Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned

Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the U.S. Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world. The book also includes professional perspectives from security experts Erroll G. Southers; Lieutenant Commander Joe DiRenzo III, U.S. Coast Guard; Lieutenant Commander Ben Maule, U.S. Coast Guard; Erik Jensen, U.S. Coast Guard; and Lieutenant Fred S. Bertsch IV, U.S. Coast Guard.

[1]  J. Morgan,et al.  The Value of Commitment in Contests and Tournaments When Observation is Costly , 2004 .

[2]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[3]  Fernando Ordóñez,et al.  Robust Wardrop Equilibrium , 2007, NET-COOP.

[4]  Vincent Conitzer,et al.  Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.

[5]  M. Friedman The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance , 1937 .

[6]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[7]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[8]  Nicola Basilico,et al.  Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[9]  Chang-Tien Lu,et al.  Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[10]  Vincent Conitzer,et al.  Mixed-Integer Programming Methods for Finding Nash Equilibria , 2005, AAAI.

[11]  John N. Tsitsiklis,et al.  Introduction to linear optimization , 1997, Athena scientific optimization and computation series.

[12]  A. Rubinstein Modeling Bounded Rationality , 1998 .

[13]  Jean-Francois Richard,et al.  Approximation of Nash equilibria in Bayesian games , 2008 .

[14]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[15]  Sheldon Howard Jacobson,et al.  Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .

[16]  Mikel Buesa,et al.  The Economic Cost of March 11: Measuring the Direct Economic Cost of the Terrorist Attack on March 11, 2004 in Madrid , 2007 .

[17]  Tim Roughgarden Stackelberg Scheduling Strategies , 2004, SIAM J. Comput..

[18]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.

[19]  K. Yuen,et al.  The two-sample trimmed t for unequal population variances , 1974 .

[20]  D. McFadden Quantal Choice Analysis: A Survey , 1976 .

[21]  Nicola Basilico,et al.  Computing Bayes-Nash Equilibria through Support Enumeration Methods in Bayesian Two-Player Strategic-Form Games , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[22]  M. Naceur Azaiez,et al.  Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks , 2009 .

[23]  E.E.C. van Damme,et al.  Games with imperfectly observable commitment , 1997 .

[24]  Milind Tambe,et al.  Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.

[25]  Peter R. Wurman,et al.  Monte Carlo Approximation in Incomplete Information, Sequential Auction Games , 2003, Decis. Support Syst..

[26]  Luis E. Ortiz,et al.  Algorithms for Interdependent Security Games , 2003, NIPS.

[27]  Laurent El Ghaoui,et al.  Robustness in Markov Decision Problems with Uncertain Transition Matrices , 2003, NIPS.

[28]  Allen B. MacKenzie,et al.  Using game theory to analyze wireless ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[29]  Sarit Kraus,et al.  Adversarial Uncertainty in Multi-Robot Patrol , 2009, IJCAI.

[30]  Colin Camerer Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .

[31]  Vincent Conitzer,et al.  Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.

[32]  Michael P. Wellman,et al.  Selecting strategies using empirical game models: an experimental analysis of meta-strategies , 2008, AAMAS.

[33]  Monica Costa Dias,et al.  Alternative approaches to evaluation in empirical microeconomics , 2002, The Journal of Human Resources.

[34]  R. Looney Economic Costs to the United States Stemming From the 9-11 Attacks; Strategic Insights: v.1, issue 6 (August 2002) , 2002 .

[35]  D. Kenney,et al.  Police and Policing: Contemporary Issues , 1999 .

[36]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[37]  R. Lazarick Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[38]  Sarit Kraus,et al.  An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.

[39]  Daphne Koller,et al.  Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.

[40]  Sui Ruan,et al.  Patrolling in a Stochastic Environment , 2005 .

[41]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[42]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[43]  Sarit Kraus,et al.  A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.

[44]  Tansu Alpcan,et al.  Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.

[45]  Larry Reznick,et al.  Setting priorities , 1994 .

[46]  Michael P. Wellman,et al.  Computing Best-Response Strategies in Infinite Games of Incomplete Information , 2004, UAI.

