Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers

Passenger profiling enables the Transportation Security Administration to target costly inspection effort toward passengers that have an incentive to attack. On the other hand, critics point out that attackers may game the profiler by manipulating their attributes and behavior, making the profiler ineffective. We examine how passenger profiling impacts airport security operations when the profiler is vulnerable to gaming by attackers. We consider the no-profiling setup and two profiling setups. In the no-profiling setup, all passengers are sent through a screening device, and those that raise an alarm are physically inspected. In the first profiling setup, all classified attackers are physically inspected and classified normal passengers are sent through a screening device, and those that raise an alarm are physically inspected. In the second profiling setup, every passenger, regardless of the profiler's classification, is sent through a screening device and those that raise an alarm are inspected, but the screening devices are configured differently for classified attackers and classified normal passengers. We find that, regardless of the profiling setup, the optimal profiling setup performs at least as good as the no-profiling setup on key performance measures such as total expected security cost, inspection rate of normal passengers, and attacker detection rate even when the profiler is vulnerable to attackers' gaming. The benefit from profiling increases if the profiler becomes less vulnerable. Although neither profiling setup dominates the other on these performance measures, we find that each setup has different desirable properties.

[1]  Qianmei Feng,et al.  A mathematical framework for sequential passenger and baggage screening to enhance aviation security , 2009, Comput. Ind. Eng..

[2]  Julie L Virta,et al.  Analyzing the cost of screening selectee and non-selectee baggage. , 2003, Risk analysis : an official publication of the Society for Risk Analysis.

[3]  Sheldon Howard Jacobson,et al.  Probability models for access security system architectures , 1997 .

[4]  Sheldon H. Jacobson,et al.  A Sequential Stochastic Security System Design Problem for Aviation Security , 2007, Transp. Sci..

[5]  Sheldon Howard Jacobson,et al.  Modeling aviation baggage screening security systems: a case study , 2003 .

[6]  Sheldon Howard Jacobson,et al.  A Detection Theoretic approach to Modeling Aviation Security Problems using the Knapsack Problem , 2001 .

[7]  Robert W Poole,et al.  A Risk-based Airport Security Policy , 2003 .

[8]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[9]  Jason R. W. Merrick,et al.  Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile? , 2010, Decis. Anal..

[10]  CavusogluHuseyin,et al.  Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers , 2013 .

[11]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[12]  Marlin U. Thomas,et al.  An infiltration game with time dependent payoff , 1976 .

[13]  Vicki M. Bier,et al.  Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..

[14]  Charles F. Manski Profiling: Introduction to the Feature , 2006 .

[15]  Aaron Strauss,et al.  Carnival Booth: An Algorithm for Defeating the Computer-Assisted Passenger Screening System , 2002, First Monday.

[16]  Derral Cheatwood,et al.  Capital Punishment and the Deterrence of Violent Crime in Comparable Counties , 1993 .

[17]  Sheldon Howard Jacobson,et al.  A multilevel passenger screening problem for aviation security , 2006 .

[18]  Huseyin Cavusoglu,et al.  The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..

[19]  Butler,et al.  RE-THINKING CHECKED-BAGGAGE SCREENING , 2002 .

[20]  Huseyin Cavusoglu,et al.  Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..

[21]  Sheldon Howard Jacobson,et al.  Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .

[22]  Arnold Barnett,et al.  Airline Safety: The Last Decade , 1989 .

[23]  Steven Shavell,et al.  The Optimal Tradeoff between the Probability and Magnitude of Fines , 1981 .

[24]  Timothy M. Ravich Airline Passenger Profiling Systems After 9/11: Personal Privacy versus National Security , 2010 .

[25]  Huseyin Cavusoglu,et al.  Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems , 2009, Inf. Syst. Res..

[26]  Eric Miller,et al.  Testing and evaluating computer intrusion detection systems , 1999, CACM.

[27]  Sheldon Howard Jacobson,et al.  Integer programming models and analysis for a multilevel passenger screening problem , 2007 .

[28]  John McHugh,et al.  Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.

[29]  Dilip Mookherjee,et al.  Monitoring vis-a-vis Investigation in Enforcement of Law , 1992 .

[30]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[31]  D. Marc Kilgour,et al.  Site selection for on‐site inspection in arms control , 1992 .

[32]  G. Feichtinger A Differential Games Solution to a Model of Competition Between a Thief and the Police , 1983 .

[33]  Sheldon H. Jacobson,et al.  Risk-Based Policies for Airport Security Checkpoint Screening , 2010, Transp. Sci..

[34]  Steven Shavell,et al.  Specific versus General Enforcement of Law , 1989, Journal of Political Economy.

[35]  John E. Gaffney,et al.  A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems , 2004, Decis. Anal..

[36]  L. Kornhauser,et al.  Monitoring vis-a-vis Investigation in Enforcement of Law , 2008 .

[37]  George J. Stigler,et al.  The Optimum Enforcement of Laws , 1970, Journal of Political Economy.

[38]  Huseyin Cavusoglu,et al.  An Analysis of the Impact of Passenger Profiling for Transportation Security , 2010, Oper. Res..