Addressing uncertainty in stackelberg games for security: models and algorithms

Recently, there has been significant research interest in using game-theoretic approaches to allocate limited security resources to protect physical infrastructure including ports, airports, transit systems, and other critical national infrastructure as well as natural resources such as forests, tigers, fish, and so on. Indeed, the leader-follower Stackelberg game model is at the heart of many deployed applications. In these applications, the game model provides a randomized strategy for the leader (security forces), under the assumption that the adversary will conduct surveillance before launching an attack. Inevitably, the security forces are faced with the problem of uncertainty. For example, a security officer may execute a patrol strategy differently from the planned one due to unexpected events. Also the adversaries may have different types in terms of their preferences, objectives, and capabilities. While Bayesian Stackelberg games for modeling discrete uncertainty have been successfully used in deployed applications, they are NP-hard problems and existing methods perform poorly in scaling up the number of types: inadequate for complex real world problems. Furthermore, Bayesian Stackelberg games have not been applied to model execution and observation uncertainty and finally, they require the availability of full distributional information of the uncertainty. To overcome these difficulties, my thesis presents four major contributions. First, I provide a novel algorithm HUNTER for Bayesian Stackelberg games to scale up the number of types. Exploiting the efficiency of H UNTER, I show preference, execution and observation uncertainty can be addressed in a unified framework. Second, addressing execution and observation uncertainty whose distribution is difficult to estimate, I provide a robust optimization formulation to compute the optimal risk-averse leader strategy for security problems motivated by the \ARMOR application. Third, addressing the uncertainty of the adversary's capability of conducting surveillance, I show that for a class of Stackelberg games motivated by real security applications, the leader is always best-responding with a Stackelberg equilibrium strategy regardless of whether the adversary conducts surveillance or not. As the final contribution, I provide TRUSTS, a novel game-theoretic formulation for scheduling randomized patrols in public transit domains where timing is a crucial component. TRUSTS addresses dynamic execution uncertainty in such spatiotemporal domains by integrating Markov Decision Processes into the game-theoretic model. Simulation results as well as real-world trials of TRUSTS in the Los Angeles Metro Rail system provide validations of the approach.

[1]  Andreas Krause,et al.  Randomized Sensing in Adversarial Environments , 2011, IJCAI.

[2]  Bernhard von Stengel,et al.  Fast algorithms for finding randomized strategies in game trees , 1994, STOC '94.

[3]  Rong Yang,et al.  A robust approach to addressing human adversaries in security games , 2012, AAMAS.

[4]  Bo An,et al.  Security Games with Limited Surveillance: An Initial Report , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.

[5]  J. Harsanyi Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .

[6]  Branislav Bosanský,et al.  Iterative game-theoretic route selection for hostile area transit and patrolling , 2011, AAMAS.

[7]  Sarit Kraus,et al.  A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.

[8]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[9]  David P. Morton,et al.  Monte Carlo bounding techniques for determining solution quality in stochastic programs , 1999, Oper. Res. Lett..

[10]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[11]  Vincent Conitzer,et al.  Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.

[12]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[13]  Milind Tambe,et al.  Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.

[14]  R. Selten Reexamination of the perfectness concept for equilibrium points in extensive games , 1975, Classics in Game Theory.

[15]  Milind Tambe,et al.  Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.

[16]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[17]  Vincent Conitzer,et al.  Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.

[18]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[19]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[20]  Yevgeniy Vorobeychik,et al.  Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.

[21]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[22]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[23]  Jean-Philippe Vial,et al.  Robust Optimization , 2021, ICORES.

[24]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[25]  W. A. Wagenaar Generation of random sequences by human subjects: A critical survey of literature. , 1972 .

[26]  Branislav Bosanský,et al.  Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.

[27]  Egon Balas,et al.  programming: Properties of the convex hull of feasible points * , 1998 .

[28]  Milind Tambe,et al.  Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.

[29]  Wieland Müller,et al.  Perfect versus Imperfect Observability - An Experimental Test of Bagwell's Result , 2000, Games Econ. Behav..

[30]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[31]  Andrea L. Bertozzi,et al.  Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression , 2010, SIAM J. Appl. Dyn. Syst..

[32]  Vincent Conitzer,et al.  Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.

[33]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[34]  Sarit Kraus,et al.  Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.

[35]  Sarit Kraus,et al.  The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.

[36]  Milind Tambe,et al.  Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.

[37]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[38]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[39]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[40]  J. Vial,et al.  Strategically zero-sum games: The class of games whose completely mixed equilibria cannot be improved upon , 1978 .

[41]  Michael Wooldridge,et al.  Does Game Theory Work? , 2012, IEEE Intelligent Systems.

[42]  William M. Landes,et al.  Essays in the Economics of Crime and Punishment. Edited by G.S. Becker and W.M. Landes, New York, National Bureau of Economics Research, 1974, XVII p. 268 p. , 1979, Recherches économiques de Louvain.

[43]  J. Morgan,et al.  The Value of Commitment in Contests and Tournaments When Observation is Costly , 2004 .

[44]  J. Birge,et al.  A multicut algorithm for two-stage stochastic linear programs , 1988 .

[45]  Rong Yang,et al.  Computing optimal strategy against quantal response in security games , 2012, AAMAS.

[46]  E.E.C. van Damme,et al.  Games with imperfectly observable commitment , 1997 .

[47]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[48]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[49]  Christopher Archibald,et al.  Hustling in Repeated Zero-Sum Games with Imperfect Execution , 2011, IJCAI.

[50]  S. Sorin,et al.  The LP formulation of finite zero-sum games with incomplete information , 1980 .

[51]  Vincent Conitzer,et al.  Security Games with Multiple Attacker Resources , 2011, IJCAI.

[52]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[53]  Vincent Conitzer,et al.  Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.

[54]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[55]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[56]  S. Gal Search Games with Mobile and Immobile Hider , 1979 .

[57]  Milind Tambe,et al.  A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.

[58]  Claudia V. Goldman,et al.  Transition-independent decentralized markov decision processes , 2003, AAMAS '03.

[59]  Jonathan F. Bard,et al.  Practical Bilevel Optimization: Algorithms and Applications (Nonconvex Optimization and Its Applications) , 2006 .

[60]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[61]  Tuomas Sandholm,et al.  Information-theoretic approaches to branching in search , 2011, Discret. Optim..

[62]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[63]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[64]  Rong Yang,et al.  Improved computational models of human behavior in security games , 2011, AAMAS.

[65]  K. Bagwell Commitment and observability in games , 1995 .

[66]  A. Shapiro,et al.  The Sample Average Approximation Method for Stochastic Programs with Integer Recourse , 2002 .

[67]  H. Stackelberg,et al.  Marktform und Gleichgewicht , 1935 .

[68]  Manish Jain,et al.  Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.

[69]  Milind Tambe,et al.  Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.

[70]  Laurent El Ghaoui,et al.  Chapter Fourteen. Robust Adjustable Multistage Optimization , 2009 .

[71]  Vincent Conitzer,et al.  Solving Stackelberg games with uncertain observability , 2011, AAMAS.

[72]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[73]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[74]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[75]  S. Alpern Infiltration games on arbitrary graphs , 1992 .

[76]  Bo An,et al.  Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.