Computing equilibria of security games using linear integer programming Dima Korzhyk

Slides:



Advertisements
Similar presentations
Approximate Nash Equilibria in interesting games Constantinos Daskalakis, U.C. Berkeley.
Advertisements

Preprocessing Techniques for Computing Nash Equilibria Vincent Conitzer Duke University Based on: Conitzer and Sandholm. A Generalized Strategy Eliminability.
CPS Extensive-form games Vincent Conitzer
Vincent Conitzer CPS Repeated games Vincent Conitzer
1 University of Southern California Keep the Adversary Guessing: Agent Security by Policy Randomization Praveen Paruchuri University of Southern California.
Game Theoretical Insights in Strategic Patrolling: Model and Analysis Nicola Gatti – DEI, Politecnico di Milano, Piazza Leonardo.
ECO290E: Game Theory Lecture 5 Mixed Strategy Equilibrium.
Calibrated Learning and Correlated Equilibrium By: Dean Foster and Rakesh Vohra Presented by: Jason Sorensen.
MIT and James Orlin © Game Theory 2-person 0-sum (or constant sum) game theory 2-person game theory (e.g., prisoner’s dilemma)
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games Praveen Paruchuri, Jonathan P. Pearce, Sarit Kraus Catherine.
Learning in games Vincent Conitzer
Algorithms for solving two- player normal form games Tuomas Sandholm Carnegie Mellon University Computer Science Department.
General-sum games You could still play a minimax strategy in general- sum games –I.e., pretend that the opponent is only trying to hurt you But this is.
Extensive-form games. Extensive-form games with perfect information Player 1 Player 2 Player 1 2, 45, 33, 2 1, 00, 5 Players do not move simultaneously.
Security via Strategic Randomization Milind Tambe Fernando Ordonez Praveen Paruchuri Sarit Kraus (Bar Ilan, Israel) Jonathan Pearce, Jansuz Marecki James.
Equilibrium Concepts in Two Player Games Kevin Byrnes Department of Applied Mathematics & Statistics.
Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
An Introduction to Game Theory Part II: Mixed and Correlated Strategies Bernhard Nebel.
Computational problems, algorithms, runtime, hardness
Chapter Twenty-Eight Game Theory. u Game theory models strategic behavior by agents who understand that their actions affect the actions of other agents.
1 Computing Nash Equilibrium Presenter: Yishay Mansour.
AWESOME: A General Multiagent Learning Algorithm that Converges in Self- Play and Learns a Best Response Against Stationary Opponents Vincent Conitzer.
An Introduction to Game Theory Part III: Strictly Competitive Games Bernhard Nebel.
Stackelberg Scheduling Strategies By Tim Roughgarden Presented by Alex Kogan.
1 University of Southern California Security in Multiagent Systems by Policy Randomization Praveen Paruchuri, Milind Tambe, Fernando Ordonez University.
1 Algorithms for Computing Approximate Nash Equilibria Vangelis Markakis Athens University of Economics and Business.
IP modeling techniques II
Games of Incomplete Information. These games drop the assumption that players know each other’s preferences. Complete info: players know each other’s preferences.
Commitment without Regrets: Online Learning in Stackelberg Security Games Nika Haghtalab Carnegie Mellon University Joint work with Maria-Florina Balcan,
Minimax strategies, Nash equilibria, correlated equilibria Vincent Conitzer
CPS Learning in games Vincent Conitzer
CPS 173 Security games Vincent Conitzer
A Lyapunov Optimization Approach to Repeated Stochastic Games Michael J. Neely University of Southern California Proc.
Mechanisms for Making Crowds Truthful Andrew Mao, Sergiy Nesterko.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
CPS LP and IP in Game theory (Normal-form Games, Nash Equilibria and Stackelberg Games) Joshua Letchford.
Game theory & Linear Programming Steve Gu Mar 28, 2008.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Game-theoretic Resource Allocation for Protecting Large Public Events Yue Yin 1, Bo An 2, Manish Jain 3 1 Institute of Computing Technology, Chinese Academy.
Pricing with Markups in Competitive Markets with Congestion Nicolás Stier-Moses, Columbia Business School Joint work with José Correa, Universidad Adolfo.
Algorithms for solving two-player normal form games
CPS 570: Artificial Intelligence Game Theory Instructor: Vincent Conitzer.
1. 2 Some details on the Simplex Method approach 2x2 games 2xn and mx2 games Recall: First try pure strategies. If there are no saddle points use mixed.
1 Algorithms for Computing Approximate Nash Equilibria Vangelis Markakis Athens University of Economics and Business.
Vincent Conitzer CPS Learning in games Vincent Conitzer
Econ 805 Advanced Micro Theory 1 Dan Quint Fall 2009 Lecture 1 A Quick Review of Game Theory and, in particular, Bayesian Games.
2.5 The Fundamental Theorem of Game Theory For any 2-person zero-sum game there exists a pair (x*,y*) in S  T such that min {x*V. j : j=1,...,n} =
Commitment to Correlated Strategies Vince Conitzer and Dima Korzhyk.
Yuan Deng Vincent Conitzer Duke University
Keep the Adversary Guessing: Agent Security by Policy Randomization
Nash Equilibrium: P or NP?
Hello everyone, welcome to this talk about~~~
C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta
A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
Non-additive Security Games
Vincent Conitzer CPS Repeated games Vincent Conitzer
Panel: Theory and fundamental understanding of network system resiliency, performance and usability Ness B. Shroff Electrical and Computer Engineering.
When Security Games Go Green
Commitment to Correlated Strategies
CPS Extensive-form games
Vincent Conitzer Repeated games Vincent Conitzer
Vincent Conitzer Extensive-form games Vincent Conitzer
CPS 173 Extensive-form games
Instructor: Vincent Conitzer
Game theory review for agent design tutorial
Normal Form (Matrix) Games
A Technique for Reducing Normal Form Games to Compute a Nash Equilibrium Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University, Computer Science.
Vincent Conitzer CPS Repeated games Vincent Conitzer
Presentation transcript:

