Abstract
The goal of this chapter is to introduce a challenging real-world problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: our goal is not only to introduce the problem, but also to provide exemplars of initial successes of deployed systems in this problem arena. Furthermore, we present key ideas and algorithms for solving and understanding the characteristics large-scale real-world security games, and then present some key open research challenges in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The deployed application of Protect uses a quantal response model whereas the multiple attacker branch-and-price algorithm computes SSE as originally defined [41]. Here, by the Protect domain, we refer to the security domain where defender has to execute patrols that are bounded by their tour length.
References
Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., Parachuri, P.: Deployed ARMOR protection: The Application of a Game-Theoretic Model for Security at the Los Angeles International Airport. In: Proc. of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2008) 125–132
Tsai, J., Rathi, S., Kiekintveld, C., Ordonez, F., Tambe, M.: IRIS: a Tool for Strategic Security Allocation in Transportation Networks. In: Proc. of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2009) 37–44
An, B., Pita, J., Shieh, E., Tambe, M., Kiekintveld, C., Marecki, J.: GUARDS and PROTECT: Next Generation Applications of Security Games. SIGECOM 10 (March 2011) 31–34
Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)
Pita, J., Tambe, M., Kiekintveld, C., Cullen, S., Steigerwald, E.: GUARDS - Game Theoretic Security Allocation on a National Scale. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)
Yin, Z., Jiang, A., Johnson, M., Tambe, M., Kiekintveld, C., Leyton-Brown, K., Sandholm, T., Sullivan, J.: TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems. In: Proc. of The 24th Conference on Innovative Applications of Artificial Intelligence (IAAI). (2012)
von Stackelberg, H.: Marktform und Gleichgewicht. Springer, Vienna (1934)
Gatti, N.: Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form. In: ECAI-08. (2008) 403–407
Lye, K., Wing, J.M.: Game Strategies in Network Security. International Journal of Information Security 4(1–2) (2005) 71–86
Brown, G., Carlyle, M., Kline, J., Wood, K.: A Two-Sided Optimization for Theater Ballistic Missile Defense. In: Operations Research. Volume 53. (2005) 263–275
Sandler, T., M., D.G.A.: Terrorism and Game Theory. Simulation and Gaming 34(3) (2003) 319–337
Avenhaus, R., von Stengel, B., Zamir, S.: Inspection Games. In Aumann, R.J., Hart, S., eds.: Handbook of Game Theory. Volume 3. North-Holland, Amsterdam (2002) 1947–1987
Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing Games with Security: An Efficient Exact Algorithm for Bayesian Stackelberg Games. In: Proc. of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2008) 895–902
Conitzer, V., Sandholm, T.: Computing the Optimal Strategy to Commit to. In: Proc. of the ACM Conference on Electronic Commerce (ACM-EC). (2006) 82–90
Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending Critical Infrastructure. In: Interfaces. Volume 36. (2006) 530 – 544
Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Tambe, M., Ordonez, F.: Computing Optimal Randomized Resource Allocations for Massive Security Games. In: Proc. of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2009) 689–696
Jain, M., Kiekintveld, C., Tambe, M.: Quality-Bounded Solutions for Finite Bayesian Stackelberg Games: Scaling Up. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)
Leitmann, G.: On Generalized Stackelberg Strategies. Optimization Theory and Applications 26(4) (1978) 637–643
Breton, M., Alg, A., Haurie, A.: Sequential stackelberg equilibria in two-person games. Optimization Theory and Applications 59(1) (1988) 71–97
von Stengel, B., Zamir, S.: Leadership with Commitment to Mixed Strategies. Technical Report LSE-CDAM-2004-01, CDAM Research Report (2004)
Osbourne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press (1994)
Jain, M., Tsai, J., Pita, J., Kiekintveld, C., Rathi, S., Tambe, M., Ordonez, F.: Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service. Interfaces 40 (2010) 267–290
Jain, M., Kardes, E., Kiekintveld, C., Ordonez, F., Tambe, M.: Security Games with Arbitrary Schedules: A Branch and Price Approach. In: Proc. of The 24th AAAI Conference on Artificial Intelligence. (2010) 792–797
McKelvey, R.D., Palfrey, T.R.: Quantal Response Equilibria for Normal Form Games. Games and Economic Behavior 10(1) (1995) 6–38
TSA: Layers of Security: What We Do. http://www.tsa.gov/what_we_do/layers/index.shtm (2011)
TSA: Transportation Security Administration — U.S. Department of Homeland Security. http://www.tsa.gov/ (2011)
Hamilton, B.A.: Faregating Analysis. Report Commissioned by the LA Metro. http://boardarchives.metro.net/Items/2007/11_November/20071115EMACItem27.pdf (2007)
Jiang, A.X., Yin, Z., Kietkintveld, C., Leyton-Brown, K., Sandholm, T., Tambe, M.: Towards Optimal Patrol Strategies for Urban Security in Transit Systems. In: Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health. (2012)
Chandran, R., Beitchman, G.: Battle for Mumbai Ends, Death Toll Rises to 195. Times of India (29 November 2008) http://articles.timesofindia.indiatimes.com/2008-11-29/india/27930171_1_taj-hotel-three-terrorists-nariman-house.
