Mechanism Design for Defense Coordination in Security Games

Recent work studied Stackelberg security games with multiple defenders, in which heterogeneous defenders allocate security resources to protect a set of targets against a strategic attacker. Equilibrium analysis was conducted to characterize outcomes of these games when defenders act independently. Our starting point is the observation that the use of resources in equilibria may be inefficient due to lack of coordination. We explore the possibility of reducing this inefficiency by coordinating the defenders—specifically, by pooling the defenders’ resources and allocating them jointly. The defenders’ heterogeneous preferences then give rise to a collective decision-making problem, which calls for a mechanism to generate joint allocation strategies. We seek a mechanism that encourages coordination, produces efficiency gains, and incentivizes the defenders to report their true preferences and to execute the recommended strategies. Our results show that, unfortunately, even these basic properties clash with each other and no mechanism can achieve them simultaneously, which reveals the intrinsic difficulty of achieving meaningful defense coordination in security games. On the positive side, we put forward mechanisms that fulfill some of these properties and we identify special cases of our setting where more of these properties are compatible.

[1]  Ioannis Caragiannis,et al.  Portioning Using Ordinal Preferences: Fairness and Efficiency , 2019, IJCAI.

[2]  Haris Aziz,et al.  Fair Mixing: the Case of Dichotomous Preferences , 2017, EC.

[3]  Yevgeniy Vorobeychik,et al.  Decentralization and security in dynamic traffic light control , 2016, HotSoS.

[4]  Sarit Kraus,et al.  Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..

[5]  M. Satterthwaite Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .

[6]  Milind Tambe,et al.  Defender (Mis)coordination in Security Games , 2013, IJCAI.

[7]  Yevgeniy Vorobeychik,et al.  Multidefender Security Games , 2015, IEEE Intelligent Systems.

[8]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[9]  Nicola Gatti,et al.  Be a Leader or Become a Follower: The Strategy to Commit to with Multiple Leaders (Extended Version) , 2019, IJCAI.

[10]  A. Gibbard Manipulation of Voting Schemes: A General Result , 1973 .

[11]  Yevgeniy Vorobeychik,et al.  Equilibrium Analysis of Multi-Defender Security Games , 2015, IJCAI.

[12]  Michael Wooldridge,et al.  Stackelberg Security Games with Multiple Uncoordinated Defenders , 2018, AAMAS.

[13]  Richard Stong,et al.  Collective choice under dichotomous preferences , 2005, J. Econ. Theory.

[14]  Yevgeniy Vorobeychik,et al.  MultiDefender security games on networks , 2014, PERV.

[15]  Yevgeniy Vorobeychik,et al.  Multi-Defender Strategic Filtering Against Spear-Phishing Attacks , 2016, AAAI.

[16]  Sarit Kraus,et al.  Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications , 2008, AAAI.

[17]  Milind Tambe,et al.  Stackelberg Security Games ( SSG ) Basics and Application Overview , 2018 .

[18]  Dominik Peters,et al.  Funding Public Projects: A Case for the Nash Product Rule , 2020, WINE.

[19]  Christos H. Papadimitriou,et al.  Computing correlated equilibria in multi-player games , 2005, STOC '05.

[20]  Conal Duddy,et al.  Fair sharing under dichotomous preferences , 2015, Math. Soc. Sci..

[21]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[22]  Nicola Basilico,et al.  Computing the Team-maxmin Equilibrium in Single-Team Single-Adversary Team Games , 2017, Intelligenza Artificiale.