Computing equilibria of security games using linear integer programming Dima Korzhyk

Problem Description Targets t Utilities Resources n d, n a

Mixed strategies Defender strategy: probability of defending target t is d t, s.t. Attacker strategy: similarly, the probability of attacking t is a t, s.t.

Stackelberg strategy The defender commits to a mixed strategy d The attacker observes d and plays a best response a Note that the attacker’s best response doesn’t need to be randomized, so we can assume a is binary

Stackelberg – first formulation

Trick – fixing an implication with a binary right-hand side Suppose b is binary and we have implication if g(x) > 0 then b=1 Fix this as follows: b >= g(x) / M Here M is a sufficiently large number

Fixed conditions We can rewrite the implication As

Fixing the objective Note that the objective contains a product of two variables a t and d t

Trick – fixing a product of a binary and a continuous variable in the objective Suppose the objective is Maximize bx Where b is binary, and x>=0 is a continuous variable. Replace this with Maximize v v <= x v <= bM Where M is a sufficiently large number

MIP for computing a Stackelberg strategy

Nash equilibrium Find a pair of mixed strategies d,a such that both players are best-responding. d,a are not binary.

Trick – fixing the implications [aimms.com] Suppose we have an implication IF [g(x) > 0] THEN [h(x) > 0] This is equivalent to [g(x) 0] Now, we can use the either-or trick (next slide)

Either-Or Trick Suppose we have a constraint [g(x)>0] OR [h(x)>0] We need to change this to AND Replace with the following: g(x) + M b > 0 h(x) + M (1-b) > 0 where M is a sufficiently large number b is binary

Fixing the implications in the NE program

MIP for computing a Nash equilibrium

Scaling of the NE MIP in the number of targets/variables

Conclusion NE MIP is simpler than a specialized algorithm, but may take longer to execute A benefit is that we can combine the two MIPs in this presentation to find a defender strategy that is both a Stackelberg and a Nash strategy

Thank you! I thank Vince Conitzer, Ron Parr for detailed discussions.

References Security games (with a single attacker resource) were introduced in: Christopher Kiekintveld, Manish Jain, Jason Tsai, James Pita, Fernando Ordóñez, and Milind Tambe. Computing Optimal Randomized Resource Allocations for Massive Security Games. AAMAS Computing a Stackelberg strategy in a security game with multiple attacker resources s is NP-hard: Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintveld, Vincent Conitzer, and Milind Tambe. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. AAMAS Computing a Nash equilibrium in security games with multiple attacker resources can be done in polynomial time. The algorithm by Dmytro Korzhyk, Vincent Conitzer, Ronald Parr is currently unpublished and is under submission. Some of the integer programming tricks in this presentation were taken from AIMMS Modeling Guide