Computing Optimal Randomized Resource Allocations for Massive Security Games Presenter : Jen Hua Chi Advisor : Yeong Sung Lin.

Slides:



Advertisements
Similar presentations
N. Basilico, N. Gatti, F. Amigoni DEI, Politecnico di Milano Leader-Follower Strategies for Robotic Patrolling in Environments with Arbitrary Topology.
Advertisements

Operating System Security
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 3.1.Dynamic Games of Complete but Imperfect Information Lecture
Continuation Methods for Structured Games Ben Blum Christian Shelton Daphne Koller Stanford University.
1 University of Southern California Keep the Adversary Guessing: Agent Security by Policy Randomization Praveen Paruchuri University of Southern California.
This Segment: Computational game theory Lecture 1: Game representations, solution concepts and complexity Tuomas Sandholm Computer Science Department Carnegie.
Mixed Strategies CMPT 882 Computational Game Theory Simon Fraser University Spring 2010 Instructor: Oliver Schulte.
6.896: Topics in Algorithmic Game Theory Lecture 11 Constantinos Daskalakis.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games Praveen Paruchuri, Jonathan P. Pearce, Sarit Kraus Catherine.
Preference Elicitation Partial-revelation VCG mechanism for Combinatorial Auctions and Eliciting Non-price Preferences in Combinatorial Auctions.
Online Scheduling with Known Arrival Times Nicholas G Hall (Ohio State University) Marc E Posner (Ohio State University) Chris N Potts (University of Southampton)
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
Security via Strategic Randomization Milind Tambe Fernando Ordonez Praveen Paruchuri Sarit Kraus (Bar Ilan, Israel) Jonathan Pearce, Jansuz Marecki James.
Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Duality Lecture 10: Feb 9. Min-Max theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum Cut Both.
An Introduction to Game Theory Part III: Strictly Competitive Games Bernhard Nebel.
1 A Second Stage Network Recourse Problem in Stochastic Airline Crew Scheduling Joyce W. Yen University of Michigan John R. Birge Northwestern University.
1 University of Southern California Security in Multiagent Systems by Policy Randomization Praveen Paruchuri, Milind Tambe, Fernando Ordonez University.
1 Worst-Case Equilibria Elias Koutsoupias and Christos Papadimitriou Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science.
Finite Mathematics & Its Applications, 10/e by Goldstein/Schneider/SiegelCopyright © 2010 Pearson Education, Inc. 1 of 68 Chapter 9 The Theory of Games.
1 Combinatorial Problems in Cooperative Control: Complexity and Scalability Carla Gomes and Bart Selman Cornell University Muri Meeting March 2002.
MODEL FOR FLIGHT LEVEL ASSIGNMENT PROBLEM ICRAT International Conference on Research in Air Transportation Alfred Bashllari National & Kapodistrian.
Commitment without Regrets: Online Learning in Stackelberg Security Games Nika Haghtalab Carnegie Mellon University Joint work with Maria-Florina Balcan,
CPS 173 Security games Vincent Conitzer
Stevenson and Ozgur First Edition Introduction to Management Science with Spreadsheets McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Elements of the Heuristic Approach
Presenter: Jen-Hua Chi Advisor: Frank, Yeong-Sung Lin
Game Theory for Security: Lessons Learned from Deployed Applications Milind Tambe Chris Kiekintveld Richard John & teamcore.usc.edu.
The Multiplicative Weights Update Method Based on Arora, Hazan & Kale (2005) Mashor Housh Oded Cats Advanced simulation methods Prof. Rubinstein.
Software Pipelining for Stream Programs on Resource Constrained Multi-core Architectures IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEM 2012 Authors:
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
Transformation of Timed Automata into Mixed Integer Linear Programs Sebastian Panek.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Introduction A GENERAL MODEL OF SYSTEM OPTIMIZATION.
1 Exploring Custom Instruction Synthesis for Application-Specific Instruction Set Processors with Multiple Design Objectives Lin, Hai Fei, Yunsi ACM/IEEE.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Patrolling Games Katerina Papadaki London School of Economics with Alec Morton and Steven Alpern.
Chapter 1. Formulations 1. Integer Programming  Mixed Integer Optimization Problem (or (Linear) Mixed Integer Program, MIP) min c’x + d’y Ax +
Optimal Voting Strategy Against Rational Attackers th International Conference on Risks and Security of Internet and Systems (CRiSIS) Presenter:
CHECKERS: TD(Λ) LEARNING APPLIED FOR DETERMINISTIC GAME Presented By: Presented To: Amna Khan Mis Saleha Raza.
Linear Programming Erasmus Mobility Program (24Apr2012) Pollack Mihály Engineering Faculty (PMMK) University of Pécs João Miranda
Game-theoretic Resource Allocation for Protecting Large Public Events Yue Yin 1, Bo An 2, Manish Jain 3 1 Institute of Computing Technology, Chinese Academy.
Computing and Approximating Equilibria: How… …and What’s the Point? Yevgeniy Vorobeychik Sandia National Laboratories.
CPS 570: Artificial Intelligence Game Theory Instructor: Vincent Conitzer.
1 a1a1 A1A1 a2a2 a3a3 A2A Mixed Strategies When there is no saddle point: We’ll think of playing the game repeatedly. We continue to assume that.
D Nagesh Kumar, IIScOptimization Methods: M8L5 1 Advanced Topics in Optimization Evolutionary Algorithms for Optimization and Search.
Dominance and Indifference in Airline Planning Decisions NEXTOR Conference: INFORMS Aviation Session June 2 – 5, 2003 Amy Mainville Cohn, KoMing Liu, and.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
5.1.Static Games of Incomplete Information
ECO290E: Game Theory Lecture 8 Games in Extensive-Form.
Constraint Programming for the Diameter Constrained Minimum Spanning Tree Problem Thiago F. Noronha Celso C. Ribeiro Andréa C. Santos.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Keep the Adversary Guessing: Agent Security by Policy Randomization
Hello everyone, welcome to this talk about~~~
C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta
Non-additive Security Games
Application of network flow: Protecting coral reef ecosystems
Panel: Theory and fundamental understanding of network system resiliency, performance and usability Ness B. Shroff Electrical and Computer Engineering.
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security Fang et al.
When Security Games Go Green
Integer Programming (정수계획법)
1.206J/16.77J/ESD.215J Airline Schedule Planning
Multiagent Systems Repeated Games © Manfred Huber 2018.
Integer Programming (정수계획법)
Selfish Load Balancing
Lecture 20 Linear Program Duality
M9302 Mathematical Models in Economics
Chapter 1. Formulations.
Normal Form (Matrix) Games
Presentation transcript:

