Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Security Games Applied to Real-World: Research Contributions and Challenges

  • Conference paper
  • First Online:
Moving Target Defense II

Part of the book series: Advances in Information Security ((ADIS,volume 100))

Abstract

The goal of this chapter is to introduce a challenging real-world problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: our goal is not only to introduce the problem, but also to provide exemplars of initial successes of deployed systems in this problem arena. Furthermore, we present key ideas and algorithms for solving and understanding the characteristics large-scale real-world security games, and then present some key open research challenges in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The deployed application of Protect uses a quantal response model whereas the multiple attacker branch-and-price algorithm computes SSE as originally defined [41]. Here, by the Protect domain, we refer to the security domain where defender has to execute patrols that are bounded by their tour length.

References

  1. Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., Parachuri, P.: Deployed ARMOR protection: The Application of a Game-Theoretic Model for Security at the Los Angeles International Airport. In: Proc. of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2008) 125–132

    Google Scholar 

  2. Tsai, J., Rathi, S., Kiekintveld, C., Ordonez, F., Tambe, M.: IRIS: a Tool for Strategic Security Allocation in Transportation Networks. In: Proc. of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2009) 37–44

    Google Scholar 

  3. An, B., Pita, J., Shieh, E., Tambe, M., Kiekintveld, C., Marecki, J.: GUARDS and PROTECT: Next Generation Applications of Security Games. SIGECOM 10 (March 2011) 31–34

    Google Scholar 

  4. Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)

    Google Scholar 

  5. Pita, J., Tambe, M., Kiekintveld, C., Cullen, S., Steigerwald, E.: GUARDS - Game Theoretic Security Allocation on a National Scale. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)

    Google Scholar 

  6. Yin, Z., Jiang, A., Johnson, M., Tambe, M., Kiekintveld, C., Leyton-Brown, K., Sandholm, T., Sullivan, J.: TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems. In: Proc. of The 24th Conference on Innovative Applications of Artificial Intelligence (IAAI). (2012)

    Google Scholar 

  7. von Stackelberg, H.: Marktform und Gleichgewicht. Springer, Vienna (1934)

    Google Scholar 

  8. Gatti, N.: Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form. In: ECAI-08. (2008) 403–407

    Google Scholar 

  9. Lye, K., Wing, J.M.: Game Strategies in Network Security. International Journal of Information Security 4(1–2) (2005) 71–86

    Google Scholar 

  10. Brown, G., Carlyle, M., Kline, J., Wood, K.: A Two-Sided Optimization for Theater Ballistic Missile Defense. In: Operations Research. Volume 53. (2005) 263–275

    Google Scholar 

  11. Sandler, T., M., D.G.A.: Terrorism and Game Theory. Simulation and Gaming 34(3) (2003) 319–337

    Google Scholar 

  12. Avenhaus, R., von Stengel, B., Zamir, S.: Inspection Games. In Aumann, R.J., Hart, S., eds.: Handbook of Game Theory. Volume 3. North-Holland, Amsterdam (2002) 1947–1987

    Google Scholar 

  13. Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing Games with Security: An Efficient Exact Algorithm for Bayesian Stackelberg Games. In: Proc. of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2008) 895–902

    Google Scholar 

  14. Conitzer, V., Sandholm, T.: Computing the Optimal Strategy to Commit to. In: Proc. of the ACM Conference on Electronic Commerce (ACM-EC). (2006) 82–90

    Google Scholar 

  15. Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending Critical Infrastructure. In: Interfaces. Volume 36. (2006) 530 – 544

    Google Scholar 

  16. Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Tambe, M., Ordonez, F.: Computing Optimal Randomized Resource Allocations for Massive Security Games. In: Proc. of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2009) 689–696

    Google Scholar 

  17. Jain, M., Kiekintveld, C., Tambe, M.: Quality-Bounded Solutions for Finite Bayesian Stackelberg Games: Scaling Up. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)

    Google Scholar 

  18. Leitmann, G.: On Generalized Stackelberg Strategies. Optimization Theory and Applications 26(4) (1978) 637–643

    Google Scholar 

  19. Breton, M., Alg, A., Haurie, A.: Sequential stackelberg equilibria in two-person games. Optimization Theory and Applications 59(1) (1988) 71–97

    Google Scholar 

  20. von Stengel, B., Zamir, S.: Leadership with Commitment to Mixed Strategies. Technical Report LSE-CDAM-2004-01, CDAM Research Report (2004)

    Google Scholar 

  21. Osbourne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press (1994)

    Google Scholar 

  22. Jain, M., Tsai, J., Pita, J., Kiekintveld, C., Rathi, S., Tambe, M., Ordonez, F.: Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service. Interfaces 40 (2010) 267–290

    Google Scholar 

  23. Jain, M., Kardes, E., Kiekintveld, C., Ordonez, F., Tambe, M.: Security Games with Arbitrary Schedules: A Branch and Price Approach. In: Proc. of The 24th AAAI Conference on Artificial Intelligence. (2010) 792–797

    Google Scholar 

  24. McKelvey, R.D., Palfrey, T.R.: Quantal Response Equilibria for Normal Form Games. Games and Economic Behavior 10(1) (1995) 6–38

    Google Scholar 

  25. TSA: Layers of Security: What We Do. http://www.tsa.gov/what_we_do/layers/index.shtm (2011)

  26. TSA: Transportation Security Administration — U.S. Department of Homeland Security. http://www.tsa.gov/ (2011)

  27. Hamilton, B.A.: Faregating Analysis. Report Commissioned by the LA Metro. http://boardarchives.metro.net/Items/2007/11_November/20071115EMACItem27.pdf (2007)

  28. Jiang, A.X., Yin, Z., Kietkintveld, C., Leyton-Brown, K., Sandholm, T., Tambe, M.: Towards Optimal Patrol Strategies for Urban Security in Transit Systems. In: Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health. (2012)

    Google Scholar 

  29. Chandran, R., Beitchman, G.: Battle for Mumbai Ends, Death Toll Rises to 195. Times of India (29 November 2008) http://articles.timesofindia.indiatimes.com/2008-11-29/india/27930171_1_taj-hotel-three-terrorists-nariman-house.

  30. Johnson, M., Fang, F., Yang, R., Tambe, M., Albers, H.: Patrolling to Maximize Pristine Forest Area. In: Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health. (2012)

    Google Scholar 

  31. Ordonez, F., Tambe, M., Jara, J.F., Jain, M., Kiekintveld, C., Tsai, J.: Deployed Security Games for Patrol Planning. In: Handbook on Operations Research for Homeland Security. (2008)

    Google Scholar 

  32. Trusov, M., Bucklin, R.E., Pauwels, K.: Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site. Journal of Marketing 73 (2009)

    Google Scholar 

  33. Howard, N.J.: Finding Optimal Strategies for Influencing Social Networks in Two Player Games. Master’s thesis, MIT, Sloan School of Management (2011)

    Google Scholar 

  34. Alpcan, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press (2010)

    Google Scholar 

  35. Vanek, O., Yin, Z., Jain, M., Bosansky, B., Tambe, M., Pechoucek, M.: Game-Theoretic Resource Allocation for Malicious Packet Detection in Computer Networks. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)

    Google Scholar 

  36. Jain, M., Korzhyk, D., Vanek, O., Pechoucek, M., Conitzer, V., Tambe, M.: A Double Oracle Algorithm for Zero-Sum SEcurity games on Graphs. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)

    Google Scholar 

  37. Keteyian, A.: TSA: Federal Air Marshals. (2010) http://www.cbsnews.com/stories/2010/02/01/earlyshow/main6162291.shtml, retrieved Feb 1, 2011.

