The human element: addressing human adversaries in security domains

Recently, game theory has been shown to be useful for reasoning about real-world security settings where security forces must protect critical assets from potential adversaries. In fact, there have been a number of deployed real-world applications of game theory for security (e.g., ARMOR at Los Angeles International Airport and IRIS for the Federal Air Marshals Service). Here, the objective is for the security force to utilize its limited resources to best defend their critical assets. An important factor in these real-world security settings is that the adversaries involved are humans who may not behave according to the standard assumptions of game-theoretic models. There are two key shortcomings of the approaches currently employed in these recent applications. First, human adversaries may not make the predicted rational decision. In such situations, where the security force has optimized against a perfectly rational opponent, a deviation by the human adversary can lead to adverse affects on the security force's predicted outcome. Second, human adversaries are naturally creative and security domains are highly dynamic, making enumeration of all potential threats a practically impossible task and solving the resulting game, with current leading approaches, would be intractable. My thesis contributes to a very new area that combines algorithmic and experimental game theory. Indeed, it examines a critical problem in applying game-theoretic techniques to situations where perfectly rational solvers must address human adversaries. In doing so it advances the study and reach of game theory to domains where software agents and humans may interact. More specifically, to address the first shortcoming, my thesis presents two separate algorithms to address potential deviations from the predicted rational decision by human adversaries. Experimental results, from a simulation that is motivated by a real-world security domain at Los Angeles International airport, demonstrated that both of my approaches outperform the currently deployed optimal algorithms which utilize standard game-theoretic assumptions and additional alternative algorithms against humans. In fact, one of my approaches is currently under evaluation in a real-world application to aid in resource allocation decisions for the United States Coast Guard. Towards addressing the second shortcoming of enumeration of a large number of potential adversary threat capabilities, I introduce a new game-theoretic model for efficiency, which additionally generalizes the previously accepted model for security domains. This new game-theoretic model for addressing human threat capabilities has seen real-world deployment and is under evaluation to aid the United States Transportation Security Administration in their resource allocation challenges.

[1]  Herbert A. Simon,et al.  The Sciences of the Artificial , 1970 .

[2]  O. Holsti,et al.  Essence of Decision: Explaining the Cuban Missile Crisis , 1972 .

[3]  Milind Tambe,et al.  A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.

[4]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[5]  Max Abrahms,et al.  What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy , 2008, International Security.

[6]  S. Tijs Nash equilibria for noncooperative n-person games in normal form , 1981 .

[7]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[8]  Ya'akov Gal,et al.  A cultural sensitive agent for human-computer negotiation , 2012, AAMAS.

[9]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[10]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[11]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[12]  Milind Tambe,et al.  Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.

[13]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[14]  C. Starmer Developments in Non-expected Utility Theory: The Hunt for a Descriptive Theory of Choice under Risk , 2000 .

[15]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[16]  H. Rosoff,et al.  Decision Analysis by Proxy for the Rational Terrorist , 2022 .

[17]  Moshe Tennenholtz,et al.  Mechanism Design with Execution Uncertainty , 2002, UAI.

[18]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[19]  Robert T. Clemen,et al.  Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias Toward the Ignorance Prior , 2005, Manag. Sci..

[20]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[21]  Brian A. Jackson,et al.  Understanding the Role of Deterrence in Counterterrorism Security , 2009 .

[22]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[23]  M. Friedman The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance , 1937 .

[24]  Jonathan Gratch,et al.  The effect of expression of anger and happiness in computer agents on negotiations with humans , 2011, AAMAS.

[25]  Edgar Brunner,et al.  Rank-Score Tests in Factorial Designs with Repeated Measures , 1999 .

[26]  A. Rubinstein Modeling Bounded Rationality , 1998 .

[27]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[28]  Kelly E. See,et al.  Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.

[29]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[30]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[31]  K. Yuen,et al.  The two-sample trimmed t for unequal population variances , 1974 .

[32]  Mathew D. McCubbins,et al.  The Theory of Minds Within the Theory of Games , 2012 .

[33]  P. Petta,et al.  Computational models of emotion , 2010 .

[34]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[35]  Kevin Chlebik Terrorism and Game Theory: From the Terrorists’ Point of View , 2010 .

[36]  Christopher Archibald,et al.  Modeling billiards games , 2009, AAMAS.

[37]  Fernando Ordóñez,et al.  Robust Wardrop Equilibrium , 2007, NET-COOP.

[38]  P. Greenwood,et al.  A Guide to Chi-Squared Testing , 1996 .

[39]  Kevin Leyton-Brown,et al.  Beyond equilibrium: predicting human behaviour in normal form games , 2010, AAAI.

[40]  R. Wilcox Introduction to Robust Estimation and Hypothesis Testing , 1997 .

[41]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[42]  Sarit Kraus,et al.  Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..

[43]  Richard Mesic,et al.  Implementing Security Improvement Options at Los Angeles International Airport , 2006 .

[44]  Bo An,et al.  Security Games with Limited Surveillance , 2012, AAAI.

[45]  H. Stackelberg,et al.  Marktform und Gleichgewicht , 1935 .

[46]  Manish Jain,et al.  Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.

[47]  Milind Tambe,et al.  Urban Security: Game-Theoretic Resource Allocation in Networked Domains , 2010, AAAI.

[48]  R. Wilcox Applying Contemporary Statistical Techniques , 2003 .

[49]  J. Neumann Zur Theorie der Gesellschaftsspiele , 1928 .

[50]  R. Selten,et al.  A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .

[51]  A. Tversky,et al.  Subjective Probability: A Judgment of Representativeness , 1972 .

[52]  Reinhard Selten,et al.  Evolutionary stability in extensive two-person games - correction and further development , 1988 .

[53]  Milind Tambe,et al.  Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.

[54]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[55]  Paul Gill,et al.  Comparing Role-Specific Terrorist Profiles , 2011 .

[56]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[57]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[58]  Vincent Conitzer,et al.  Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..

[59]  ปิยดา สมบัติวัฒนา Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .

[60]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[61]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[62]  Craig R. Fox,et al.  Partition Priming in Judgment Under Uncertainty , 2003, Psychological science.

[63]  Barry Turner,et al.  Sveriges Riksbank Prize in Economic Sciences in Memory of Alfred Nobel , 2013 .

[64]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[65]  A. Tversky,et al.  Support theory: A nonextensional representation of subjective probability. , 1994 .

[66]  Louise Richardson,et al.  What Terrorists Want: Understanding the Enemy, Containing the Threat , 2006 .

[67]  Rand R. Wilcox,et al.  How many discoveries have been lost by ignoring modern statistical methods , 1998 .

[68]  H. Simon,et al.  Rational choice and the structure of the environment. , 1956, Psychological review.

[69]  Yoav Shoham,et al.  Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[70]  C. Falaster Essence of Decision: Explaining the Cuban Missile Crisis , 2014 .

[71]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[72]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[73]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[74]  D. Koehler,et al.  Probability matching in choice under uncertainty: Intuition versus deliberation , 2009, Cognition.

[75]  D. von Winterfeldt,et al.  Identifying and Structuring the Objectives of Terrorists , 2010, Risk analysis : an official publication of the Society for Risk Analysis.