Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs

Security agencies in the real world often need to protect targets with time-dependent values, e.g., tourist sites where the number of travelers changes over time. Since the values of different targets often change asynchronously, the defender can relocate security resources among targets dynamically to make the best use of limited resources. We propose a game-theoretic scheme to develop dynamic, randomized security strategies in consideration of adversary's surveillance capability. This differs from previous studies on security games by considering varying target values and continuous strategy spaces of the security agency and the adversary. The main challenge lies in the computational intensiveness due to the continuous, hence infinite strategy spaces. We propose an optimal algorithm and an arbitrarily near-optimal algorithm to compute security strategies under different conditions. Experimental results show that both algorithms significantly outperform existing approaches.

[1]  Milind Tambe,et al.  Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.

[2]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[3]  Bo An,et al.  Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.

[4]  Bo An,et al.  Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.

[5]  Zhi Yuan,et al.  Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.

[6]  Bo An,et al.  Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.

[7]  Vincent Conitzer,et al.  Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.

[8]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[9]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[10]  Milind Tambe,et al.  Computational Game Theory for Security : Progress and Challenges ∗ , 2013 .

[11]  Manish Jain,et al.  Computational Game Theory for Security and Sustainability , 2014, J. Inf. Process..

[12]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[13]  Vincent Conitzer,et al.  Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains , 2014, AAAI.

[14]  Bo An,et al.  Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.

[15]  Bo An,et al.  Security Games with Protection Externalities , 2015, AAAI.

[16]  Milind Tambe Security and Game Theory: EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES , 2011 .