Skip to main content

Tackling Sequential Attacks in Security Games

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11836))

Included in the following conference series:

Abstract

Many real-world security problems exhibit the challenge of sequential attacks (i.e., the attacker carries out multiple attacks in a sequential manner) on important targets. Security agencies have to dynamically allocate limited security resources to the targets in response to these attacks, upon receiving real-time observations regarding them. This paper focuses on tackling sequential attacks using Stackelberg security games (\(\mathtt {SSG}\)s), a well-known class of leader-follower games, which have been applied for solving many real-world security problems. Previous work on \(\mathtt {SSG}\)s mainly considers a myopic attacker who attacks one or multiple targets simultaneously against each defense strategy. This paper introduces a new sequential-attack game model (built upon the Stackelberg game model), which incorporates real-time observations, the behavior of sequential attacks, and strategic plans of non-myopic players. Based on the new game model, we propose practical game-theoretic algorithms for computing an equilibrium in different game settings. Our new algorithms exploit intrinsic properties of the equilibrium to derive compact representations of both game state history and strategy spaces of players (which are exponential in number in the original representations). Finally, our computational experiments quantify benefits and losses to the attacker and defender in the presence of sequential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Sometimes we omit \(\mathbf {o}^a_l \) and \(\mathbf {o}^d_l\) when the context is clear.

  2. 2.

    For the sake of presentation, we will omit \(\emptyset \) (i.e., \(i_1 = i_1(\emptyset )\)) from all contexts.

  3. 3.

    Online appendix: https://www.dropbox.com/s/hjyjabfg69llyn3/Appendix.pdf?dl=0.

  4. 4.

    See http://gamut.stanford.edu/.

References

  1. Basilico, N., Gatti, N., Amigoni, F.: Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In: AAMAS, pp. 57–64 (2009)

    Google Scholar 

  2. Bošanský, B., Čermák, J.: Sequence-form algorithm for computing Stackelberg equilibria in extensive-form games. In: AAAI Conference on Artificial Intelligence (2015)

    Google Scholar 

  3. Fang, F., et al.: Deploying PAWS: field optimization of the protection assistant for wildlife security. In: IAAI (2016)

    Google Scholar 

  4. Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: Proceedings of 24th International Joint Conference on Artificial Intelligence (IJCAI) (2015)

    Google Scholar 

  5. Jiang, A.X., Yin, Z., Zhang, C., Tambe, M., Kraus, S.: Game-theoretic randomization for security patrolling with dynamic execution uncertainty. In: Proceedings of 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 207–214 (2013)

    Google Scholar 

  6. Karwowski, J., Mańdziuk, J.: Stackelberg equilibrium approximation in general-sum extensive-form games with double-oracle sampling method. In: Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2019, pp. 2045–2047 (2019)

    Google Scholar 

  7. Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ordóñez, F., Tambe, M.: Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, pp. 689–696 (2009). http://portal.acm.org/citation.cfm?id=1558013.1558108

  8. Korzhyk, D., Conitzer, V., Parr, R.: Security games with multiple attacker resources. In: IJCAI (2011)

    Google Scholar 

  9. Letchford, J., Conitzer, V.: Computing optimal strategies to commit to in extensive-form games. In: Proceedings of the 11th ACM Conference on Electronic Commerce, pp. 83–92. ACM, New York (2010). https://doi.org/10.1145/1807342.1807354

  10. Letchford, J., Vorobeychik, Y.: Computing randomized security strategies in networked domains. Appl. Advers. Reason. Risk Model. 11, 06 (2011)

    Google Scholar 

  11. Lisý, V., Davis, T., Bowling, M.: Counterfactual regret minimization in sequential security games. In: Proceedings of AAAI Conference on Artificial Intelligence (2016)

    Google Scholar 

  12. Nguyen, T.H., et al.: CAPTURE: a new predictive anti-poaching tool for wildlife protection. In: Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, pp. 767–775. AAMAS, Richland (2016). http://dl.acm.org/citation.cfm?id=2937029.2937037

  13. Shieh, E., et al.: PROTECT: a deployed game theoretic system to protect the ports of the United States. In: AAMAS (2012)

    Google Scholar 

  14. Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: IJCAI, pp. 5494–5501 (2018)

    Google Scholar 

  15. Tambe, M. (ed.): Security and Game Theory: Algorithms, Deployed Systems. Lessons Learned. Cambridge University Press, Cambridge (2011)

    MATH  Google Scholar 

  16. Čermák, J., Bošanský, B., Durkota, K., Lisý, V., Kiekintveld, C.: Using correlated strategies for computing Stackelberg equilibria in extensive-form games. In: Proceedings of AAAI Conference on Artificial Intelligence, pp. 439–445 (2016)

    Google Scholar 

  17. Černý, J., Bošanský, B., Kiekintveld, C.: Incremental strategy generation for Stackelberg equilibria in extensive-form games. In: Proceedings of ACM Conference on Economics and Computation (EC), pp. 151–168 (2018)

    Google Scholar 

  18. Wang, S., Liu, F., Shroff, N.: Non-additive security games. In: Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, AAAI 2017, pp. 728–735 (2017)

    Google Scholar 

  19. Yin, Z., et al.: TRUSTS: scheduling randomized patrols for fare inspection in transit systems. In: Proceedings of 24th Conference on Innovative Applications of Artificial Intelligence (IAAI) (2012)

    Google Scholar 

Download references

Acknowledgment

This work was supported in part by the Czech Science Foundation (no. 19-24384Y).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thanh H. Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, T.H., Yadav, A., Bosansky, B., Liang, Y. (2019). Tackling Sequential Attacks in Security Games. In: Alpcan, T., Vorobeychik, Y., Baras, J., Dán, G. (eds) Decision and Game Theory for Security. GameSec 2019. Lecture Notes in Computer Science(), vol 11836. Springer, Cham. https://doi.org/10.1007/978-3-030-32430-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32430-8_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32429-2

  • Online ISBN: 978-3-030-32430-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics