Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2936924.2936951acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article
Public Access

Coalitional Security Games

Published: 09 May 2016 Publication History

Abstract

Game theoretic models of security, and associated computational methods, have emerged as critical components of security posture across a broad array of domains, including airport security and coast guard. These approaches consider terrorists as motivated but independent entities. There is, however, increasing evidence that attackers, be it terrorists or cyber attackers, communicate extensively and form coalitions that can dramatically increase their ability to achieve malicious goals. To date, such cooperative decision making among attackers has been ignored in the security games literature. To address the issue of cooperation among attackers, we introduce a novel coalitional security game (CSG)) model. A CSG consists of a set of attackers connected by a (communication or trust) network who can form coalitions as connected subgraphs of this network so as to attack a collection of targets. A defender in a CSG can delete a set of edges, incurring a cost for deleting each edge, with the goal of optimally limiting the attackers' ability to form effective coalitions (in terms of successfully attacking high value targets). We first show that a CSG is, in general, hard to approximate. Nevertheless, we develop a novel branch and price algorithm, leveraging a combination of column generation, relaxation, greedy approximation, and stabilization methods to enable scalable high-quality approximations of CSG solutions on realistic problem instances.

References

[1]
V. Asal and R. K. Rethemeyer. The nature of the beast: Terrorist organizational characteristics and organizational lethality. Journal of Politics, 70(2):437--449, 2008.
[2]
Y. Bachrach and J. S. Rosenschein. Coalitional skill games. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 1023--1030, 2008.
[3]
A.-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509--512, 1999.
[4]
J. Bennett. Israeli killed as his commandos demolish west bank house. The New York Times, 2002.
[5]
D. Bertsimas and J. N. Tsitsiklis. Introduction to Linear Optimization. Athena Scientific, 1997.
[6]
G. W. Bush. National strategy for combating terrorism. Wordclay, 2009.
[7]
G. Chalkiadakis, E. Elkind, and M. Wooldridge. Computational aspects of cooperative game theory. Synthesis Lectures on Artificial Intelligence and Machine Learning, 5(6):1--168, 2011.
[8]
E. Dahlhaus, D. S. Johnson, C. H. Papadimitriou, P. D. Seymour, and M. Yannakakis. The complexity of multiterminal cuts. The SIAM Journal on Computing, 23(4):864--894, 1994.
[9]
P. Erdös and A. Rényi. On random graphs I. Publ. Math. Debrecen, 6:290--297, 1959.
[10]
J. Gan, B. An, and Y. Vorobeychik. Security games with protection externalities. In Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI), pages 914--920, 2015.
[11]
M. Jain, B. An, and M. Tambe. An overview of recent application trends at the aamas conference: Security, sustainability and safety. AI Magazine, 33(3):14, 2012.
[12]
P. Klerks. The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the netherlands. Connections, 24(3):53--65, 2001.
[13]
V. Krebs. Uncloaking terrorist networks. First Monday, 7(4), 2002.
[14]
K. A. Kronstadt. Terrorist attacks in Mumbai, India, and implications for US interests. Congressional Research Service, 2008.
[15]
J. Letchford and V. Conitzer. Solving security games on graphs via marginal probabilities. In Proceedings of the 27th AAAI Conference on Artificial Intelligence (AAAI), pages 591--597, 2013.
[16]
M. Levitt. Untangling the terror web: Identifying and counteracting the phenomenon of crossover between terrorist groups. SAIS Review, 24(1):33--48, 2004.
[17]
R. Lindelauf, H. Hamers, and B. Husslage. Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda. European Journal of Operational Research, 229(1):230--238, 2013.
[18]
T. P. Michalak, T. Rahwan, N. R. Jennings, P. L. Szczepański, O. Skibski, R. Narayanam, and M. J. Wooldridge. Computational analysis of connectivity games with applications to the investigation of terrorist networks. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI), pages 293--301, 2013.
[19]
A. Nekrassov. Chechen attack: 'terrorists get weapons from abroad, linked to mideast groups'. Russia Today, 2014.
[20]
C. Papadimitriou and M. Yannakakis. Optimization, approximation, and complexity classes. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing (ACM STOC), pages 229--234, 1988.
[21]
M. B. Peterson. Applications in Criminal Analysis: A Sourcebook. Greenwood Press Westport, 1994.
[22]
B. J. Phillips. How Terrorist Organizations Survive: Cooperation and Competition in Terrorist Group Networks. PhD thesis, University of Pittsburgh, 2012.
[23]
J. S. Pistole. Identifying, Tracking and Dismantling the Financial Structure of Terrorist Organizations. 2003.
[24]
C. L. Powell. Remarks to the United Nations Security Council, February 5, 2003.
[25]
D. Pritchard. An LP with integrality gap 1 ε for multidimensional knapsack. arXiv preprint arXiv:1005.3324, 2010.
[26]
L. Rousseau, M. Gendreau, and D. Feillet. Interior point stabilization for column generation. Operations Research Letters, 35(5):660--668, 2007.
[27]
T. Shanker and E. Schmitt. Three terrorist groups in Africa pose threat to US, American commander says. The New York Times, 2011.
[28]
S. Shen, J. C. Smith, and R. Goli. Exact interdiction models and algorithms for disconnecting networks via node deletions. Discrete Optimization, 9(3):172--188, 2012.
[29]
M. K. Sparrow. The application of network analysis to criminal intelligence: An assessment of the prospects. Social networks, 13(3):251--274, 1991.
[30]
M. Tambe. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, 2011.
[31]
Y. Vorobeychik, B. An, M. Tambe, and S. P. Singh. Computing solutions in infinite-horizon discounted adversarial patrolling games. In Proceedings of the 24th International Conference on Automated Planning and Scheduling (ICAPS), pages 314--322, 2014.
[32]
Z. Wang, Y. Yin, and B. An. Computing optimal monitoring strategy for detecting terrorist plots. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI), 2016.
[33]
Y. Yin, B. An, and M. Jain. Game-theoretic resource allocation for protecting large public events. In Proceedings of the 28th Conference on Artificial Intelligence (AAAI), pages 826--834, 2014.
[34]
Y. Yin, H. Xu, J. Gan, B. An, and A. X. Jiang. Computing optimal mixed strategies for security games with dynamic payoffs. In Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI), pages 681--688, 2015.
[35]
M. Zhao, B. An, and C. Kiekintveld. Optimizing personalized email filtering thresholds to mitigate sequential spear phishing attacks. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI), 2016.

