Deceitful Attacks in Security Games

Given recent applications of defender-attacker Stackelberg Security Games in real-world domains such as wildlife protection, a majority of research has focused on addressing uncertainties regarding the attacker in these games based on the exploitation of attack data. However, there is an important challenge of deceitful attacks; the attacker can manipulate his attacks to mislead the defender, leading her to conduct ineffective patrolling strategies. In this work, we focus on addressing this challenge while providing the following main contributions. First, we introduce a new game model with uncertainty about the attacker type and repeated interactions between the players. In our game model, the defender attempts to collect attack data over time to learn about the attacker type while the attacker aims at playing deceitfully. Second, based on the new game model, we propose new gametheoretic algorithms to compute optimal strategies for both players. Third, we present preliminary experiment results to evaluate our proposed algorithms, showing that our defense solutions can effectively address deceitful attacks.

[1]  Milind Tambe,et al.  CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection , 2016, AAMAS.

[2]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[3]  J. Morgan,et al.  Cheap Talk , 2005 .

[4]  Ariel D. Procaccia,et al.  Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.

[5]  Maria-Florina Balcan,et al.  Commitment Without Regrets: Online Learning in Stackelberg Security Games , 2015, EC.

[6]  Yevgeniy Vorobeychik,et al.  Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.

[7]  Kenneth Hendricks,et al.  Feints , 2004 .

[8]  Branislav Bosanský,et al.  Comparing Strategic Secrecy and Stackelberg Commitment in Security Games , 2017, IJCAI.

[9]  Blaine Nelson,et al.  The security of machine learning , 2010, Machine Learning.

[10]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[11]  Blaine Nelson,et al.  Can machine learning be secure? , 2006, ASIACCS '06.

[12]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[13]  Milind Tambe,et al.  Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data , 2017, AAMAS.

[14]  Bo An,et al.  Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.

[15]  Tobias Scheffer,et al.  Static prediction games for adversarial learning problems , 2012, J. Mach. Learn. Res..

[16]  Christopher Meek,et al.  Adversarial learning , 2005, KDD '05.

[17]  Milind Tambe,et al.  Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test , 2017, ECML/PKDD.

[18]  Tobias Scheffer,et al.  Stackelberg games for adversarial prediction problems , 2011, KDD.

[19]  Haifeng Xu,et al.  Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.

[20]  Milind Tambe,et al.  Three Strategies to Success: Learning Adversary Models in Security Games , 2016, IJCAI.

[21]  V. Bier,et al.  Secrecy and Deception in Anti-Terrorism Resource Allocation and Policy Implication , 2008 .

[22]  Haifeng Xu,et al.  Information Disclosure as a Means to Security , 2015, AAMAS.