[47]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[48]  W. A. Wagenaar Generation of random sequences by human subjects: A critical survey of literature. , 1972 .

[49]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[50]  J. Neumann,et al.  Theory of games and economic behavior , 1945, 100 Years of Math Milestones.

[51]  Branislav Bosanský,et al.  Transiting areas patrolled by a mobile adversary , 2010, Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games.

[52]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[53]  Jean Cardinal,et al.  Pricing of Geometric Transportation Networks , 2009, CCCG.

[54]  Martin W. P. Savelsbergh,et al.  Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..

[55]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[56]  Nikita Borisov,et al.  Anonymity in Structured Peer-to-Peer Networks , 2003 .

[57]  R. Pape,et al.  The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.

[58]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[59]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[60]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[61]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[62]  Sarit Kraus,et al.  Security in multiagent systems by policy randomization , 2006, AAMAS '06.

[63]  Ariel Orda,et al.  Achieving network optima using Stackelberg routing strategies , 1997, TNET.

[64]  H. Stackelberg,et al.  Marktform und Gleichgewicht , 1935 .

[65]  Manish Jain,et al.  Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.

[66]  J. Vial,et al.  Strategically zero-sum games: The class of games whose completely mixed equilibria cannot be improved upon , 1978 .

[67]  Noa Agmon On events in multi-robot patrol in adversarial environments , 2010, AAMAS.

[68]  Kelly E. See,et al.  Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.

[69]  Sarit Kraus,et al.  Coordinating randomized policies for increasing security of agent systems , 2009, Inf. Technol. Manag..

[70]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[71]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[72]  Manish Jain,et al.  Security applications: lessons of real-world deployment , 2009, SECO.

[73]  Milind Tambe,et al.  Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.

[74]  RICHARD C. LARSON,et al.  A hypercube queuing model for facility location and redistricting in urban emergency services , 1974, Comput. Oper. Res..

[75]  R. Selten,et al.  A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .

[76]  Wieland Müller,et al.  Perfect versus Imperfect Observability - An Experimental Test of Bagwell's Result , 2000, Games Econ. Behav..

[77]  Timothy W. McLain,et al.  Multiple UAV cooperative search under collision avoidance and limited range communication constraints , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[78]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[79]  Rae Zimmerman,et al.  Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[80]  A. Tversky,et al.  Support theory: A nonextensional representation of subjective probability. , 1994 .

[81]  Jörgen W. Weibull,et al.  Testing Game Theory , 2004 .

[82]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[83]  Jean-Francois Richard,et al.  Approximation of Bayesian Nash Equilibrium , 2008 .

[84]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[85]  Howard Raiffa,et al.  Games And Decisions , 1958 .

[86]  Henry H. Willis,et al.  Estimating Terrorism Risk , 2002 .

[87]  Kevin Leyton-Brown,et al.  A Polynomial-Time Algorithm for Action Graph Games , 2006, AAAI.

[88]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[89]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[90]  Sarit Kraus,et al.  Towards a formalization of teamwork with resource constraints , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[91]  Robert W. Hahn,et al.  Risks, Costs and Lives Saved: GETTING BETTER RESULTS FROM REGULATION , 1996 .

[92]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[93]  Milind Tambe,et al.  Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.

[94]  Jeffrey D. Berejikian A Cognitive Theory of Deterrence , 2002 .

[95]  Paul Scerri,et al.  Transitioning multiagent technology to UAV applications , 2008, AAMAS.

[96]  P. Taylor,et al.  Evolutionarily Stable Strategies and Game Dynamics , 1978 .

[97]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[98]  Alvin E. Roth,et al.  Predictive value and the usefulness of game theoretic models , 2002 .

[99]  Edmund H. Durfee,et al.  Approximating Optimal Policies for Agents with Limited Execution Resources , 2003, IJCAI.

[100]  K. Bagwell Commitment and observability in games , 1995 .

[101]  Stefan Arnborg,et al.  Bayesian Games for Threat Prediction and Situation Analysis , 2004 .

[102]  H. Simon,et al.  Rational choice and the structure of the environment. , 1956, Psychological review.

[103]  T. Basar,et al.  A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[104]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.