G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games

Critical infrastructure protection becomes increasingly a major concern in governments and industries. Besides the increasing rates of cyber-crime, recent terrorist attacks bring critical infrastructure into a severer environment. Many critical infrastructures, in particular those operating large industry complexes, incorporate some kind of physical surveillance technologies to secure their premises. Surveillance systems, such as access control and malicious behavior detection, have been long used for perimeter security as a first line of defense. Traditional perimeter security solutions typically monitor the outer boundary structures and lines, thus ignoring threats from the inside. Moreover, the deterrent effect of surveillance systems like Closed Circuit Television (CCTV) becomes considerably less important due to the inflexibility induced by their fixed installations. Hence, an infrastructure’s surveillance policy is more predictable and a potential adversary has a better opportunity to observe and bypass it subsequently. Therefore, it is important to maintain situational awareness within such environments so that potential intruders can still be detected. Regardless of whether personnel (e.g., security guards, etc.) or technical solutions (e.g., cameras, etc.) are applied, such surveillance systems have an imperfect detection rate, leaving an intruder with the potential to cause some damage to the infrastructure. Hence, the core problem is to find an optimal application of the surveillance technology at hand to minimize such a potential damage. This problem already has a natural reflection in game theory known as cops-and-robbers game but current models always assume a deterministic outcome of the gameplay. In this work, we present a decision-making framework, which assesses possible choices and alternatives towards finding an optimal surveillance configurations and hence minimizing addressed risks. The decision is made by means of a game-theoretic model for optimizing physical surveillance systems and minimizing the potential damage caused by an intruder with respect to the imperfect detection rates of surveillance technology. With our approach, we have the advantage of using categorical (or continuous) distributions instead of a single numerical value to capture the uncertainty in describing the potential damage of an intruder. This gives us the opportunity to model the imperfection of surveillance systems and to optimize over large collections of empirical or simulated data without losing valuable information during the process.

[1]  Dimitrios M. Thilikos,et al.  An annotated bibliography on guaranteed graph searching , 2008, Theor. Comput. Sci..

[2]  Sven Koenig,et al.  Algorithms and Complexity Results for Pursuit-Evasion Problems , 2009, IJCAI.

[3]  Mica R. Endsley,et al.  Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.

[4]  Kouichi Sakurai,et al.  A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress) , 2010, INTRUST.

[5]  Milind Tambe,et al.  Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.

[6]  Anil K. Jain,et al.  An Introduction to Biometric Authentication Systems , 2005 .

[7]  Stefan Rass,et al.  Playing a Multi-objective Spot-checking Game in Public Transportation Systems , 2017, SHCIS '17.

[8]  Geoffrey A. Hollinger,et al.  Search and pursuit-evasion in mobile robotics , 2011, Auton. Robots.

[9]  Mohan S. Kankanhalli,et al.  Adversary Aware Surveillance Systems , 2009, IEEE Transactions on Information Forensics and Security.

[10]  Krzysztof Szajowski Multi-variate Quickest Detection of Significant Change Process , 2011, GameSec.

[11]  Martin Aigner,et al.  A game of cops and robbers , 1984, Discret. Appl. Math..

[12]  Aner Sela Fictitious play in ‘one-against-all’ multi-player games , 1999 .

[13]  Liu Yang,et al.  Research of android smart phone surveillance system , 2010, 2010 International Conference On Computer Design and Applications.

[14]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[15]  Viliam Lisý,et al.  Online Learning Methods for Border Patrol Resource Allocation , 2014, GameSec.

[16]  Stefan Rass,et al.  Secure Communication over Software-Defined Networks , 2015, Mob. Networks Appl..

[17]  Stefan Rass,et al.  Uncertainty in Games: Using Probability-Distributions as Payoffs , 2015, GameSec.

[18]  Athanasios Kehagias,et al.  The Role of Visibility in Pursuit / Evasion Games , 2014, Robotics.

[19]  Zhi Yuan,et al.  Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.

[20]  Antti Oulasvirta,et al.  Long-term effects of ubiquitous surveillance in the home , 2012, UbiComp.

[21]  Jack Brassil,et al.  Technical Challenges in Location-Aware Video Surveillance Privacy , 2009, Protecting Privacy in Video Surveillance.

[22]  Milind Tambe,et al.  STREETS: Game-Theoretic Traffic Patrolling with Exploration and Exploitation , 2014, AAAI.

[23]  Tansu Alpcan,et al.  Network Security , 2010 .

[24]  Petr A. Golovach,et al.  On tractability of Cops and Robbers game , 2008, IFIP TCS.

[25]  Lisa Rajbhandari,et al.  Mapping between Classical Risk Management and Game Theoretical Approaches , 2011, Communications and Multimedia Security.

[26]  Sampath Kannan,et al.  Randomized pursuit-evasion in a polygonal environment , 2005, IEEE Transactions on Robotics.

[27]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[28]  T. D. Parsons,et al.  Pursuit-evasion in a graph , 1978 .

[29]  B. Alspach SEARCHING AND SWEEPING GRAPHS: A BRIEF SURVEY , 2006 .

[30]  Sarit Kraus,et al.  Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..

[31]  Bo An,et al.  Security Games with Limited Surveillance , 2012, AAAI.

[32]  Alyson G. Wilson,et al.  Statistical Methods in Counterterrorism , 2006 .

[33]  Tamer Basar,et al.  Surveillance for Security as a Pursuit-Evasion Game , 2014, GameSec.

[34]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[35]  Athanasios Kehagias,et al.  Cops and Robbers, Game Theory and Zermelo's Early Results , 2014, ArXiv.

[36]  Stefan Rass,et al.  On Game-Theoretic Network Security Provisioning , 2012, Journal of Network and Systems Management.

[37]  Gary MacGillivray,et al.  A note on k-cop, l-robber games on graphs , 2006, Discret. Math..