  38. Bertsimas, D., Tsitsiklis, J.N.: Introduction to Linear Optimization. Athena Scientific (1994)

    Google Scholar 

  39. Yin, Z., Korzhyk, D., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. In: AAMAS. (2010) 1139–1146

    Google Scholar 

  40. Letchford, J., Conitzer, V., Munagala, K.: Learning and Approximating the Optimal Strategy to Commit To. In: Second International Symposium on Algorithmic Game Theory (SAGT). (2009) 250–262

    Google Scholar 

  41. Jain, M., Leyton-Brown, K., Tambe, M.: The Deployment-to-Saturation Ratio in Security Games. In: Proc. of The 26th AAAI Conference on Artificial Intelligence (AAAI). (2012)

    Google Scholar 

  42. Pita, J., Jain, M., Tambe, M., Ordóñez, F., Kraus, S.: Robust Solutions to Stackelberg Games: Addressing Bounded Rationality and Limited Observations in Human Cognition. Artificial Intelligence 174(15) (2010) 1142–1171

    Google Scholar 

  43. Cheeseman, P., Kanefsky, B., Taylor, W.M.: Where the Really Hard Problems are. In: Proceedings of the International Joint Conference on Artificial Intelligence. (1991) 331–337

    Google Scholar 

  44. Mitchell, D., Selman, B., Levesque, H.: Hard and Easy Distributions of SAT Problems. In: Proceedings of the American Association for Artificial Intelligence. (1992) 459–465

    Google Scholar 

  45. Kiekintveld, C., Marecki, J., Tambe, M.: Approximation Methods for Infinite Bayesian Stackelberg Games: Modeling Distributional Uncertainty. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)

    Google Scholar 

  46. Yin, Z., Jain, M., Tambe, M., Ordonez, F.: Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty. In: Proc. of The 25th AAAI Conference on Artificial Intelligence (AAAI). (2011) 758–763

    Google Scholar 

  47. An, B., Tambe, M., Ordonez, F., Shieh, E., Kiekintveld, C.: Refinement of Strong Stackelberg Equilibria in Security Games. In: Proc. of the 25th Conference on Artificial Intelligence. (2011) 587–593

    Google Scholar 

  48. Kahneman, D., Tvesky, A.: Prospect Theory: An Analysis of Decision Under Risk. Econometrica 47(2) (1979) 263–291

    Google Scholar 

  49. Yang, R., Kiekintveld, C., Ordonez, F., Tambe, M., John, R.: Improving Resource Allocation Strategy Against Human Adversaries in Security Games. In: IJCAI. (2011)

    Google Scholar 

  50. An, B., Jain, M., Tambe, M., Kiekintveld, C.: Mixed-Initiative Optimization in Security Games: A Preliminary Report. In: Proc. of the AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration. (2011) 8–11

    Google Scholar 

  51. Brown, M., An, B., Kiekintveld, C., Ordonez, F., Tambe, M.: Multi-objective optimization for security games. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)

    Google Scholar 

  52. Taylor, M.E., Kiekintveld, C., Western, C., Tambe, M.: A Framework For Evaluating Deployed Security Systems: Is There a Chink in your ARMOR? Informatica 34 (2010) 129–139

    Google Scholar 

Download references

Acknowledgements

This research is supported by MURI grant W911NF-11-1-0332, ONR grant N00014-08-1-0733 and by the United States Department of Homeland Security through the Center for Risk and Economic Analysis of Terrorism Events (CREATE) under grant number 2010-ST-061-RE0001. All opinions, findings, conclusions and recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Jain, M., An, B., Tambe, M. (2013). Security Games Applied to Real-World: Research Contributions and Challenges. In: Jajodia, S., Ghosh, A., Subrahmanian, V., Swarup, V., Wang, C., Wang, X. (eds) Moving Target Defense II. Advances in Information Security, vol 100. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5416-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5416-8_2

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5415-1

  • Online ISBN: 978-1-4614-5416-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics