Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2484920.2484957acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Security scheduling for real-world networks

Published: 06 May 2013 Publication History

Abstract

Network based security games, where a defender strategically places security measures on the edges of a graph to protect against an adversary, who chooses a path through a graph is an important research problem with potential for real-world impact. For example, police forces face the problem of placing checkpoints on roads to inspect vehicular traffic in their day-to-day operations, a security measure the Mumbai police have performed since the terrorist attacks in 2008. Algorithms for solving such network-based security problems have been proposed in the literature, but none of them scale up to solving problems of the size of real-world networks.
In this paper, we present Snares, a novel algorithm that computes optimal solutions for both the defender and the attacker in such network security problems. Based on a double-oracle framework, Snares makes novel use of two approaches: warm starts and greedy responses. It makes the following contributions: (1) It defines and uses mincut-fanout, a novel method for efficient warm-starting of the computation; (2) It exploits the sub-modularity property of the defender optimization in a greedy heuristic, which is used to generate "better-responses"; Snares} also uses a better-response computation for the attacker. Furthermore, we evaluate the performance of Snares in real-world networks illustrating a significant advance: whereas state-of-the-art algorithms could handle just the southern tip of Mumbai, {\sc Snares} can compute optimal strategy for the entire urban road network of Mumbai.

References

[1]
S. Alpern. Infiltration Games on Arbitrary Graphs. Journal of Mathematical Analysis and Applications, 163:286--288, 1992.
[2]
D. Eppstein and M. T. Goodrich. Studying (Non-Planar) Road Networks Through an Algorithmic Lens. CoRR, abs/0808.3694, 2008.
[3]
S. Gal. Search Games. Academic Press, New York, 1980.
[4]
M. Haklay and P. Weber. Openstreetmap:user-generated street maps. Pervasive Computing, IEEE, 7(4):12--18, 2008.
[5]
E. Halvorson, V. Conitzer, and R. Parr. Multi-step Multi-sensor Hider-Seeker Games. In IJCAI, pages 159--166, 2009.
[6]
M. Jain, D. Korzhyk, O. Vanek, V. Conitzer, M. Pechoucek, and M. Tambe. A Double Oracle Algorithm for Zero-Sum Security Games on Graphs. In AAMAS, 2011.
[7]
M. Jain, K. Leyton-Brown, and M. Tambe. The Deployment-to-Saturation Ratio in Security Games. In AAAI, 2012.
[8]
H. B. McMahan, G. J. Gordon, and A. Blum. Planning in the Presence of Cost Functions Controlled by an Adversary. In ICML, pages 536--543, 2003.
[9]
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An Analysis of Approximations for Maximizing Submodular Set Functions-I. Mathematical Programming, 14(1):265--294, Dec 1978.
[10]
S. Okamoto, N. Hazon, and K. Sycara. Solving non-zero sum multiagent network flow security games with attack costs. In AAMAS, pages 879-888, 2012.
[11]
E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, and G. Meyer. Protect: A Deployed Game Theoretic System to Protect the Ports of the United States. In AAMAS, 2012.
[12]
J. Tsai, Z. Yin, J. young Kwak, D. Kempe, C. Kiekintveld, and M. Tambe. Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains. In AAAI, pages 881--886, 2010.
[13]
O. Vanek, Z. Yin, M. Jain, B. Bosansky, M. Tambe, and M. Pechoucek. Game-theoretic resource allocation for malicious packet detection in computer networks. In AAMAS, 2012.
[14]
A. Washburn and K. Wood. Two-person Zero-sum Games for Network Interdiction. Operations Research, 43(2):243--251, 1995
[15]
R. Yang, F. Fang, A. X. Jiang, K. Rajagopal, M. Tambe, and R. Maheswaran. Designing Better Strategies against Human Adversaries in Network Security Games. In AAMAS (Extended Abstract), 2012.
[16]
Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. Stackelberg vs. Nash in Security Games: Interchangeability, Equivalence, and Uniqueness. In AAMAS, pages 1139--1146, 2010.

Cited By

View all
  • (2018)Defender Stackelberg Game with Inverse Geodesic Length as Utility MetricProceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3237383.3237486(694-702)Online publication date: 9-Jul-2018
  • (2018)A double oracle algorithm for allocating resources on nodes in graph-based security gamesMultimedia Tools and Applications10.1007/s11042-018-5750-x77:9(10961-10977)Online publication date: 1-May-2018
  • (2018)Safe navigation in adversarial environmentsAnnals of Mathematics and Artificial Intelligence10.1007/s10472-018-9591-083:2(121-164)Online publication date: 1-Jun-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '13: Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
May 2013
1500 pages
ISBN:9781450319935

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 06 May 2013

Check for updates

Author Tags

  1. double oracle
  2. game theory
  3. minimax
  4. zero-sum games

Qualifiers

  • Research-article

Conference

AAMAS '13
Sponsor:

Acceptance Rates

AAMAS '13 Paper Acceptance Rate 140 of 599 submissions, 23%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Defender Stackelberg Game with Inverse Geodesic Length as Utility MetricProceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3237383.3237486(694-702)Online publication date: 9-Jul-2018
  • (2018)A double oracle algorithm for allocating resources on nodes in graph-based security gamesMultimedia Tools and Applications10.1007/s11042-018-5750-x77:9(10961-10977)Online publication date: 1-May-2018
  • (2018)Safe navigation in adversarial environmentsAnnals of Mathematics and Artificial Intelligence10.1007/s10472-018-9591-083:2(121-164)Online publication date: 1-Jun-2018
  • (2017)Security games on a planeProceedings of the Thirty-First AAAI Conference on Artificial Intelligence10.5555/3298239.3298318(530-536)Online publication date: 4-Feb-2017
  • (2017)Optimal escape interdiction on transportation networksProceedings of the 26th International Joint Conference on Artificial Intelligence10.5555/3172077.3172439(3936-3944)Online publication date: 19-Aug-2017
  • (2017)Heterogeneous surface-to-air missile defense battery locationJournal of Heuristics10.5555/3158434.315843823:6(417-447)Online publication date: 1-Dec-2017
  • (2017)Fare Evasion in Transit NetworksOperations Research10.1287/opre.2016.156065:1(165-183)Online publication date: 1-Feb-2017
  • (2016)Optimal interdiction of illegal network flowProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence10.5555/3060832.3060972(2507-2513)Online publication date: 9-Jul-2016
  • (2016)Optimally protecting electionsProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence10.5555/3060621.3060697(538-545)Online publication date: 9-Jul-2016
  • (2016)Efficient resource allocation for protecting coral reef ecosystemsProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence10.5555/3060621.3060696(531-537)Online publication date: 9-Jul-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media