Deployed Security Games for Patrol Planning

Nations and organizations need to secure locations of economic, military, or political importance from groups or individuals that can cause harm. The fact that there are limited security resources prevents complete security coverage, which allows adversaries to observe and exploit patterns in patrolling or monitoring and enables them to plan attacks that avoid existing patrols. The use of randomized security policies that are more difficult for adversaries to predict and exploit can counter their surveillance capabilities and improve security. In this chapter we describe the recent development of models to assist security forces in randomizing their patrols and their deployment in real applications. The systems deployed are based on fast algorithms for solving large instances of Bayesian Stackelberg games that capture the interaction between security forces and adversaries. Here we describe a generic mathematical formulation of these models, present some of the results that have allowed these systems to be deployed in practice, and outline remaining future challenges. We discuss the deployment of these systems in two real-world security applications: (1) The police at the Los Angeles International Airport uses these models to randomize the placement of checkpoints on roads entering the airport and the routes of canine unit patrols within the airport terminals. (2) The Federal Air Marshal Service (FAMS) uses these models to randomize the schedules of air marshals on international flights.

[1]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[2]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[3]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[4]  Rudolf Avenhaus,et al.  Inspection Games , 2009, Encyclopedia of Complexity and Systems Science.

[5]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[6]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[7]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[8]  Richard Mesic,et al.  Implementing Security Improvement Options at Los Angeles International Airport , 2006 .

[9]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[10]  Jonathan F. Bard,et al.  Practical Bilevel Optimization: Algorithms and Applications , 1998 .

[11]  Lawrence M. Wein,et al.  OR Forum - Homeland Security: From Mathematical Models to Policy Implementation: The 2008 Philip McCord Morse Lecture , 2009, Oper. Res..

[12]  Bernhard von Stengel,et al.  Chapter 51 Inspection games , 2002 .

[13]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[14]  Henry H. Willis,et al.  Estimating Terrorism Risk , 2002 .

[15]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[16]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery: An Overview , 1996, Advances in Knowledge Discovery and Data Mining.

[17]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[18]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[19]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[20]  Carla E. Brodley,et al.  Feature Selection for Unsupervised Learning , 2004, J. Mach. Learn. Res..

[21]  Jonathan F. Bard,et al.  Practical Bilevel Optimization , 1998 .

[22]  Jonathan F. Bard,et al.  Practical Bilevel Optimization: Algorithms and Applications (Nonconvex Optimization and Its Applications) , 2006 .

[23]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[24]  Kevin Chlebik Terrorism and Game Theory: From the Terrorists’ Point of View , 2010 .

[25]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[26]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[27]  R. Looney Economic Costs to the United States Stemming From the 9-11 Attacks; Strategic Insights: v.1, issue 6 (August 2002) , 2002 .

[28]  Право Federal Air Marshal Service , 2013 .

[29]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[30]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[31]  C. Drury,et al.  Optimal Placement of Suicide Bomber Detectors , 2007 .

[32]  H. Stackelberg,et al.  Marktform und Gleichgewicht , 1935 .

[33]  Bo An,et al.  GUARDS and PROTECT: next generation applications of security games , 2011, SECO.

[34]  M. Treisman,et al.  Generation of random sequences by human subjects: Cognitive operations or psychological process? , 1987 .

[35]  Li Lin,et al.  Passenger grouping under constant threat probability in an airport security system , 2006, Eur. J. Oper. Res..

[36]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[37]  Mikel Buesa,et al.  The Economic Cost of March 11: Measuring the Direct Economic Cost of the Terrorist Attack on March 11, 2004 in Madrid , 2007 .

[38]  RICHARD C. LARSON,et al.  A hypercube queuing model for facility location and redistricting in urban emergency services , 1974, Comput. Oper. Res..

[39]  R. Selten,et al.  A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .

[40]  V. Georgiev Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .

[41]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.

[42]  Kevin Leyton-Brown,et al.  A Polynomial-Time Algorithm for Action Graph Games , 2006, AAAI.

[43]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[44]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[45]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[46]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[47]  Johannes O. Royset,et al.  On the Complexity of Delaying an Adversary’s Project , 2005 .

[48]  Sarit Kraus,et al.  Security in multiagent systems by policy randomization , 2006, AAMAS '06.

[49]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[50]  Sarit Kraus,et al.  An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.

[51]  Daphne Koller,et al.  Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.

[52]  Sui Ruan,et al.  Patrolling in a Stochastic Environment , 2005 .

[53]  W. A. Wagenaar Generation of random sequences by human subjects: A critical survey of literature. , 1972 .