Skip to main content

Imbalanced Collusive Security Games

  • Conference paper
  • First Online:
  • 1791 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11199))

Abstract

Colluding adversaries is a crucial challenge for defenders in many real-world applications. Previous literature has provided Collusive Security Games (COSG) to model colluding adversaries, and provided models and algorithms to generate defender strategies to counter colluding adversaries, often by devising strategies that inhibit collusion [6]. Unfortunately, this previous work focused exclusively on situations with perfectly matched adversaries, i.e., where their rewards were symmetrically distributed. In the real world, however, defenders often face adversaries where their rewards are asymmetrically distributed. Such inherent asymmetry raises a question as to whether human adversaries would attempt to collude in such situations, and whether defender strategies to counter such collusion should focus on inhibiting collusion. To address these open questions, this paper: (i) explores and theoretically analyzes Imbalanced Collusive Security Games (ICOSG) where defenders face adversaries with asymmetrically distributed rewards; (ii) conducts extensive experiments of three different adversary models involving 1800 real human subjects and (iii) derives novel analysis of the reason behind why bounded rational attackers models outperform perfectly rational attackers models. The key principle discovered as the result of our experiments is that: careful modeling of human bounded rationality reveals a key difference (when compared to a model using perfect rationality) in defender strategies for handling colluding adversaries which face symmetric vs asymmetric rewards. Whereas a model based on perfect rationality always attempts to break collusion among adversaries, a bounded rationality model acknowledges the inherent difficulty of breaking such collusion in symmetric situations and focuses only on breaking collusion in asymmetric situation, and only on damage control from collusion in the symmetric situation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    By convention in the security game literature, we refer to the defender as a “she” and the adversary as a“he”.

References

  1. Basilico, N., Gatti, N., Amigoni, F.: Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In: Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1, pp. 57–64. International Foundation for Autonomous Agents and Multiagent Systems (2009)

    Google Scholar 

  2. Bucarey, V., Casorrán, C., Figueroa, Ó., Rosas, K., Navarrete, H., Ordóñez, F.: Building real stackelberg security games for border patrols. In: Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S. (eds.) GameSec 2017. LNCS, pp. 193–212. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-68711-7_11

    Chapter  MATH  Google Scholar 

  3. Clark, R., Houde, J.F.: Collusion with asymmetric retailers: evidence from a gasoline price-fixing case. Am. Econ. J.: Microecon. 5(3), 97–123 (2013)

    Google Scholar 

  4. Fang, F., et al.: Deploying paws: field optimization of the protection assistant for wildlife security. In: AAAI, pp. 3966–3973 (2016)

    Google Scholar 

  5. Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: IJCAI (2015)

    Google Scholar 

  6. Gholami, S., Wilder, B., Brown, M., Thomas, D., Sintov, N., Tambe, M.: Divide to defend: collusive security games. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 272–293. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47413-7_16

    Chapter  MATH  Google Scholar 

  7. Guo, Q., An, B., Vorobeychik, Y., Tran-Thanh, L., Gan, J., Miao, C.: Coalitional security games. In: Proceedings of AAMAS, pp. 159–167 (2016)

    Google Scholar 

  8. Harms, J.: The war on terror and accomplices: an exploratory study of individuals who provide material support to terrorists. Secur. J. 30(2), 417–436 (2017)

    Article  MathSciNet  Google Scholar 

  9. Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47, 263–291 (1979)

    Article  Google Scholar 

  10. Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ordóñez, F., Tambe, M.: Computing optimal randomized resource allocations for massive security games. In: AAMAS (2009)

    Google Scholar 

  11. Korzhyk, D., Conitzer, V., Parr, R.: Complexity of computing optimal stackelberg strategies in security resource allocation games. In: AAAI (2010)

    Google Scholar 

  12. Korzhyk, D., Conitzer, V., Parr, R.: Security games with multiple attacker resources. In: IJCAI Proceedings, vol. 22, p. 273 (2011)

    Google Scholar 

  13. Letchford, J., Vorobeychik, Y.: Computing randomized security strategies in networked domains. Appl. Advers. Reason. Risk Model. 11, 06 (2011)

    Google Scholar 

  14. McFadden, D.L.: Quantal choice analysis: a survey. In: Annals of Economic and Social Measurement, vol. 5, no. 4, pp. 363–390. NBER (1976)

    Google Scholar 

  15. Nguyen, T.H., Kar, D., Brown, M., Sinha, A., Tambe, M., Jiang, A.X.: Towards a science of security games. In: Toni, B. (ed.) New Frontiers of Multi-disciplinary Research in STEAM-H, vol. 157, pp. 347–381. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-319-31323-8_16

    Chapter  Google Scholar 

  16. Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: AAAI (2013)

    Google Scholar 

  17. Pita, J., et al.: Deployed armor protection: the application of a game theoretic model for security at the los angeles international airport. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems: Industrial Track, pp. 125–132. International Foundation for Autonomous Agents and Multiagent Systems (2008)

    Google Scholar 

  18. Restrepo, A.L., Guizado, Á.C.: From smugglers to warlords: twentieth century colombian drug traffickers. Can. J. Lat. Am. Caribb. Stud. 28(55–56), 249–275 (2003)

    Google Scholar 

  19. Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)

    Google Scholar 

  20. Tversky, A., Kahneman, D.: Advances in prospect theory: cumulative representation of uncertainty. J. Risk Uncertain. 5(4), 297–323 (1992)

    Article  Google Scholar 

  21. Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, pp. 453–460. International Foundation for Autonomous Agents and Multiagent Systems (2014)

    Google Scholar 

  22. Yin, Z., et al.: Trusts: scheduling randomized patrols for fare inspection in transit systems. In: IAAI (2012)

    Google Scholar 

  23. Yin, Z., Korzhyk, D., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. In: AAMAS (2010)

    Google Scholar 

Download references

Acknowledgments

We gratefully acknowledge DARPA contract grant FA8650-15-D-6583, and subcontract from Lockheed Martin supported this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han-Ching Ou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ou, HC., Tambe, M., Dilkina, B., Vayanos, P. (2018). Imbalanced Collusive Security Games. In: Bushnell, L., Poovendran, R., Başar, T. (eds) Decision and Game Theory for Security. GameSec 2018. Lecture Notes in Computer Science(), vol 11199. Springer, Cham. https://doi.org/10.1007/978-3-030-01554-1_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01554-1_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01553-4

  • Online ISBN: 978-3-030-01554-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics