Game theory for security: Key algorithmic principles, deployed systems, lessons learned

Security is a critical concern around the world. In many security domains, limited security resources prevent full security coverage at all times; instead, these limited resources must be scheduled, avoiding schedule predictability, while simultaneously taking into account different target priorities, the responses of the adversaries to the security posture and potential uncertainty over adversary types. Computational game theory can help design such unpredictable security schedules. Indeed, casting the problem as a Bayesian Stackelberg game, we have developed new algorithms that are now deployed over multiple years in multiple applications for security scheduling. These applications are leading to real-world use-inspired research in the emerging research area of “security games” specifically, the research challenges posed by these applications include scaling up security games to large-scale problems, handling significant adversarial uncertainty, dealing with bounded rationality of human adversaries, and other interdisciplinary challenges.

[1]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[2]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[3]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[4]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[5]  Bo An,et al.  Multi-objective optimization for security games , 2012, AAMAS.

[6]  K. Pauwels,et al.  Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site , 2009 .

[7]  Bo An,et al.  Mixed-Initiative Optimization in Security Games: A Preliminary Report , 2011, AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration.

[8]  Bo An,et al.  GUARDS and PROTECT: next generation applications of security games , 2011, SECO.

[9]  Manish Jain,et al.  Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.

[10]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[11]  Rudolf Avenhaus,et al.  Inspection Games , 2009, Encyclopedia of Complexity and Systems Science.

[12]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.

[13]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[14]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[15]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[16]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[17]  Milind Tambe,et al.  Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.

[18]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[19]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[20]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[21]  Branislav Bosanský,et al.  Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.

[22]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[23]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[24]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[25]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[26]  Bo An,et al.  Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.

[27]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[28]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[29]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[30]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[31]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[32]  John N. Tsitsiklis,et al.  Introduction to linear optimization , 1997, Athena scientific optimization and computation series.

[33]  Glen Price Transportation Security Administration | U.S. Department of Homeland Security , 2002 .

[34]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[35]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[36]  Tansu Alpcan,et al.  Network Security , 2010 .

[37]  Milind Tambe,et al.  Towards Optimal Patrol Strategies for Urban Security in Transit Systems , 2011 .

[38]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[39]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[40]  Bernhard von Stengel,et al.  Chapter 51 Inspection games , 2002 .

[41]  Nicholas J. Howard,et al.  Finding optimal strategies for influencing social networks in two player games , 2010 .