C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta

Slides:



Advertisements
Similar presentations
Integer Optimization Basic Concepts Integer Linear Program(ILP): A linear program except that some or all of the decision variables must have integer.
Advertisements

The simplex algorithm The simplex algorithm is the classical method for solving linear programs. Its running time is not polynomial in the worst case.
Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games Praveen Paruchuri, Jonathan P. Pearce, Sarit Kraus Catherine.
Computing equilibria of security games using linear integer programming Dima Korzhyk
Part 3: The Minimax Theorem
Computing Optimal Randomized Resource Allocations for Massive Security Games Presenter : Jen Hua Chi Advisor : Yeong Sung Lin.
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor:
Approximation Algorithms
Modeling the Covering Test Problem Brahim Hnich, Steven Prestwich, and Evgeny Selensky Cork Constraint Computation Center UCC Supported by SFI.
1 Combinatorial Problems in Cooperative Control: Complexity and Scalability Carla Gomes and Bart Selman Cornell University Muri Meeting March 2002.
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
Commitment without Regrets: Online Learning in Stackelberg Security Games Nika Haghtalab Carnegie Mellon University Joint work with Maria-Florina Balcan,
Daniel Kroening and Ofer Strichman Decision Procedures An Algorithmic Point of View Deciding ILPs with Branch & Bound ILP References: ‘Integer Programming’
CPS 173 Security games Vincent Conitzer
Decision Procedures An Algorithmic Point of View
Transformation of Timed Automata into Mixed Integer Linear Programs Sebastian Panek.
CPS LP and IP in Game theory (Normal-form Games, Nash Equilibria and Stackelberg Games) Joshua Letchford.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Yang Cai Oct 08, An overview of today’s class Basic LP Formulation for Multiple Bidders Succinct LP: Reduced Form of an Auction The Structure of.
MILP algorithms: branch-and-bound and branch-and-cut
Patrolling Games Katerina Papadaki London School of Economics with Alec Morton and Steven Alpern.
Linear Programming Erasmus Mobility Program (24Apr2012) Pollack Mihály Engineering Faculty (PMMK) University of Pécs João Miranda
Integer LP In-class Prob
OR Chapter 8. General LP Problems Converting other forms to general LP problem : min c’x  - max (-c)’x   = by adding a nonnegative slack variable.
1 Inventory Control with Time-Varying Demand. 2  Week 1Introduction to Production Planning and Inventory Control  Week 2Inventory Control – Deterministic.
1 a1a1 A1A1 a2a2 a3a3 A2A Mixed Strategies When there is no saddle point: We’ll think of playing the game repeatedly. We continue to assume that.
Introduction to Integer Programming Integer programming models Thursday, April 4 Handouts: Lecture Notes.
Approximation Algorithms based on linear programming.
1 2 Linear Programming Chapter 3 3 Chapter Objectives –Requirements for a linear programming model. –Graphical representation of linear models. –Linear.
Management Science 461 Lecture 4b – P-median problems September 30, 2008.
Commitment to Correlated Strategies Vince Conitzer and Dima Korzhyk.
Impact of Interference on Multi-hop Wireless Network Performance
Hello everyone, welcome to this talk about~~~
Nonlinear Programming Prepared by Lee Revere and John Large
Integer Programming An integer linear program (ILP) is defined exactly as a linear program except that values of variables in a feasible solution have.
The Duality Theorem Primal P: Maximize
Chap 10. Sensitivity Analysis
Tools for Decision Analysis: Analysis of Risky Decisions
A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
Non-additive Security Games
The minimum cost flow problem
Perturbation method, lexicographic method
6.5 Stochastic Prog. and Benders’ decomposition
Application of network flow: Protecting coral reef ecosystems
Panel: Theory and fundamental understanding of network system resiliency, performance and usability Ness B. Shroff Electrical and Computer Engineering.
Introduction to Operations Research
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security Fang et al.
When Security Games Go Green
Game Theory.
1.3 Modeling with exponentially many constr.
Chapter 4 Linear Programming: The Simplex Method
Objective of This Course
Commitment to Correlated Strategies
Integer Programming (정수계획법)
Presented By Aaron Roth
1.206J/16.77J/ESD.215J Airline Schedule Planning
MURI Kickoff Meeting Randolph L. Moses November, 2008
Matthew Renner, Trish Beeksma, Patch Kenny
CPS Extensive-form games
Integer Programming (정수계획법)
Lecture 20 Linear Program Duality
Vincent Conitzer Extensive-form games Vincent Conitzer
CPS 173 Extensive-form games
Facilities Planning and Design Course code:
Example: multi-party coin toss
6.5 Stochastic Prog. and Benders’ decomposition
Instructor: Vincent Conitzer
Normal Form (Matrix) Games
1.2 Guidelines for strong formulations
Blockchain Mining Games
Presentation transcript:

Computing Optimal Randomized Resource Allocations for Massive Security Games C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta September 2016

Overview Motivation and Introduction Compact Representations of Security Games ERASER Alternative LP formulation (ORIGAMI) ERASER-C (more realistic) Results

Overview Motivation and Introduction Compact Representations of Security Games ERASER Alternative LP formulation (ORIGAMI) ERASER-C (more realistic) Results

Motivation and introduction m resources to cover n targets, m < n Defender can commit to a mixed strategy Attacker can observe the probabilities for each coverage set Surveillance Insider threat Attacker chooses a pure strategy Equilibrium concept not ex post

Motivation and introduction Initially assume interchangeable resources (to extend later) Assume players are risk neutral One type of follower (attacker) Recall that this should be in P But, the number of pure strategies now is unreasonably large, with 100 targets and 10 resources ~17 trillion!

Motivation and introduction Running example: 4 targets, 2 resources Qualitatively Defender values all 4 targets equally (and prefers a covered attack to an uncovered attack). Attacker gets twice as much utility for successful attack on target 3. All failed attacks get the same (lower) utility. 1 2 4 3

Motivation and introduction Running example Quantitatively 1 2 4 3 Targets 1, 2, 4 Cov’d Uncov’d Defender 4 1 Attacker Target 3 Cov’d Uncov’d Defender 4 1 Attacker 2

Motivation and introduction Running example Quantitatively 1 2 4 3 Targets 1, 2, 4 Cov’d Uncov’d Defender 4 1 Attacker Target 3 Cov’d Uncov’d Defender 4 1 Attacker 2

Overview Motivation and Introduction Compact Representations of Security Games ERASER Alternative LP formulation (ORIGAMI) ERASER-C (more realistic) Results

Compact Representations of Security Games—Extensive Form is Too Big! Defender commits to a mixed strategy (one of uncountably many) In general, length Attacker strategy is an efficient algorithm, which given any mixed strategy, D computes target

Compact Representations of Security Games Key insight: the only information needed to represent the defender strategy is the probabilities a target is covered With one attacker (and in extensions with no interactions between attacks) any feasible assignment of resources that achieves coverage vector C will be a SSE that is (weakly) optimal

Overview Motivation and Introduction Compact Representations of Security Games ERASER Alternative LP formulation (ORIGAMI) ERASER-C (more realistic) Results

ERASER – basic formulation Exactly one attack occurs

ERASER – basic formulation Exactly one attack occurs Feasible use of all resources

ERASER – basic formulation Exactly one attack occurs Feasible use of all resources Constraint only on attacked target – sets d equal to that utility

ERASER – basic formulation Exactly one attack occurs Feasible use of all resources k is an upper bound on attacker’s utility

ERASER – basic formulation Exactly one attack occurs Feasible use of all resources k is an upper bound on attacker’s utility

ERASER – basic formulation Exactly one attack occurs Feasible use of all resources For the attacked target only, the attacker’s utility must be at least k

ERASER – running example c

ERASER – running example Modification of IBM’s CPLEX MILP demo code

ERASER – running example Modification of IBM’s CPLEX MILP demo code

ERASER – running example

Overview Motivation and Introduction Compact Representations of Security Games ERASER Alternative LP formulation (ORIGAMI) ERASER-C (more realistic) Results