Johnson, M., Fang, F., Yang, R., Tambe, M., Albers, H.: Patrolling to Maximize Pristine Forest Area. In: Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health. (2012)
Ordonez, F., Tambe, M., Jara, J.F., Jain, M., Kiekintveld, C., Tsai, J.: Deployed Security Games for Patrol Planning. In: Handbook on Operations Research for Homeland Security. (2008)
Trusov, M., Bucklin, R.E., Pauwels, K.: Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site. Journal of Marketing 73 (2009)
Howard, N.J.: Finding Optimal Strategies for Influencing Social Networks in Two Player Games. Master’s thesis, MIT, Sloan School of Management (2011)
Alpcan, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press (2010)
Vanek, O., Yin, Z., Jain, M., Bosansky, B., Tambe, M., Pechoucek, M.: Game-Theoretic Resource Allocation for Malicious Packet Detection in Computer Networks. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)
Jain, M., Korzhyk, D., Vanek, O., Pechoucek, M., Conitzer, V., Tambe, M.: A Double Oracle Algorithm for Zero-Sum SEcurity games on Graphs. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)
Keteyian, A.: TSA: Federal Air Marshals. (2010) http://www.cbsnews.com/stories/2010/02/01/earlyshow/main6162291.shtml, retrieved Feb 1, 2011.
Bertsimas, D., Tsitsiklis, J.N.: Introduction to Linear Optimization. Athena Scientific (1994)
Yin, Z., Korzhyk, D., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. In: AAMAS. (2010) 1139–1146
Letchford, J., Conitzer, V., Munagala, K.: Learning and Approximating the Optimal Strategy to Commit To. In: Second International Symposium on Algorithmic Game Theory (SAGT). (2009) 250–262
Jain, M., Leyton-Brown, K., Tambe, M.: The Deployment-to-Saturation Ratio in Security Games. In: Proc. of The 26th AAAI Conference on Artificial Intelligence (AAAI). (2012)
Pita, J., Jain, M., Tambe, M., Ordóñez, F., Kraus, S.: Robust Solutions to Stackelberg Games: Addressing Bounded Rationality and Limited Observations in Human Cognition. Artificial Intelligence 174(15) (2010) 1142–1171
Cheeseman, P., Kanefsky, B., Taylor, W.M.: Where the Really Hard Problems are. In: Proceedings of the International Joint Conference on Artificial Intelligence. (1991) 331–337
Mitchell, D., Selman, B., Levesque, H.: Hard and Easy Distributions of SAT Problems. In: Proceedings of the American Association for Artificial Intelligence. (1992) 459–465
Kiekintveld, C., Marecki, J., Tambe, M.: Approximation Methods for Infinite Bayesian Stackelberg Games: Modeling Distributional Uncertainty. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)
Yin, Z., Jain, M., Tambe, M., Ordonez, F.: Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty. In: Proc. of The 25th AAAI Conference on Artificial Intelligence (AAAI). (2011) 758–763
An, B., Tambe, M., Ordonez, F., Shieh, E., Kiekintveld, C.: Refinement of Strong Stackelberg Equilibria in Security Games. In: Proc. of the 25th Conference on Artificial Intelligence. (2011) 587–593
Kahneman, D., Tvesky, A.: Prospect Theory: An Analysis of Decision Under Risk. Econometrica 47(2) (1979) 263–291
Yang, R., Kiekintveld, C., Ordonez, F., Tambe, M., John, R.: Improving Resource Allocation Strategy Against Human Adversaries in Security Games. In: IJCAI. (2011)
An, B., Jain, M., Tambe, M., Kiekintveld, C.: Mixed-Initiative Optimization in Security Games: A Preliminary Report. In: Proc. of the AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration. (2011) 8–11
Brown, M., An, B., Kiekintveld, C., Ordonez, F., Tambe, M.: Multi-objective optimization for security games. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)
Taylor, M.E., Kiekintveld, C., Western, C., Tambe, M.: A Framework For Evaluating Deployed Security Systems: Is There a Chink in your ARMOR? Informatica 34 (2010) 129–139
Acknowledgements
This research is supported by MURI grant W911NF-11-1-0332, ONR grant N00014-08-1-0733 and by the United States Department of Homeland Security through the Center for Risk and Economic Analysis of Terrorism Events (CREATE) under grant number 2010-ST-061-RE0001. All opinions, findings, conclusions and recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Jain, M., An, B., Tambe, M. (2013). Security Games Applied to Real-World: Research Contributions and Challenges. In: Jajodia, S., Ghosh, A., Subrahmanian, V., Swarup, V., Wang, C., Wang, X. (eds) Moving Target Defense II. Advances in Information Security, vol 100. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5416-8_2
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5416-8_2
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5415-1
Online ISBN: 978-1-4614-5416-8
eBook Packages: Computer ScienceComputer Science (R0)