Skip to main content

Coevolutionary Approach to Sequential Stackelberg Security Games

  • Conference paper
  • First Online:
Computational Science – ICCS 2022 (ICCS 2022)

Abstract

The paper introduces a novel coevolutionary approach (CoEvoSG) for solving Sequential Stackelberg Security Games. CoEvoSG maintains two competing populations of players’ strategies. In the process inspired by biological evolution both populations are developed simultaneously in order to approximate Stackelberg Equilibrium. The comprehensive experimental study based on over 500 test instances of two game types proved CoEvoSG’s ability to repetitively find optimal or close to optimal solutions. The main strength of the proposed method is its time scalability which is highly competitive to the state-of-the-art algorithms and allows to calculate bigger and more complicated games than ever before. Due to the generic and knowledge-free design of CoEvoSG, the method can be applied to diverse real-life security scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Breton, M., Alj, A., Haurie, A.: Sequential stackelberg equilibria in two-person games. J. Optim. Theor. Appl. 59(1), 71–97 (1988)

    Article  MathSciNet  Google Scholar 

  2. Černỳ, J., Bošanskỳ, B., Kiekintveld, C.: Incremental strategy generation for stackelberg equilibria in extensive-form games. In: Proceedings of the 19th ACM Conference on Economics and Computation, pp. 151–168 (2018)

    Google Scholar 

  3. Conitzer, V., Sandholm, T.: Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM Conference on Electronic Commerce, pp. 82–90 (2006)

    Google Scholar 

  4. Fang, F., et al.: Deploying paws: field optimization of the protection assistant for wildlife security. In: Proceedings of the 28th Innovative Applications of Artificial Intelligence Conference (2016)

    Google Scholar 

  5. Gąsior, J., Seredyński, F.: Security-aware distributed job scheduling in cloud computing systems: a game-theoretic cellular automata-based approach. In: International Conference on Computational Science, pp. 449–462 (2019)

    Google Scholar 

  6. Guleva, V.Y.: Estimation of tipping points for critical and transitional regimes in the evolution of complex interbank network. In: International Conference on Computational Science, pp. 432–444 (2020)

    Google Scholar 

  7. Guo, Y., Zhang, H., Zhang, L., Fang, L., Li, F.: Incentive mechanism for cooperative intrusion detection: an evolutionary game approach. In: International Conference on Computational Science, pp. 83–97 (2018)

    Google Scholar 

  8. Jain, M., et al.: Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces 40(4), 267–290 (2010)

    Article  Google Scholar 

  9. Karwowski, J., Mańdziuk, J.: A monte carlo tree search approach to finding efficient patrolling schemes on graphs. Eur. J. Oper. Res. 277, 255–268 (2019)

    Article  MathSciNet  Google Scholar 

  10. Karwowski, J., Mańdziuk, J.: Stackelberg equilibrium approximation in general-sum extensive-form games with double-oracle sampling method. In: Proceedings of the 18th AAMAS Conference, pp. 2045–2047 (2019)

    Google Scholar 

  11. Karwowski, J., Mańdziuk, J.: Double-oracle sampling method for stackelberg equilibrium approximation in general-sum extensive-form games. In: Proceedings of the 34th AAAI Conference, vol. 34, pp. 2054–2061 (2020)

    Google Scholar 

  12. Karwowski, J., Mańdziuk, J., Żychowski, A., Grajek, F., An, B.: A memetic approach for sequential security games on a plane with moving targets. In: Proceedings of the 33rd AAAI Conference, vol. 33, pp. 970–977 (2019)

    Google Scholar 

  13. Kocsis, L., Szepesvári, C.: Bandit based monte-carlo planning. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol. 4212, pp. 282–293. Springer, Heidelberg (2006). https://doi.org/10.1007/11871842_29

    Chapter  Google Scholar 

  14. Lezzi, M., Lazoi, M., Corallo, A.: Cybersecurity for industry 4.0 in the current literature: a reference framework. Computers in Industry 103, 97–110 (2018)

    Google Scholar 

  15. Liu, Z., Wang, L.: FlipIt Game model-based defense strategy against cyberattacks on SCADA systems considering insider assistance. IEEE Trans. Inf. Forensics Secur. 16, 2791–2804 (2021)

    Article  Google Scholar 

  16. Lou, J., Smith, A.M., Vorobeychik, Y.: Multidefender security games. IEEE Intell. Syst. 32, 50–60 (2017)

    Article  Google Scholar 

  17. Oakley, L., Oprea, A.: \({\sf QFlip}\): an adaptive reinforcement learning strategy for the \({\sf FlipIt}\) security game. In: Alpcan, T., Vorobeychik, Y., Baras, J.S., Dán, G. (eds.) GameSec 2019. LNCS, vol. 11836, pp. 364–384. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32430-8_22

  18. Shieh, E., et al.: Protect: a deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th AAMAS Conference, pp. 13–20 (2012)

    Google Scholar 

  19. Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: Proceedings of the 27th IJCAI Conference, pp. 5494–5501 (2018)

    Google Scholar 

  20. Sinha, A., Nguyen, T.H., Kar, D., Brown, M., Tambe, M., Jiang, A.X.: From physical security to cybersecurity. J. Cybersecurity 1(1), 19–35 (2015)

    Google Scholar 

  21. Świechowski, M., Godlewski, K., Sawicki, B., Mańdziuk, J.: Monte carlo tree search: a review of recent modifications and applications (2021). https://arxiv.org/abs/2103.04931

  22. Van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: the game of “stealthy takeover’’. J. Cryptology 26(4), 655–713 (2013)

    Article  MathSciNet  Google Scholar 

  23. Čermák, J., Bošanský, B., Durkota, K., Lisý, V., Kiekintveld, C.: Using correlated strategies for computing stackelberg equilibria in extensive-form games. In: Proceedings of the 30th AAAI Conference, pp. 439–445 (2016)

    Google Scholar 

  24. Von Stengel, B., Zamir, S.: Leadership with commitment to mixed strategies. Technical Report, CDAM Research Report (2004)

    Google Scholar 

  25. Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440–442 (1998)

    Article  Google Scholar 

  26. Zhang, Y., Malacaria, P.: Bayesian stackelberg games for cyber-security decision support. Decis. Support Syst. 148, 113599 (2021)

    Article  Google Scholar 

  27. Żychowski, A., Mańdziuk, J.: A generic metaheuristic approach to sequential security games. In: Proceedings of the 19th AAMAS, pp. 2089–2091 (2020)

    Google Scholar 

  28. Żychowski, A., Mańdziuk, J.: Evolution of strategies in sequential security games. In: Proceedings of the 20th AAMAS Conference, pp. 1434–1442 (2021)

    Google Scholar 

  29. Żychowski, A., Mańdziuk, J.: Learning attacker’s bounded rationality model in security games. In: Proceedings of the 28th ICONIP, vol. CCIS 1516, pp. 530–539 (2021)

    Google Scholar 

Download references

Acknowledgement

The project was funded by POB Research Centre Cybersecurity and Data Science of Warsaw University of Technology within the Excellence Initiative Program - Research University (ID-UB).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adam Żychowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Żychowski, A., Mańdziuk, J. (2022). Coevolutionary Approach to Sequential Stackelberg Security Games. In: Groen, D., de Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds) Computational Science – ICCS 2022. ICCS 2022. Lecture Notes in Computer Science, vol 13350. Springer, Cham. https://doi.org/10.1007/978-3-031-08751-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08751-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08750-9

  • Online ISBN: 978-3-031-08751-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics