Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3398761.3398812acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Mechanism Design for Defense Coordination in Security Games

Published: 13 May 2020 Publication History

Abstract

Recent work studied Stackelberg security games with multiple defenders, in which heterogeneous defenders allocate security resources to protect a set of targets against a strategic attacker. Equilibrium analysis was conducted to characterize outcomes of these games when defenders act independently. Our starting point is the observation that the use of resources in equilibria may be inefficient due to lack of coordination. We explore the possibility of reducing this inefficiency by coordinating the defenders---specifically, by pooling the defenders' resources and allocating them jointly. The defenders' heterogeneous preferences then give rise to a collective decision-making problem, which calls for a mechanism to generate joint allocation strategies. We seek a mechanism that encourages coordination, produces efficiency gains, and incentivizes the defenders to report their true preferences and to execute the recommended strategies. Our results show that, unfortunately, even these basic properties clash with each other and no mechanism can achieve them simultaneously, which reveals the intrinsic difficulty of achieving meaningful defense coordination in security games. On the positive side, we put forward mechanisms that fulfill some of these properties and we identify special cases of our setting where more of these properties are compatible.

References

[1]
Stéphane Airiau, Haris Aziz, Ioannis Caragiannis, Justin Kruger, Jérôme Lang, and Dominik Peters. 2019. Portioning Using Ordinal Preferences: Fairness and Efficiency. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19). 11--17.
[2]
Bo An and Milind Tambe. 2017. Stackelberg Security Games (SSG) Basics and Application Overview. Cambridge University Press, 485--507.
[3]
Haris Aziz, Anna Bogomolnaia, and Hervé Moulin. 2019. Fair mixing: the case of dichotomous preferences. Proceedings of the 2019 ACM Conference on Economics and Computation. ACM, 753--781.
[4]
Nicola Basilico, Andrea Celli, Giuseppe De Nittis, and Nicola Gatti. 2017. Computing the team-maxmin equilibrium in single-team single-adversary team games. Intelligenza Artificiale, Vol. 11, 1 (2017), 67--79.
[5]
Anna Bogomolnaia, Hervé Moulin, and Richard Stong. 2005. Collective choice under dichotomous preferences. Journal of Economic Theory, Vol. 122, 2 (2005), 165--184.
[6]
Florian Brandl, Felix Brandt, Dominik Peters, Christian Stricker, and Warut Suksompong. 2020. Funding Public Projects: A Case for the Nash Product Rule. (2020). Working paper.
[7]
Matteo Castiglioni, Alberto Marchesi, and Nicola Gatti. 2019. Be a Leader or Become a Follower: The Strategy to Commit to with Multiple Leaders. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19). 123--129.
[8]
Francesco Maria Delle Fave, Albert Xin Jiang, Zhengyu Yin, Chao Zhang, Milind Tambe, Sarit Kraus, and John P Sullivan. 2014. Game-theoretic patrolling with dynamic execution uncertainty and a case study on a real transit system. Journal of Artificial Intelligence Research, Vol. 50 (2014), 321--367.
[9]
Conal Duddy. 2015. Fair sharing under dichotomous preferences. Mathematical Social Sciences, Vol. 73 (2015), 1--5.
[10]
Jiarui Gan, Edith Elkind, and Michael Wooldridge. 2018. Stackelberg Security Games with Multiple Uncoordinated Defenders. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS'18). 703--711.
[11]
Allan Gibbard. 1973. Manipulation of voting schemes: a general result. Econometrica, Vol. 41, 4 (1973), 587--601.
[12]
Albert Xin Jiang, Ariel D Procaccia, Yundi Qian, Nisarg Shah, and Milind Tambe. 2013. Defender (mis) coordination in security games. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13). 220--226.
[13]
Aron Laszka, Jian Lou, and Yevgeniy Vorobeychik. 2016. Multi-defender strategic filtering against spear-phishing attacks. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI'16). 537--543.
[14]
Jian Lou, Andrew M Smith, and Yevgeniy Vorobeychik. 2017. Multidefender Security Games. IEEE Intelligent Systems, Vol. 32, 1 (2017), 50--60.
[15]
Jian Lou and Yevgeniy Vorobeychik. 2015. Equilibrium analysis of multi-defender security games. In Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI'15). 596--602.
[16]
Jian Lou and Yevgeniy Vorobeychik. 2016. Decentralization and security in dynamic traffic light control. In Proceedings of the Symposium and Bootcamp on the Science of Security. 90--92.
[17]
Christos H Papadimitriou and Tim Roughgarden. 2008. Computing correlated equilibria in multi-player games. Journal of the ACM (JACM), Vol. 55, 3 (2008), 14.
[18]
Praveen Paruchuri, Jonathan P Pearce, Janusz Marecki, Milind Tambe, Fernando Ordonez, and Sarit Kraus. 2008. Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications. In AAAI. 1559--1562.
[19]
James Pita, Manish Jain, Milind Tambe, Fernando Ordó nez, and Sarit Kraus. 2010. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition. Artificial Intelligence, Vol. 174, 15 (2010), 1142--1171.
[20]
Mark Allen Satterthwaite. 1975. Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions. Journal of economic theory, Vol. 10, 2 (1975), 187--217.
[21]
Andrew Smith, Yevgeniy Vorobeychik, and Joshua Letchford. 2014. Multi-Defender security games on networks. ACM SIGMETRICS Performance Evaluation Review, Vol. 41, 4 (2014), 4--7.
[22]
Milind Tambe. 2011. Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press.

Cited By

View all
  • (2024)PositionProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3694574(60527-60540)Online publication date: 21-Jul-2024
  • (2024)Multi-sender persuasionProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3692832(18944-18971)Online publication date: 21-Jul-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AAMAS '20: Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems
May 2020
2289 pages
ISBN:9781450375184

Sponsors

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 13 May 2020

Check for updates

Author Tags

  1. coordination
  2. mechanism design
  3. stackelberg security games

Qualifiers

  • Research-article

Funding Sources

  • European Research Council (ERC)

Conference

AAMAS '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)PositionProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3694574(60527-60540)Online publication date: 21-Jul-2024
  • (2024)Multi-sender persuasionProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3692832(18944-18971)Online publication date: 21-Jul-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media