resource allocation in dynamic uncertain domains. In this new model, execution uncertainty is handled by using a Markov decision process (MDP) for generating defender policies. Second, we study the problem of computing a Stackelberg equilibrium for this game and exploit problem structure to reduce it to a polynomial-sized optimization problem. Shifting to evaluation, our third contribution shows, in simulation, that our MDP-based policies overcome the failures of previous SSG algorithms. In so doing, we can now build a complete system, that enables handling of schedule interruptions and, consequently, to conduct some of the first controlled experiments on SSGs in the field. Hence, as our final contribution, we present results from a real-world experiment on Metro trains in Los Angeles validating our MDP-based model, and most importantly, concretely measuring the benefits of SSGs for security resource allocation.

[1]  Branislav Bosanský,et al.  Iterative game-theoretic route selection for hostile area transit and patrolling , 2011, AAMAS.

[2]  Sarit Kraus,et al.  A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.

[3]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[4]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[5]  Joelle Pineau,et al.  A formal framework for robot learning and control under model uncertainty , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.

[6]  Vincent Conitzer,et al.  Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.

[7]  Milind Tambe,et al.  Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..

[8]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[9]  Sarit Kraus,et al.  Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.

[10]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[11]  Dan Lovallo,et al.  To Review or Not to Review? Limited Strategic Thinking at the Movie Box Office , 2009 .

[12]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.

[13]  James F. Allen,et al.  TRAINS-95: Towards a Mixed-Initiative Planning Assistant , 1996, AIPS.

[14]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[15]  Vincent Conitzer,et al.  Solving Stackelberg games with uncertain observability , 2011, AAMAS.

[16]  Bo An,et al.  Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.

[17]  Milind Tambe,et al.  A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.

[18]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[19]  Ron Kohavi,et al.  A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.

[20]  Nicola Basilico,et al.  Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.

[21]  Sarit Kraus,et al.  Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.

[22]  Nicola Basilico,et al.  Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[23]  Zhi Yuan,et al.  Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.

[24]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[25]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[26]  Marcus J. Huber Considerations for Flexible Autonomy within BDI Intelligent Agent Architectures , 1999 .

[27]  Ronen I. Brafman,et al.  Planning with Continuous Resources in Stochastic Domains , 2005, IJCAI.

[28]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[29]  Sarit Kraus,et al.  Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..

[30]  Vincent Conitzer,et al.  Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.

[31]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[32]  J M Bland,et al.  Weighted comparison of means , 1998, BMJ.

[33]  Kiseop Lee,et al.  T-Statistics for Weighted Means in Credit Risk Modelling , 2005 .

[34]  Martin Grötschel,et al.  The ellipsoid method and its consequences in combinatorial optimization , 1981, Comb..

[35]  Masaki Aoyagi Reputation and Dynamic Stackelberg Leadership in Infinitely Repeated Games , 1996 .

[36]  Colin Camerer,et al.  Testing Game Theory in the Field: Swedish LUPI Lottery Games , 2010 .

[37]  Vincent Conitzer Computing Game-Theoretic Solutions and Applications to Security , 2012, AAAI.

[38]  Bo An,et al.  Security Games with Limited Surveillance , 2012, AAAI.

[39]  Manuela M. Veloso,et al.  Existence of Multiagent Equilibria with Limited Agents , 2004, J. Artif. Intell. Res..

[40]  Yevgeniy Vorobeychik,et al.  Optimal interdiction of attack plans , 2013, AAMAS.

[41]  Vincent Conitzer,et al.  Security Games with Multiple Attacker Resources , 2011, IJCAI.

[42]  Vincent Conitzer,et al.  Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.

[43]  J. Filar,et al.  Competitive Markov Decision Processes , 1996 .

[44]  Milind Tambe,et al.  Towards Faster Planning with Continuous Resources in Stochastic Domains , 2008, AAAI.

[45]  Ronald V. Clarke,et al.  Deterrence and fare evasion: Results of a natural experiment , 2010 .

[46]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[47]  Milind Tambe,et al.  Towards Adjustable Autonomy for the Real World , 2002, J. Artif. Intell. Res..

[48]  Claudia V. Goldman,et al.  Solving Transition Independent Decentralized Markov Decision Processes , 2004, J. Artif. Intell. Res..

[49]  P. Gruber,et al.  Convex and Discrete Geometry , 2007 .

[50]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[51]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[52]  Yevgeniy Vorobeychik,et al.  Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.

[53]  Christopher Archibald,et al.  Hustling in Repeated Zero-Sum Games with Imperfect Execution , 2011, IJCAI.