Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3237383.3237487acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Stackelberg Security Games with Multiple Uncoordinated Defenders

Published: 09 July 2018 Publication History

Abstract

Stackelberg security games have received much attention in recent years. While most existing work focuses on single-defender settings, there are many real-world scenarios that involve multiple defenders (e.g., multi-national anti-crime actions in international waters, different security agencies patrolling the same area). In this paper, we consider security games with uncoordinated defenders who jointly protect a set of targets, but may have different valuations for these targets; each defender schedules their own resources and selfishly optimizes their own utility. We generalize the standard (single-defender) model of Stackelberg security games to this setting and formulate an equilibrium concept that captures the nature of strategic interaction among the players. We argue that an exact equilibrium may fail to exist, and, in fact, deciding whether it exists is NP-hard. However, under mild assumptions, every multi-defender security game admits an ε-equilibrium for every ε>0$, and the limit points corresponding to ε\to 0$ can be efficiently approximated.

References

[1]
Bo An . 2017. Game theoretic analysis of security and sustainability Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI'17). 5111--5115.
[2]
Nicola Basilico, Andrea Celli, Giuseppe De Nittis, and Nicola Gatti . 2017. Computing the team-maxmin equilibrium in single-team single-adversary team games. Intelligenza Artificiale Vol. 11, 1 (2017), 67--79.
[3]
Hau Chan, Michael Ceyko, and Luis E. Ortiz . 2012. Interdependent defense games: modeling interdependent security under deliberate attacks. In Proceedings of the 28th Conference on Uncertainty in Artificial Intelligence (UAI'12). 152--162.
[4]
Stefano Coniglio, Nicola Gatti, and Alberto Marchesi . 2017. Pessimistic leader-follower equilibria with multiple followers Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI'17). 171--177.
[5]
Vincent Conitzer and Tuomas Sandholm . 2006. Computing the optimal strategy to commit to. In Proceedings of the 7th ACM Conference on Electronic Commerce (ACM EC'06). 82--90.
[6]
Victor DeMiguel and Huifu Xu . 2009. A stochastic multiple-leader Stackelberg model: analysis, computation, and application. Operations Research, Vol. 57, 5 (2009), 1220--1235.
[7]
Qingyu Guo, Bo An, Yevgeniy Vorobeychik, Long Tran-Thanh, Jiarui Gan, and Chunyan Miao . 2016. Coalitional security games. In Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems (AAMAS'16). 159--167.
[8]
Albert Xin Jiang, Ariel D Procaccia, Yundi Qian, Nisarg Shah, and Milind Tambe . 2013. Defender (mis) coordination in security games. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13). 220--226.
[9]
Christopher Kiekintveld, Manish Jain, Jason Tsai, James Pita, Fernando Ordó nez, and Milind Tambe . 2009. Computing optimal randomized resource allocations for massive security games Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'09). 689--696.
[10]
Natalie Klein . 2017. Can International Litigation Solve the India-Sri Lanka Fishing Dispute? The Diplomat (July . 2017). Available at: http://thediplomat.com/2017/07/can-international-litigation-solve-the-india-sri-lanka-fishing-dispute/.
[11]
Ankur A Kulkarni and Uday V Shanbhag . 2014. A shared-constraint approach to multi-leader multi-follower games. Set-Valued and Variational Analysis Vol. 22, 4 (2014), 691--720.
[12]
Aron Laszka, Jian Lou, and Yevgeniy Vorobeychik . 2016. Multi-defender strategic filtering against spear-phishing attacks. Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI'16). 537--543.
[13]
George Leitmann . 1978. On generalized Stackelberg strategies. Journal of Optimization Theory and Applications, Vol. 26, 4 (1978), 637--643.
[14]
Sven Leyffer and Todd Munson . 2010. Solving multi-leader--common-follower games. Optimisation Methods & Software Vol. 25, 4 (2010), 601--623.
[15]
Jian Lou, Andrew M Smith, and Yevgeniy Vorobeychik . 2017. Multidefender Security Games. IEEE Intelligent Systems Vol. 32, 1 (2017), 50--60.
[16]
Jian Lou and Yevgeniy Vorobeychik . 2015. Equilibrium analysis of multi-defender security games Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI'15). 596--602.
[17]
Jian Lou and Yevgeniy Vorobeychik . 2016. Decentralization and security in dynamic traffic light control Proceedings of the Symposium and Bootcamp on the Science of Security. ACM, 90--92.
[18]
Praveen Paruchuri, Jonathan P. Pearce, Janusz Marecki, Milind Tambe, Fernando Ordó nez, and Sarit Kraus . 2008 a. Efficient algorithms to solve Bayesian Stackelberg games for security applications Proceedings of the 23rd AAAI Conference on Artificial Intelligence (AAAI'08). 1559--1562.
[19]
Praveen Paruchuri, Jonathan P Pearce, Janusz Marecki, Milind Tambe, Fernando Ordonez, and Sarit Kraus . 2008 b. Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08). 895--902.
[20]
Praveen Paruchuri, Jonathan P Pearce, Milind Tambe, Fernando Ordonez, and Sarit Kraus . 2007. An efficient heuristic approach for security against multiple adversaries Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'07). 311--318.
[21]
Hanif D. Sherali . 1984. A multiple leader stackelberg model and analysis. Operation Research, Vol. 32, 2 (1984), 390--404.
[22]
Ankur Sinha, Pekka Malo, Anton Frantsev, and Kalyanmoy Deb . 2014. Finding optimal strategies in a multi-period multi-leader-follower Stackelberg game using an evolutionary algorithm. Computers & Operation Research Vol. 41 (2014), 374--385.
[23]
Andrew Smith, Yevgeniy Vorobeychik, and Joshua Letchford . 2014. MultiDefender security games on networks. ACM SIGMETRICS Performance Evaluation Review, Vol. 41, 4 (2014), 4--7.
[24]
Bernhard von Stengel and Shmuel Zamir . 2004. Leadership with commitment to mixed strategies. (2004).
[25]
Milind Tambe . 2011. Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press.
[26]
The Economist . 2015. Malacca buccaneers. The Economist (Jun 27th 2015) (June . 2015). Available at: https://www.economist.com/news/asia/21656237-step-aside-somalia-south-east-asia-new-piracy-capital-world-malacca-buccaneers.
[27]
Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, and Milind Tambe . 2013. Bayesian security games for controlling contagion. Proceedings of the ASE/IEEE International Conference on Social Computing(SocialCom). IEEE, 33--38.
[28]
Zhen Wang, Yue Yin, and Bo An . 2016. Computing optimal monitoring strategy for detecting terrorist plots Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI'16). 637--643.

Cited By

View all
  • (2020)Mechanism Design for Defense Coordination in Security GamesProceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3398761.3398812(402-410)Online publication date: 5-May-2020
  • (2019)Be a leader or become a followerProceedings of the 28th International Joint Conference on Artificial Intelligence10.5555/3367032.3367051(123-129)Online publication date: 10-Aug-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems
July 2018
2312 pages

Sponsors

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 09 July 2018

Check for updates

Author Tags

  1. multiple defenders
  2. security games
  3. stackelberg games

Qualifiers

  • Research-article

Funding Sources

  • EPSRC International Doctoral Scholars Grant

Conference

AAMAS '18
Sponsor:
AAMAS '18: Autonomous Agents and MultiAgent Systems
July 10 - 15, 2018
Stockholm, Sweden

Acceptance Rates

AAMAS '18 Paper Acceptance Rate 149 of 607 submissions, 25%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Mechanism Design for Defense Coordination in Security GamesProceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3398761.3398812(402-410)Online publication date: 5-May-2020
  • (2019)Be a leader or become a followerProceedings of the 28th International Joint Conference on Artificial Intelligence10.5555/3367032.3367051(123-129)Online publication date: 10-Aug-2019

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media