Addressing Execution and Observation Error in Security Games

Attacker-defender Stackelberg games have become a popular game-theoretic approach for security with deployments for LAX Police, the FAMS and the TSA. Unfortunately, most of the existing solution approaches do not model two key uncertainties of the real-world: there may be noise in the defender's execution of the suggested mixed strategy and/or the observations made by an attacker can be noisy. In this paper, we analyze a framework to model these uncertainties, and demonstrate that previous strategies perform poorly in such uncertain settings. We also analyze RECON, a novel algorithm that computes strategies for the defender that are robust to such uncertainties, and explore heuristics that further improve RECON's efficiency.

[1]  Milind Tambe,et al.  Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.

[2]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[3]  Vincent Conitzer,et al.  Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.

[4]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[5]  J. Morgan,et al.  The Value of Commitment in Contests and Tournaments When Observation is Costly , 2004 .

[6]  Rong Yang,et al.  Improved computational models of human behavior in security games , 2011, AAMAS.

[7]  K. Bagwell Commitment and observability in games , 1995 .

[8]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[9]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[10]  Erik Jenelius,et al.  Critical infrastructure protection under imperfect attacker perception , 2010, Int. J. Crit. Infrastructure Prot..

[11]  Wieland Müller,et al.  Perfect versus Imperfect Observability - An Experimental Test of Bagwell's Result , 2000, Games Econ. Behav..

[12]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[13]  Christopher Archibald,et al.  Modeling billiards games , 2009, AAMAS.

[14]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[15]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.

[16]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[17]  Milind Tambe,et al.  Robust Bayesian methods for Stackelberg security games , 2010, AAMAS.

[18]  J. Marecki,et al.  Robust Bayesian Methods for Stackelberg Security Games (Extended Abstract) , 2010 .

[19]  Jonathan F. Bard,et al.  Practical Bilevel Optimization: Algorithms and Applications (Nonconvex Optimization and Its Applications) , 2006 .

[20]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[21]  Garud Iyengar,et al.  Robust Dynamic Programming , 2005, Math. Oper. Res..

[22]  E.E.C. van Damme,et al.  Games with imperfectly observable commitment , 1997 .

[23]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[24]  Vincent Conitzer,et al.  Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS.