Defender Stackelberg Game with Inverse Geodesic Length as Utility Metric

The inverse geodesic length (IGL) is a well-known and widely used measure of network performance. It equals the sum of the inverse distances of all pairs of vertices in the network. A Stackelberg game is a strategic game in which one player commits to a strategy while taking into account that other players will respond accordingly. We propose a natural defender-attacker Stackelberg game on a network in which the defender wants to maximize the IGL level of the network and commits to protecting parts of the network while having knowledge of the strength of an attacker that wants to weaken the network. We present several algorithmic and complexity results concerning the problem of finding the optimal commitment for the defender. Some of our computational hardness results also answer open problems posed in prior work on IGL.

[1]  John Dunagan,et al.  Active Graph Reachability Reduction for Network Security and Software Engineering , 2011, IJCAI.

[2]  Serge Gaspers,et al.  Weakening Covert Networks by Minimizing Inverse Geodesic Length , 2017, IJCAI.

[3]  Talal Rahwan,et al.  Strategic Social Network Analysis , 2017, AAAI.

[4]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  Mikkel Thorup,et al.  Undirected single-source shortest paths with positive integer weights in linear time , 1999, JACM.

[6]  Daniel Lokshtanov,et al.  Parameterized Integer Quadratic Programming: Variables and Coefficients , 2015, ArXiv.

[7]  Albert-László Barabási,et al.  Destruction perfected , 2015, Nature.

[8]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[9]  Michael R. Fellows,et al.  On the complexity of some colorful problems parameterized by treewidth , 2011, Inf. Comput..

[10]  Reinhard Diestel,et al.  Graph Theory , 1997 .

[11]  Michael R. Fellows,et al.  Review of: Fundamentals of Parameterized Complexity by Rodney G. Downey and Michael R. Fellows , 2015, SIGA.

[12]  Magnus Wahlström,et al.  Algorithms, measures and upper bounds for satisfiability and related problems , 2007 .

[13]  Ge Xia,et al.  Improved upper bounds for vertex cover , 2010, Theor. Comput. Sci..

[14]  Piotr Faliszewski,et al.  Elections with Few Candidates: Prices, Weights, and Covering Problems , 2015, ADT.

[15]  Oskar Skibski,et al.  Defeating Terrorist Networks with Game Theory , 2015, IEEE Intelligent Systems.

[16]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[17]  Michael Lampis Algorithmic Meta-theorems for Restrictions of Treewidth , 2010, ESA.

[18]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[19]  Pim van 't Hof,et al.  On the Computational Complexity of Vertex Integrity and Component Order Connectivity , 2014, Algorithmica.

[20]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[21]  V Latora,et al.  Efficient behavior of small-world networks. , 2001, Physical review letters.

[22]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[23]  John T. Saccoman,et al.  A Survey of Component Order Connectivity Models of Graph Theoretic Networks , 2013 .

[24]  Bo An,et al.  Coalitional Security Games , 2016, AAMAS.

[25]  Fedor V. Fomin,et al.  Iterative compression and exact algorithms , 2010, Theor. Comput. Sci..

[26]  Yicheng Zhang,et al.  Identifying influential nodes in complex networks , 2012 .

[27]  Hernán A. Makse,et al.  Influence maximization in complex networks through optimal percolation , 2015, Nature.

[28]  M. V. Valkenburg Network Analysis , 1964 .

[29]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[30]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[31]  Rolf Niedermeier,et al.  Parameterized Complexity of Vertex Cover Variants , 2007, Theory of Computing Systems.

[32]  Talal Rahwan,et al.  Efficient algorithms for game-theoretic betweenness centrality , 2016, Artif. Intell..

[33]  Nicholas R. Jennings,et al.  Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks , 2013, IJCAI.

[34]  Vincent Conitzer,et al.  Security scheduling for real-world networks , 2013, AAMAS.

[35]  Toshihide Ibaraki,et al.  Algorithmic Aspects of Graph Connectivity , 2008, Encyclopedia of Mathematics and its Applications.

[36]  Chunyan Miao,et al.  Optimal Interdiction of Illegal Network Flow , 2016, IJCAI.

[37]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[38]  Rolf Niedermeier,et al.  An efficient fixed-parameter algorithm for 3-Hitting Set , 2003, J. Discrete Algorithms.

[39]  Zhen Wang,et al.  Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.