ORIGAMI Additional assumption When is this reasonable? Almost always. Attackers like it when attacks succeed Defenders like it when attacks fail When is this reasonable? Almost always. Exception: Honeypots? Disputed: Coventry blitz

ORIGAMI There is no marginal benefit for either player of adding coverage to targets outside the attack set Because of tiebreak rule, adding targets (without removing them) from attack set benefits defender

ORIGAMI-LP Indicator variables for attack set

ORIGAMI-LP Indicator variables for attack set

ORIGAMI-LP Indicator variables for attack set Feasible use of all resources

ORIGAMI-LP Indicator variables for attack set Feasible use of all resources k is upper bound on attacker’s utility

ORIGAMI-LP Indicator variables for attack set Feasible use of all resources k is lower bound on attacker’s utility of targets in the attack set

ORIGAMI-LP Indicator variables for attack set Feasible use of all resources Defender only tries to cover targets in the attack set

ORIGAMI-Iterative algorithm If there was less coverage, the attacker would always attack and get strictly better utility

ORIGAMI – Running Example Iteration 1 Attack set: {Target 3} New coverage for Target 3: 0.5

ORIGAMI – Running Example Iteration 2 Attack set: {Target 1, Target 3} New coverage for Target 3: 0.5 New coverage for Target 1: 0

ORIGAMI – Running Example Iteration 3 Attack set: {Target 1, Target 2, Target 3} New coverage for Target 3: 0.5 New coverage for Target 1: 0 New coverage for Target 2: 0

ORIGAMI – Running Example Iteration 4 Attack set: {Target 1, Target 2, Target 3, Target 4} New coverage for Target 3: 0.5 New coverage for Target 1: 0 New coverage for Target 2: 0 New coverage for Target 4: 0

ORIGAMI – Running Example Postprocessing after loop Attack set: {Target 1, Target 2, Target 3, Target 4} Sum of ratio[t] = 3.5 Resources Left = 1.5 Target 3 final coverage = 0.5 + 0.5*1.5/3.5 = 5/7 Target 1 final coverage = 0 + 1.5/3.5 = 3/7 Target 2 final coverage = 0 + 1.5/3.5 = 3/7 Target 4 final coverage = 0 + 1.5/3.5 = 3/7

ERASER-C Solves the FAMS problem More realistic – resources now only have a set of schedules they can work with (multiple flights at same time, can’t teleport between cities, etc.) Resources have types, analogous to the starting location

ERASER-C Now resources only have feasible schedules. Example: 3 guards, 20 flights Feasible schedule: 10 disjoint pairs of flights, e.g. (1, 2), (3,4), (5,6), (7,8), (9, 10), (11, 12), (13, 14), (15, 16), (17, 18), (19, 20) Again, naïve representation of pure strategies is infeasibly large [Tsai et. al., IRIS A Tool for Strategic Security Allocation in Transportation Networks, 2016]

ERASER-C Now resources only have feasible schedules. Example: 3 guards, 20 flights Feasible schedule: 10 disjoint pairs of flights, e.g. (1, 2), (3,4), (5,6), (7,8), (9, 10), (11, 12), (13, 14), (15, 16), (17, 18), (19, 20) Instead put a probability on each schedule. In general problem number of schedules could be infeasibly large, if schedules can be represented compactly However, in FAMS application schedules are length 2 [Tsai et. al., IRIS A Tool for Strategic Security Allocation in Transportation Networks, 2016]

ERASER-C

ERASER-C – Odd Cycles A feasible solution to the MILP may not be feasible using the schedule E.g. 1 resource can cover the schedule {1, 2} and {2, 3} It will not be possible to split 50% coverage of 1 and 50% coverage of 3

Overview Motivation and Introduction Compact Representations of Security Games ERASER Alternative LP formulation (ORIGAMI) ERASER-C (more realistic) Results

Results

Results

Results