Coalitional Security Games

Game theoretic models of security, and associated computational methods, have emerged as critical components of security posture across a broad array of domains, including airport security and coast guard. These approaches consider terrorists as motivated but independent entities. There is, however, increasing evidence that attackers, be it terrorists or cyber attackers, communicate extensively and form coalitions that can dramatically increase their ability to achieve malicious goals. To date, such cooperative decision making among attackers has been ignored in the security games literature. To address the issue of cooperation among attackers, we introduce a novel coalitional security game (CSG)) model. A CSG consists of a set of attackers connected by a (communication or trust) network who can form coalitions as connected subgraphs of this network so as to attack a collection of targets. A defender in a CSG can delete a set of edges, incurring a cost for deleting each edge, with the goal of optimally limiting the attackers' ability to form effective coalitions (in terms of successfully attacking high value targets). We first show that a CSG is, in general, hard to approximate. Nevertheless, we develop a novel branch and price algorithm, leveraging a combination of column generation, relaxation, greedy approximation, and stabilization methods to enable scalable high-quality approximations of CSG solutions on realistic problem instances.

[1]  Michael Wooldridge,et al.  Computational Aspects of Cooperative Game Theory , 2011, KES-AMSTA.

[2]  Herbert Hamers,et al.  Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda , 2013, Eur. J. Oper. Res..

[3]  Victor Asal,et al.  The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks , 2008, The Journal of Politics.

[4]  Jeffrey S. Rosenschein,et al.  Coalitional skill games , 2008, AAMAS.

[5]  Mihalis Yannakakis,et al.  The Complexity of Multiterminal Cuts , 1994, SIAM J. Comput..

[6]  John N. Tsitsiklis,et al.  Introduction to linear optimization , 1997, Athena scientific optimization and computation series.

[7]  Vincent Conitzer,et al.  Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.

[8]  Bo An,et al.  Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.

[9]  George W. Bush,et al.  National Strategy for Combating Terrorism , 2009 .

[10]  Nicholas R. Jennings,et al.  Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks , 2013, IJCAI.

[11]  Bo An,et al.  Security Games with Protection Externalities , 2015, AAAI.

[12]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[13]  Michel Gendreau,et al.  Interior point stabilization for column generation , 2007, Oper. Res. Lett..

[14]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[15]  P. Klerks The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .

[16]  Matthew Levitt,et al.  Untangling the Terror Web: Identifying and Counteracting the Phenomenon of Crossover between Terrorist Groups , 2004 .

[17]  Bo An,et al.  An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..

[18]  Marilyn B. Peterson Applications in Criminal Analysis: A Sourcebook , 1994 .

[19]  Jonathan Cole Smith,et al.  Exact interdiction models and algorithms for disconnecting networks via node deletions , 2012, Discret. Optim..

[20]  Brian J. Phillips,et al.  How Terrorist Organizations Survive: Cooperation and Competition in Terrorist Group Networks , 2012 .

[21]  K A Kronstadt,et al.  Terrorist Attacks in Mumbai, India, and Implications for U.S. Interests , 2008 .

[22]  David Pritchard,et al.  An LP with Integrality Gap 1+epsilon for Multidimensional Knapsack , 2010, ArXiv.

[23]  Zhen Wang,et al.  Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.

[24]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[25]  Bo An,et al.  Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.

[26]  Mihalis Yannakakis,et al.  Optimization, approximation, and complexity classes , 1991, STOC '88.

[27]  Renato R. Martino Remarks to the United Nations on Human Cloning , 2002 .

[28]  Bo An,et al.  Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.

[29]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[30]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[31]  Bo An,et al.  Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks , 2016, AAAI.