Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games

Stackelberg Security Games (SSG) have been used to model defender- attacker relationships for analyzing real-world security resource allocation problems. Research has focused on generating algorithms that are optimal and efficient for defenders, based on a presumed model of adversary choices. However, relatively less has been done descriptively to investigate how well those models capture adversary choices and psychological assumptions about adversary decision making. Using data from three experiments, including over 1000 human subjects playing over 25000 games, this study evaluates adversary choices by comparing 9 adversary models both nomothetically and ideographically in a SSG setting. We found that participants tended to be consistent with utility maximization and avoid a target with high probability of being protected even if the reward or expected value of that target is high. It was also found in two experiments that adversary choices were dependent on the defender’s payoffs, even after accounting for attacker’s own payoffs.

[1]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[2]  H. Stott Cumulative prospect theory's functional menagerie , 2006 .

[3]  K. R. Hammond Probabilistic functioning and the clinical method. , 1955, Psychological review.

[4]  Alfred Stein,et al.  The Softest of Targets: A Study on Terrorist Target Selection , 2009 .

[5]  J. Lerner,et al.  Beyond valence: Toward a model of emotion-specific influences on judgement and choice , 2000 .

[6]  H. Simon,et al.  A Behavioral Model of Rational Choice , 1955 .

[7]  E. Brunswik,et al.  The Conceptual Framework of Psychology , 1954 .

[8]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[9]  R. Duncan Luce,et al.  Individual Choice Behavior , 1959 .

[10]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[11]  F. Scholz Maximum Likelihood Estimation , 2006 .

[12]  David R. Anderson,et al.  Model selection and multimodel inference : a practical information-theoretic approach , 2003 .

[13]  Rong Yang,et al.  A robust approach to addressing human adversaries in security games , 2012, AAMAS.

[14]  D. McFadden Quantal Choice Analysis: A Survey , 1976 .

[15]  H. Akaike A new look at the statistical model identification , 1974 .

[16]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.