Non-additive Security Games

Slides:



Advertisements
Similar presentations
Ch 7.7: Fundamental Matrices
Advertisements

Applied Informatics Štefan BEREŽNÝ
Game Theory Assignment For all of these games, P1 chooses between the columns, and P2 chooses between the rows.
Continuation Methods for Structured Games Ben Blum Christian Shelton Daphne Koller Stanford University.
1 University of Southern California Keep the Adversary Guessing: Agent Security by Policy Randomization Praveen Paruchuri University of Southern California.
Totally Unimodular Matrices
Bilinear Games: Polynomial Time Algorithms for Rank Based Subclasses Ruta Mehta Indian Institute of Technology, Bombay Joint work with Jugal Garg and Albert.
Game Theoretical Insights in Strategic Patrolling: Model and Analysis Nicola Gatti – DEI, Politecnico di Milano, Piazza Leonardo.
Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games Praveen Paruchuri, Jonathan P. Pearce, Sarit Kraus Catherine.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
Computing equilibria of security games using linear integer programming Dima Korzhyk
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Graph Laplacian Regularization for Large-Scale Semidefinite Programming Kilian Weinberger et al. NIPS 2006 presented by Aggeliki Tsoli.
Solution of linear system of equations
COLOR TEST COLOR TEST. Dueling Algorithms N ICOLE I MMORLICA, N ORTHWESTERN U NIVERSITY WITH A. T AUMAN K ALAI, B. L UCIER, A. M OITRA, A. P OSTLEWAITE,
Duality Lecture 10: Feb 9. Min-Max theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum Cut Both.
1 Computing Nash Equilibrium Presenter: Yishay Mansour.
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
Computational aspects of stability in weighted voting games Edith Elkind (NTU, Singapore) Based on joint work with Leslie Ann Goldberg, Paul W. Goldberg,
Minimax strategies, Nash equilibria, correlated equilibria Vincent Conitzer
CPS 173 Security games Vincent Conitzer
Summarized by Soo-Jin Kim
MAKING COMPLEX DEClSlONS
System of Linear Equations Nattee Niparnan. LINEAR EQUATIONS.
Square n-by-n Matrix.
Graph Coalition Structure Generation Maria Polukarov University of Southampton Joint work with Tom Voice and Nick Jennings HUJI, 25 th September 2011.
The Multiplicative Weights Update Method Based on Arora, Hazan & Kale (2005) Mashor Housh Oded Cats Advanced simulation methods Prof. Rubinstein.
Combinatorial Algorithms Unate Covering Binate Covering Graph Coloring Maximum Clique.
Chapter 2 Simultaneous Linear Equations (cont.)
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 11.
CPS LP and IP in Game theory (Normal-form Games, Nash Equilibria and Stackelberg Games) Joshua Letchford.
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Ásbjörn H Kristbjörnsson1 The complexity of Finding Nash Equilibria Ásbjörn H Kristbjörnsson Algorithms, Logic and Complexity.
1 What is Game Theory About? r Analysis of situations where conflict of interests is present r Goal is to prescribe how conflicts can be resolved 2 2 r.
1 a1a1 A1A1 a2a2 a3a3 A2A Mixed Strategies When there is no saddle point: We’ll think of playing the game repeatedly. We continue to assume that.
Vasilis Syrgkanis Cornell University
Introduction to State Space Search
STATIC ANALYSIS OF UNCERTAIN STRUCTURES USING INTERVAL EIGENVALUE DECOMPOSITION Mehdi Modares Tufts University Robert L. Mullen Case Western Reserve University.
Matrices, Vectors, Determinants.
Yuan Deng Vincent Conitzer Duke University
Keep the Adversary Guessing: Agent Security by Policy Randomization
The NP class. NP-completeness
Nash Equilibrium: P or NP?
Hello everyone, welcome to this talk about~~~
C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta
A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
Topics in Algorithms Lap Chi Lau.
Algorithmic Game Theory and Internet Computing
Application of network flow: Protecting coral reef ecosystems
Panel: Theory and fundamental understanding of network system resiliency, performance and usability Ness B. Shroff Electrical and Computer Engineering.
Nuclear Norm Heuristic for Rank Minimization
Polyhedron Here, we derive a representation of polyhedron and see the properties of the generators. We also see how to identify the generators. The results.
Polyhedron Here, we derive a representation of polyhedron and see the properties of the generators. We also see how to identify the generators. The results.
Chapter 11 Limitations of Algorithm Power
Feature space tansformation methods
Rank-Sparsity Incoherence for Matrix Decomposition
I.4 Polyhedral Theory (NW)
Assignment Problems Guoming Tang CSC Graduate Lecture.
I.4 Polyhedral Theory.
9.3 Linear programming and 2 x 2 games : A geometric approach
(Convex) Cones Def: closed under nonnegative linear combinations, i.e.
Major Design Strategies
Major Design Strategies
Chapter 2 Determinants.
Normal Form (Matrix) Games
Chapter 2. Simplex method
A Technique for Reducing Normal Form Games to Compute a Nash Equilibrium Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University, Computer Science.
Presentation transcript:

Non-additive Security Games The Thirty-First AAAI Conference on Artificial Intelligence Non-additive Security Games Sinong Wang, Fang Liu and Ness Shroff Electrical and Computer Engineering Email: wang.7691@osu.edu Feb. 5 2017

Classic Security Game Model Two players: attacker and defender n targets: Defender’s resources: Homogenous resources Heterogeneous resources Attacker choose only one target to attack Defender will get benefit if if target i is covered, and loss if target i is uncovered; The attacker’s utility is denoted similarly by Resources Targets Defender Attacker Gap>0 covered uncovered Gap>0

Classic Security Game Model Pure strategies Defender’s pure strategy can be represented by a subset , the defender’s pure strategy space is Attacker’s pure strategy is , the attacker’s pure strategy space is simply Toy example, defender can assign at most two resources D={1,3} D={1,n} Resources Resources Targets Targets 1 2 3 n 1 2 3 n

Related Works Challenges to solve the security game Exponential large defender pure strategy space Research directions Efficient algorithm design (heuristic algorithm, might be exponential time in the worst case) Examining the complexity of the security game (polynomial time algorithm design or NP-hard) Extending to other settings (uncertain attacker behavior, etc.)

Compact representation (Kiekintveld, AAMAS 09’) Related Works Examining the complexity of the security game Compact representation (Kiekintveld, AAMAS 09’) Recover mixed strategy and complexity of several security games (Korzhyk, AAAI 11’) Security game with multiple attacker resources (Korzhyk, AAAI 13’) Complexity of security game with single attacker resource (Yin 09’;Xu, EC 16’) Complexity of security game with multiple attacker resources and non-additive utility functions?

Non-additive Security Game Model Complete pure strategy space: Attacker and defender’s pure strategy space is the power set of [n]: Non-additive utility function: Benefit function: Attacker cost function: Defender cost function: The expected utility is given by Bilinear form Defender’s pure strategy is is a feasible assignment of resources to targets

Challenges and open questions Both exponential large attacker’s and defender’s pure strategy space Exponential number of utility functions Main results: Condition of compactly representing the NASG. An oracle-based algorithm to efficiently compute the mixed strategies of NASG. The complexity of computing the mixed strategies of NASG. Proposition 1. The set of Nash equilibriums of NASG is equivalent to the set of Nash equilibriums of zero-sum game with payoff matrix

Compact Representation Based on von Neumann’s minimax theorem, computing the NE of zero- sum game can be formulated as the following minimax problem, Challenges: exponential large optimization problem Conceptual derivation: r is the rank of payoff matrix, if we define affine transformation: We can obtain the following equivalent optimization problem We can further simplify it as size dependent on rank!

Compact Representation Decomposable property of payoff matrix Q is binary matrix, D is diagonal matrix, V and L are two sparse matrices with only one non-zero column and row. Close-from expression of each elements: Common utilities: Theorem 1. They payoff matrix can be decomposed as

Compact Representation Formal description Based on above decomposition results we can let elementary matrices Affine transformation: Compact minimax problem S is defined as the support set of the NASG: transformation projection

Compact Representation Sufficient condition of compact representation Theorem 2. The rank of payoff matrix is equal to is NE of NASG is optimal solution of compact problem Implication of compact representation where and Additive case: Common utilities satisfy Support set S = {1,2,3,…,n}.

Oracle-based Algorithmic Framework Our results Main technical development: A geometric approach Ellipsoid method Minimax Problem: poly(n) reduction Defender oracle problem: for any vector , compute

Oracle-based Algorithmic Framework The main technical development The poly(n) time reduction from minimax problem to compact NASG. The poly(n) time from compact NASG to defender oracle problem. poly(n) reduction poly(n) reduction

Solving NASG is a Combinatorial Problem Restriction: Attacker attack at most c targets, defender defend at most k targets. Defender’s cost function are additive. Main results: Main technique: Partial matrix decomposition Polytope transformation and projection. Reduction between the separation oracles of two polytopes. D - Minimax Problem: poly(n) reduction Defender oracle problem: for any vector , compute

What is the defender oracle problem Defender oracle problem is indeed a combinatorial optimization problem. When the utility function is additive, the defender oracle problem is a linear optimization problem. Theorem 7. The defender oracle problem is equivalent to, for any vector , maximize a pesudo - boolean function under a cardinality constraint

Application to the Network Security Domain Definition. Network security game is given by a tuple (G,T,F,c) G=(V,E) with node set V and edge set E T is the network value function, F is the failure operator c is the maximum number of targets attacker can choose First solvable class: additive utility functions such as betweenness centrality. Second solvable class: separable support set S with largest component equal to Third solvable class: negative common utilities except for singleton set

Conclusions and Future Work We extended the security game to the multiple attacker resources and non- additive utility functions We proposed a completely new theoretical framework We extend both the polynomial solvable and NP-hard classes Future works: The computation of Nash equilibrium of non-zero-sum and non-additive security game The approximate version of our equivalence theorem Uncertain attacker behavior

Q&A Thanks