Cited By

View all
  • (2019)Complexity and Approximations in Robust Coalition Formation via Max-Min k-PartitioningProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332002(2036-2038)Online publication date: 8-May-2019
  • (2019)The Rise and Fall of Complex Family StructuresProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331939(1847-1849)Online publication date: 8-May-2019
  • (2018)Stackelberg security gamesProceedings of the 27th International Joint Conference on Artificial Intelligence10.5555/3304652.3304789(5494-5501)Online publication date: 13-Jul-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '16: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems
May 2016
1580 pages
ISBN:9781450342391

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 09 May 2016

Check for updates

Author Tags

  1. game theory
  2. optimization
  3. security
  4. stackelberg games

Qualifiers

  • Research-article

Funding Sources

  • National Science Foundation
  • Office of Naval Research
  • Air Force Research Laboratory
  • National Research Foundation Singapore

Conference

AAMAS '16
Sponsor:

Acceptance Rates

AAMAS '16 Paper Acceptance Rate 137 of 550 submissions, 25%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)42
  • Downloads (Last 6 weeks)5
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Complexity and Approximations in Robust Coalition Formation via Max-Min k-PartitioningProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332002(2036-2038)Online publication date: 8-May-2019
  • (2019)The Rise and Fall of Complex Family StructuresProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331939(1847-1849)Online publication date: 8-May-2019
  • (2018)Stackelberg security gamesProceedings of the 27th International Joint Conference on Artificial Intelligence10.5555/3304652.3304789(5494-5501)Online publication date: 13-Jul-2018
  • (2018)Stackelberg Security Games with Multiple Uncoordinated DefendersProceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3237383.3237487(703-711)Online publication date: 9-Jul-2018
  • (2018)Defender Stackelberg Game with Inverse Geodesic Length as Utility MetricProceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3237383.3237486(694-702)Online publication date: 9-Jul-2018
  • (2017)Playing repeated network interdiction games with semi-bandit feedbackProceedings of the 26th International Joint Conference on Artificial Intelligence10.5555/3172077.3172404(3682-3690)Online publication date: 19-Aug-2017
  • (2017)Game theoretic analysis of security and sustainabilityProceedings of the 26th International Joint Conference on Artificial Intelligence10.5555/3171837.3172025(5111-5115)Online publication date: 19-Aug-2017
  • (2016)Optimal interdiction of illegal network flowProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence10.5555/3060832.3060972(2507-2513)Online publication date: 9-Jul-2016
  • (2016)Toward addressing collusion among human adversaries in security gamesProceedings of the Twenty-second European Conference on Artificial Intelligence10.3233/978-1-61499-672-9-1750(1750-1751)Online publication date: 29-Aug-2016
  • (2016)Divide to Defend7th International Conference on Decision and Game Theory for Security - Volume 999610.1007/978-3-319-47413-7_16(272-293)Online publication date: 2-Nov-2016

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media