Computing Optimal Randomized Resource Allocations for Massive Security Games Presenter : Jen Hua Chi Advisor : Yeong Sung Lin

Agenda  Introduction  Stackelberg games  Compact Security Game Model  Algorithms: ERASER, ORIGAMI, ORIGAMI-MILP, ERASER (-C)  Evaluation 2

Introduction  Motivation : Providing security for transportation systems, computer networks, and other critical infrastructure.  Recent work : Paruchuri et. al. uses a game-theoretic approach to create randomized security policies for traffic checkpoints and canine patrols at the Los Angeles International Airport (LAX). 3

Introduction  A limitation of existing solution methods : 1. Size 2. Computing infeasible  Now: subway systems, random baggage screening, container inspections at ports, and scheduling for the Federal Air Marshals Service.  US commercial airlines fly 27,000 domestic flights and over 2000 international flight each day. The Federal Air Marshal Service (FAMS) has law enforcement authority for commercial air transportation.  Flights should not necessarily have equal weighting in a randomized schedule. 4

Introduction  Key questions : 1.How to efficiently allocate resources to protect against a wide variety of potential threats? 2.The adversarial aspect of security domains poses unique challenges for resource allocation.  Randomization => Game Theory 5

Problems  An individual air marshal’s potential departures are constrained by their current location, and schedules must account for flight and transition times.  Normal form of Stackelberg game model can only present the the cost of a combinatorial explosion in the size of the strategy space and payoff representation. => Compact Security Game Model 6

Introduction  New techniques: 1. Randomized security resource allocation 2. First algorithm (ERASER) Dramatically reduce both space and time requirements for the multiple-resource case 3. Two additional algorithms: (ORIGAMI, ORIGAMI-MILP) Improving performance 4. Incorporating additional scheduling and resource constraints into the model: ERASER-C 7

Agenda  Introduction  Stackelberg games  Compact Security Game Model  Algorithms: ERASER, ORIGAMI, ORIGAMI-MILP, ERASER (-C)  Evaluation 8

Stackelberg Games  Stackelberg Games  A ‘leader’ moves first, and the ‘follower’ observes the leader’s strategy before acting.  Related games: border patrolling, computer job scheduling, security patrolling.  It can models the capability of malicious attackers to employ surveillance in planning attacks. 9

Stackelberg Games  Normal form: 1. Two players: a defender, Θ an attacker, ψ 2. Pure strategy set: σ Θ Є Σ Θ, σ ψ Є Σ ψ 3. Mixed strategy set: δ Θ Є Δ Θ, δ ψ Є Δ ψ 4. Payoffs for each player: Ω Θ : Σ ψ x Σ Θ  R 5. Attacker’s strategy function: F ψ : Δ Θ  Δ ψ 10

Stackelberg Equilibrium  It is a form of subgame perfect equilibrium.  Subgame : partial sequences of actions  Two types of unique Stackelberg equilibria: 1. Strong 2. Weak  A strong Stackelberg equilibrium exists in all Stackelberg games, but a weak Stackelberg equilibrium may not. 11

Definition 1 Attacker 根據 defender 行為, 選擇對應的策略 Attacker 從 mixed strategy set 中任意選擇 12

Agenda  Introduction  Stackelberg games  Compact Security Game Model  Algorithms: ERASER, ORIGAMI, ORIGAMI-MILP, ERASER (-C)  Evaluation 13

Compact Security Game Model  A set of targets that may be attacked: T = {t 1, …, t n }  A set of resources available to cover these targets, R = {r 1,..., r m } (all resources are identical)  Four payoffs of each target:  Example payoffs for an attack on a target. CoveredUncovered Defender Attacker CoveredUncovered Defender5-20 Attacker

Compact Security Game Model  Restrict to attack a single target with probability 1 15 VectorMeaning CA coverage vector ctct The probability that each target is covered AThe probability of attacking a target

Compact Security Game Model CoveredUncovered 16

Compact Security Game Model  In a strong Stackelberg equilibrium, the attacker selects the target in the attack set with maximum payoff for the defender.  Let t ∗ denote this optimal target  PlayersThe expected SSE payoff Defender Attacker 17

Compact Security Game Model  Any security game represented in this compact form can also be represented in normal form.  Attack vector A  attacker’s pure strategies  For the defender, each possible allocation of resources corresponds to a pure strategy in the normal form.  There are n choose m ways to allocate m resources to n targets. 18

Compact Security Game Model 19

Compact Security Game Model FormPlayerStrategyPayoff function size Compact form Defendern continuous variables 4n variables Attackern continuous variables Normal form Defendern Choose m variablesn(n Choose m) Attackern continuous variables 20

Agenda  Introduction  Stackelberg games  Compact Security Game Model  Algorithms: ERASER, ORIGAMI, ORIGAMI-MILP, ERASER (-C)  Evaluation 21

ERASER  ERASER algorithm (Efficient Randomized Allocation of SEcurity Resources) 1. Input: a security game in compact form 2. A mixed-integer linear program (MILP) 22

ERASER max d (5) a t ∈ {0, 1} ∀ t ∈ T (6) Σ t ∈ T a t = 1 (7) c t ∈ [0, 1] ∀ t ∈ T (8) Σ t ∈ T c t ≤ m (9) d − U Θ (t,C) ≤ (1 − a t ) Z ∀ t ∈ T (10) 0 ≤ k − U Ψ (t,C) ≤(1 − a t ) Z ∀ t ∈ T (11) U Ψ (t,C) ≤ k 23

ERASER  THEOREM 1. For any feasible ERASER coverage vector, there is a corresponding mixed strategy δ Θ that implements the desired coverage probabilities.  THEOREM 2. A pair of attack and coverage vectors (C,A) is optimal for the ERASER MILP correspond to at least one SSE of the game. 24

Compact Security Game Model 25

Compact Security Game Model 26

ORIGAMI algorithm 27

ORIGAMI algorithm 28

ORIGAMI algorithm  THEOREM 3. ORIGAMI computes a coverage vector C that is optimal for the ERASER MILP, and is therefore consistent with a SSE of the security game. 29

ORIGAMI- MILP  ORIGAMI algorithm + MILP algorithm min k (12) γ t ∈ {0, 1} ∀ t ∈ T (13) c t ∈ [0, 1] ∀ t ∈ T (14) Σ t ∈ T c t ≤ m (15) U Ψ (t,C) ≤ k ∀ t ∈ T (16) k − U Ψ (t,C) ≤ (1 − γ t ) ・ Z ∀ t ∈ T (17) c t ≤ γ t ∀ t ∈ T (18) 30

