Facing Multiple Attacks in Adversarial Patrolling Games with Alarmed Targets

We focus on adversarial patrolling games on arbitrary graphs, where the Defender can control a mobile resource, the targets are alarmed by an alarm system, and the Attacker can observe the actions of the mobile resource of the Defender and perform different attacks exploiting multiple resources. This scenario can be modeled as a zero-sum extensive-form game in which each player can play multiple times. The game tree is exponentially large both in the size of the graph and in the number of attacking resources. We show that when the number of the Attacker's resources is free, the problem of computing the equilibrium path is NP-hard, while when the number of resources is fixed, the equilibrium path can be computed in poly-time. We provide a dynamic-programming algorithm that, given the number of the Attacker's resources, computes the equilibrium path requiring poly-time in the size of the graph and exponential time in the number of the resources. Furthermore, since in real-world scenarios it is implausible that the Defender knows the number of attacking resources, we study the robustness of the Defender's strategy when she makes a wrong guess about that number. We show that even the error of just a single resource can lead to an arbitrary inefficiency, when the inefficiency is defined as the ratio of the Defender's utilities obtained with a wrong guess and a correct guess. However, a more suitable definition of inefficiency is given by the difference of the Defender's utilities: this way, we observe that the higher the error in the estimation, the higher the loss for the Defender. Then, we investigate the performance of online algorithms when no information about the Attacker's resources is available. Finally, we resort to randomized online algorithms showing that we can obtain a competitive factor that is twice better than the one that can be achieved by any deterministic online algorithm.

[1]  Nicholas R. Jennings,et al.  Optimal Escape Interdiction on Transportation Networks , 2017, IJCAI.

[2]  Nicola Basilico,et al.  Capturing augmented sensing capabilities and intrusion delay in patrolling-intrusion games , 2009, 2009 IEEE Symposium on Computational Intelligence and Games.

[3]  Nicola Basilico,et al.  Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder , 2012, Artif. Intell..

[4]  Steve Alpern,et al.  Patrolling a Border , 2016, Oper. Res..

[5]  Gerhard J. Woeginger,et al.  Developments from a June 1996 seminar on Online algorithms: the state of the art , 1998 .

[6]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[7]  Milind Tambe,et al.  Divide to Defend: Collusive Security Games , 2016, GameSec.

[8]  Branislav Bosanský,et al.  Optimal Network Security Hardening Using Attack Graph Games , 2015, IJCAI.

[9]  Branislav Bosanský,et al.  Approximate Solutions for Attack Graph Games with Imperfect Information , 2015, GameSec.

[10]  Nicola Basilico,et al.  Coordinating Multiple Defensive Resources in Patrolling Games with Alarm Systems , 2017, AAMAS.

[11]  Stefano Carpin,et al.  USARSim: a robot simulator for research and education , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.

[12]  Bo An,et al.  Security Games on a Plane , 2017, AAAI.

[13]  Krishnendu Chatterjee,et al.  A survey of stochastic ω-regular games , 2012, J. Comput. Syst. Sci..

[14]  Nicola Basilico,et al.  Moving game theoretical patrolling strategies from theory to practice: An USARSim simulation , 2010, 2010 IEEE International Conference on Robotics and Automation.

[15]  Noa Agmon On events in multi-robot patrol in adversarial environments , 2010, AAMAS.

[16]  Bo An,et al.  Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks , 2016, AAAI.

[17]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[18]  Bo An,et al.  Efficient Resource Allocation for Protecting Coral Reef Ecosystems , 2016, IJCAI.

[19]  Manish Jain,et al.  Efficiently Solving Joint Activity Based Security Games , 2013, IJCAI.

[20]  Nicola Basilico,et al.  A Security Game Combining Patrolling and Alarm-Triggered Responses Under Spatial and Detection Uncertainties , 2016, AAAI.

[21]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[22]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[23]  Nicola Basilico,et al.  Finding the optimal strategies for robotic patrolling with adversaries in topologically-represented environments , 2009, 2009 IEEE International Conference on Robotics and Automation.

[24]  Sarit Kraus,et al.  Multi-robot adversarial patrolling: facing coordinated attacks , 2014, AAMAS.

[25]  Sarit Kraus,et al.  Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..

[26]  William H. Ruckle,et al.  Ambushing Random Walks I: Finite Models , 1976, Oper. Res..

[27]  Milind Tambe,et al.  Get Me to My GATE on Time: Efficiently Solving General-Sum Bayesian Threat Screening Games , 2016, ECAI.

[28]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[29]  Micah Adler,et al.  Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.

[30]  Nicola Basilico,et al.  Adversarial patrolling with spatially uncertain alarm signals , 2015, Artif. Intell..

[31]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[32]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[33]  Nicola Basilico,et al.  Automated Abstractions for Patrolling Security Games , 2011, AAAI.

[34]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[35]  Bo An,et al.  Stop Nuclear Smuggling Through Efficient Container Inspection , 2017, AAMAS.

[36]  Bo An,et al.  PROTECT - A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard , 2012, AI Mag..

[37]  Nicola Basilico,et al.  Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.

[38]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[39]  Christine Julien,et al.  On coordination in practical multi-robot patrol , 2012, 2012 IEEE International Conference on Robotics and Automation.

[40]  Milind Tambe,et al.  Trends and Applications in Stackelberg Security Games , 2018 .

[41]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[42]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[43]  Nicholas R. Jennings,et al.  Introducing Alarms in Adversarial Patrolling Games , 2013 .

[44]  Sarit Kraus,et al.  Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..

[45]  Bo An,et al.  Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.

[46]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[47]  S. Alpern Infiltration games on arbitrary graphs , 1992 .

[48]  Mina Guirguis,et al.  Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts , 2017, IJCAI.

[49]  Bo An,et al.  Security Games with Protection Externalities , 2015, AAAI.

[50]  Milind Tambe,et al.  CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection , 2016, AAMAS.

[51]  Milind Tambe,et al.  NECTAR : Game-Theoretic Factory Inspection Scheduling and Explanation for Toxic Wastewater Abatement ∗ , 2016 .

[52]  M. M. Flood THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .

[53]  P. Hudson Search Games , 1982 .

[54]  Milind Tambe,et al.  One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats , 2016, AAAI.