Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system

In recent years, several security agencies have been deploying scheduling systems based on algorithmic advances in Stackelberg security games (SSGs). Unfortunately, none of the existing algorithms can scale up to domains where benefits are accrued from multiple defender resources performing jointly coordinated activities. Yet in many domains, including port patrolling where SSGs are in use, enabling multiple defender resources to perform jointly coordinated activities would significantly enhance the effectiveness of the patrols. To address this challenge, this paper presents four contributions. First, we present Smart (Security games with Multiple coordinated Activities and Resources that are Time-dependent), a novel SSG model that explicitly represents jointly coordinated activities between defender’s resources. Second, we present two branch-and-price algorithms, $$S\textsc {mart}_{\textsc {O}}\,$$SMARTO—an optimal algorithm, and $$S\textsc {mart}_{\textsc {H}}\,$$SMARTH—a heuristic approach, to solve Smart instances. The two algorithms present three novel features: (i) a novel approach to generate individual defender strategies by ordering the search space during column generation using insights from the Traveling Salesman Problem(TSP); (ii) exploitation of iterative modification of rewards of multiple defender resources to generate coordinated strategies and (iii) generation of tight upper bounds for pruning using the structure of the problem. Third, we present an extensive empirical and theoretical analysis of both $$S\textsc {mart}_{\textsc {O}}\,$$SMARTOand $$S\textsc {mart}_{\textsc {H}}\,$$SMARTH. Fourth, we describe a large scale real-world experiment whereby we run the first head-to-head comparison between game-theoretic schedules generated using $$S\textsc {mart}_{\textsc {H}}\,$$SMARTHagainst schedules generated by humans on a one-day patrol exercise over one train line of the Los Angeles Metro System. Our results show that game-theoretic schedules were evaluated to be superior to ones generated by humans.

[1]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[2]  Branislav Bosanský,et al.  Transiting areas patrolled by a mobile adversary , 2010, Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games.

[3]  Vincent Conitzer Computing Game-Theoretic Solutions and Applications to Security , 2012, AAAI.

[4]  Sarit Kraus,et al.  Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.

[5]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[6]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[7]  Alexis Drogoul,et al.  Multi-agent Patrolling: An Empirical Analysis of Alternative Architectures , 2002, MABS.

[8]  Richard S. Sutton,et al.  Introduction to Reinforcement Learning , 1998 .

[9]  Vincent Conitzer,et al.  Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.

[10]  Yevgeniy Vorobeychik,et al.  Optimal interdiction of attack plans , 2013, AAMAS.

[11]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[12]  Dan Lovallo,et al.  To Review or Not to Review? Limited Strategic Thinking at the Movie Box Office , 2009 .

[13]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[14]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[15]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[16]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[17]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[18]  Colin Camerer,et al.  Testing Game Theory in the Field: Swedish LUPI Lottery Games , 2010 .

[19]  Sarit Kraus,et al.  Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..

[20]  Gregory Gutin,et al.  Traveling salesman should not be greedy: domination analysis of greedy-type heuristics for the TSP , 2001, Discret. Appl. Math..

[21]  John N. Tsitsiklis,et al.  Introduction to linear optimization , 1997, Athena scientific optimization and computation series.

[22]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[23]  Yevgeniy Vorobeychik,et al.  Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.

[24]  Zhi Yuan,et al.  Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.

[25]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[26]  Martin W. P. Savelsbergh,et al.  Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..

[27]  Milind Tambe,et al.  Defender (Mis)coordination in Security Games , 2013, IJCAI.

[28]  Sarit Kraus,et al.  A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.

[29]  Milind Tambe,et al.  Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..

[30]  Sarit Kraus,et al.  Multi-robot adversarial patrolling: facing coordinated attacks , 2014, AAMAS.

[31]  Vincent Conitzer,et al.  Security Games with Multiple Attacker Resources , 2011, IJCAI.

[32]  Michal Pechoucek,et al.  Using Multi-agent Simulation to Improve the Security of Maritime Transit , 2011, MABS.

[33]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[34]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[35]  Milind Tambe,et al.  Unleashing Dec-MDPs in Security Games: Enabling Effective Defender Teamwork , 2014, ECAI.

[36]  Claudia V. Goldman,et al.  Solving Transition Independent Decentralized Markov Decision Processes , 2004, J. Artif. Intell. Res..

[37]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[38]  Vincent Conitzer,et al.  Solving Stackelberg games with uncertain observability , 2011, AAMAS.

[39]  Manish Jain,et al.  Efficiently Solving Joint Activity Based Security Games , 2013, IJCAI.

[40]  Milind Tambe,et al.  GUARDS - Innovative Application of Game Theory for National Airport Security , 2011, IJCAI.

[41]  Vincent Conitzer,et al.  Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.

[42]  Ronald V. Clarke,et al.  Police and the Prevention of Terrorism , 2007 .

[43]  Sarit Kraus,et al.  Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.

[44]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.