ORIGAMI- MILP  THEOREM 4. ORIGAMI-MILP generates an optimal solution for the ERASER MILP. 31

Resource constraints  Modeling air marshals as resources, flights as targets, with payoffs defined by expert risk analysis.  Resource types can be used to specify different sets of legal schedules for each resource.  Adding these constraints effectively reduces the space of feasible coverage vectors.  Example:

ERASER-C (constrained) . Adding the capability to represent certain kinds of resource and scheduling constraints  The first extension allows resources to be assigned to schedules covering multiple targets.  The second extension introduces resource types,Ω = {ω 1,..., ω v }. 33

ERASER-C (constrained)  Variables MeaningVariables/ Functions The relationship between targets and schedules M : S × T → {0, 1} The number of available resources of each type R(ω) Coverage capabilities for each type Ca : S × Ω → {0, 1} The total probability that is assigned to each schedule by all resource types q The probability assigned to a schedule by a specific type of resource h Large constant, relative to the maximum payoff Z 34

ERASER-C (constrained) max d (19) a t ∈ {0, 1} ∀ t ∈ T (20) c t ∈ [0, 1] ∀ t ∈ T (21) q s ∈ [0, 1] ∀ s ∈ S (22) h s,ω ∈ [0, 1] ∀ s, ω ∈ S × Ω (23) Σ t ∈ T a t = 1 (24) Σ ω ∈ Ω h s,ω = q s ∀ s ∈ S (25) Σ s ∈ S q s M(s, t) = c t ∀ t ∈ T (26) Σ s ∈ S h s,ω Ca(s, ω)≤ R(ω) ∀ ω ∈ Ω (27) h s,ω ≤ Ca(s, ω) ∀ s, ω ∈ S × Ω (28) d − U Θ (t,C) ≤ (1 − a t ) ・ Z ∀ t ∈ T (29) 0 ≤ k − U Ψ (t,C)≤ (1 − a t ) ・ Z ∀ t ∈ T (30) 35

Agenda  Introduction  Stackelberg games  Compact Security Game Model  Algorithms: ERASER, ORIGAMI, ORIGAMI-MILP, ERASER (-C)  Evaluation 36

Evaluation  DOBSS  The ordering of the algorithms in terms of the size of the class of games: ORIGAMI/ORIGAMI-MILP ⊂ ERASER ⊂ ERASER-C ⊂ DOBSS.  First set of experiments: Compares the performance of DOBSS, ERASER, and ERASER-C on random game instances.  Next comparison: ERASER, ORIGAMI, and ORIGAMI-MILP on much larger instances that DOBSS is unable to solve.  Final experiment: Compares the algorithms on relevant example games for the LAX and FAMS domains. 37

Evaluation (The first set of tests) (a) Runtimes for DOBSS, ERASER, and ERASER-C (b) Memory use of DOBSS, ERASER, and ERASER-C 38

Evaluation (The first set of tests)  Comparing the performance of ERASER-C and DOBSS on games.  Random game instances now include schedules, resource types, and coverage mappings.  We test games with 3 resource types, and availability of [3, 3, 2] for each type.  There are twice as many schedules as targets, and each schedule covers a randomly-selected set of two targets. (c) Runtimes for DOBSS and ERASER-C (d) Memory use of DOBSS and ERASER-C 39

Evaluation (The second set of tests)  Comparing the performance of ERASER, ORIGAMI, and ORIGAMI-MILP on very large games well beyond the limits of DOBSS. (e)Runtime scaling of ERASER, ORIGAMI, and ORIGAMI-MILP (f)Runtime scaling of ORIGAMI, and ORIGAMI-MILP Comparing the runtimes of the three algorithms on games with 25 resources and up to 3000 targets. Comparing the runtimes of the two algorithms on games with 1000 resources and up to 4000 targets. 40

Evaluation (Real data) ActionsDOBSSERASER (-C) LAX (6 canines) s0.23s FAMS (small)~6, s0.09s FAMS (large)~85, s*1.57s Table 2: Runtimes on real data. Both examples cover a one week period, but cover different foreign and domestic airports to generate "small" and "large" tests. 41

Limitation  Additional constraints are necessary if there are odd cycles possible in the schedules. 42

Thanks for your attention