Patrolling Games Katerina Papadaki London School of Economics with Alec Morton and Steven Alpern.

Slides:



Advertisements
Similar presentations
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
Advertisements

Lecture 5 Graph Theory. Graphs Graphs are the most useful model with computer science such as logical design, formal languages, communication network,
22C:19 Discrete Math Graphs Fall 2010 Sukumar Ghosh.
Congestion Games with Player- Specific Payoff Functions Igal Milchtaich, Department of Mathematics, The Hebrew University of Jerusalem, 1993 Presentation.
MIT and James Orlin © Game Theory 2-person 0-sum (or constant sum) game theory 2-person game theory (e.g., prisoner’s dilemma)
Study Group Randomized Algorithms 21 st June 03. Topics Covered Game Tree Evaluation –its expected run time is better than the worst- case complexity.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
Approximation Algorithms Chapter 5: k-center. Overview n Main issue: Parametric pruning –Technique for approximation algorithms n 2-approx. algorithm.
Patrolling Games By Steve Alpern, Alec Morton, Katerina Papadaki Presented by: Yan T. Yang.
GOLOMB RULERS AND GRACEFUL GRAPHS
Combinatorial Algorithms
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
Approximation Algorithms: Combinatorial Approaches Lecture 13: March 2.
Online Graph Avoidance Games in Random Graphs Reto Spöhel Diploma Thesis Supervisors: Martin Marciniszyn, Angelika Steger.
1 Delay-efficient Data Gathering in Sensor Networks Bin Tang, Xianjin Zhu and Deng Pan.
Duality Lecture 10: Feb 9. Min-Max theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum Cut Both.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
1 Computing Nash Equilibrium Presenter: Yishay Mansour.
Approximation Algorithms
1 A Shifting Strategy for Dynamic Channel Assignment under Spatially Varying Demand Harish Rathi Advisors: Prof. Karen Daniels, Prof. Kavitha Chandra Center.
Job Scheduling Lecture 19: March 19. Job Scheduling: Unrelated Multiple Machines There are n jobs, each job has: a processing time p(i,j) (the time to.
Finite Mathematics & Its Applications, 10/e by Goldstein/Schneider/SiegelCopyright © 2010 Pearson Education, Inc. 1 of 68 Chapter 9 The Theory of Games.
Small Subgraphs in Random Graphs and the Power of Multiple Choices The Online Case Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas.
Applied Discrete Mathematics Week 12: Trees
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
Packing Element-Disjoint Steiner Trees Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint with Joseph Cheriyan Department.
Game theoretic models for detecting network intrusions OPLab 1.
GRAPH Learning Outcomes Students should be able to:
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
The Multiplicative Weights Update Method Based on Arora, Hazan & Kale (2005) Mashor Housh Oded Cats Advanced simulation methods Prof. Rubinstein.
Network Aware Resource Allocation in Distributed Clouds.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Approximation Algorithms
Chapter 8 PD-Method and Local Ratio (4) Local ratio This ppt is editored from a ppt of Reuven Bar-Yehuda. Reuven Bar-Yehuda.
1 The Price of Defense M. Mavronicolas , V. Papadopoulou , L. Michael ¥, A. Philippou , P. Spirakis § University of Cyprus, Cyprus  University of Patras.
Lecture 6 – Integer Programming Models Topics General model Logic constraint Defining decision variables Continuous vs. integral solution Applications:
Maximum density of copies of a graph in the n-cube John Goldwasser Ryan Hansen West Virginia University.
Alternative Wide Block Encryption For Discussion Only.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Flows in Planar Graphs Hadi Mahzarnia. Outline O Introduction O Planar single commodity flow O Multicommodity flows for C 1 O Feasibility O Algorithm.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
1 Algorithms and Networks Algorithms and Networks 2015/2016 Hans L. Bodlaender Johan M. M. van Rooij.
WHEN PATROLMEN BECOME CORRUPTED: FENCE MONITORING BY UNRELIABLE ROBOTS JUREK CZYZOWICZ (UNIVERSITÉ DU QUÉBEC EN OUTAOUAIS) JOINT WORK WITH L.GĄSIENIEC,
A Theoretical Analysis of Multi-Agent Patrolling Strategies Patrolling = moving through a territory « visiting » areas The patrolling problem = given a.
8/14/04 J. Bard and J. W. Barnes Operations Research Models and Methods Copyright All rights reserved Lecture 6 – Integer Programming Models Topics.
1 a1a1 A1A1 a2a2 a3a3 A2A Mixed Strategies When there is no saddle point: We’ll think of playing the game repeatedly. We continue to assume that.
Vasilis Syrgkanis Cornell University
Lecture 6 – Integer Programming Models Topics General model Logic constraint Defining decision variables Continuous vs. integral solution Applications:
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
C&O 355 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Theory of Computational Complexity Probability and Computing Lee Minseon Iwama and Ito lab M1 1.
Antibandwidth and Cyclic Antibandwidth of Meshes and Hypercubes André Raspaud, Ondrej Sýkora, Heiko Schröder, Ľubomír Török, Imrich Vrťo.
Chapter 8 PD-Method and Local Ratio (5) Equivalence This ppt is editored from a ppt of Reuven Bar-Yehuda. Reuven Bar-Yehuda.
EMIS 8373: Integer Programming
C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta
Graphs: Definitions and Basic Properties
Graphs Hubert Chan (Chapter 9) [O1 Abstract Concepts]
Non-additive Security Games
The minimum cost flow problem
Graph theory Definitions Trees, cycles, directed graphs.
Application of network flow: Protecting coral reef ecosystems
Enumerating Distances Using Spanners of Bounded Degree
Integer Programming (정수계획법)
3.5 Minimum Cuts in Undirected Graphs
Introduction Wireless Ad-Hoc Network
Integer Programming (정수계획법)
EMIS The Maximum Flow Problem: Flows and Cuts Updated 6 March 2008
Presentation transcript:

Patrolling Games Katerina Papadaki London School of Economics with Alec Morton and Steven Alpern

Outline Introduce Patrolling Games on a graph. Applications Types of games. Results for all graphs. Strategy reduction techniques. Solutions for special graphs.

Patrolling Game on a Graph Graph: Q=(N,E) Nodes: N ={1,2,…,n} Edges: E T = time horizon of the game t = 1,…,T Players Attacker: picks a node i and time   to perform the attack and needs m uninterrupted periods at the node for the attack to be successful Patroller: picks a walk w on the graph that lasts T time periods and is successful if the walk intercepts the Attacker during the attack. Pure StrategiesMixed Strategies: Attacker: (i,  ) Playing (i,  ) with probability p(i,  ) Patroller: wPlaying w with probability p(w) We assume:

Patrolling Game on a Graph Space-time Network: n=5, T=8, m=4 patroller picks: w = attacker picks: (i,  ) =(5,2) Since the patroller’s walk does not intercept the attacker the attack is successful

Patrolling Game on a Graph Space-time Network: n=5, T=8, m=4 patroller picks: w = attacker picks: (i,  ) =(5,2) Since the patroller’s walk intercepts the attacker the attack is not successful

Patrolling Game on a Graph The game is a zero-sum game with the following payoff: 1 if (i,  ) is intercepted by w Payoff to the patroller = 0 otherwise Value of the game = probability that the attack is intercepted We denote that game: G(Q, T, m) and the value of the game V(Q, T, m) 01 attackerpatroller

Assumptions We make some simplifying assumptions: The attacker will attack during the time interval: By patrolling as if an attack will take place, the patroller deters the attack on this network and gives an incentive to the attacker to attack another network. The nodes have equal values: Nodes with different values can be easily modelled in the mathematical programming formulations of the game. All games that can be solved computationally, can also be solved using different valued nodes. The nodes on the network are equidistant: This can also be modelled in the mathematical programming formulations.

Applications Security guards patrolling a museum or art gallery. Antiterrorist officers patrolling an airport or shopping mall. Patrolling a virtual network for malware. Police forces patrolling a city containing a number of potential targets for theft, such as jewellery stores. Soldiers patrolling a military territory. Air marshals patrolling an airline network. Inspectors patrolling a container yard or cargo warehouse.

Types of Games Patrolling a Gallery: T = fixed shift (e.g. one working day) We call this the one-off game and denote it G o with value V o. Patrolling an Airport : continuous patrolling We call this the periodic game and we let T be the period. We denote it with G p, V p one-off game: periodic game: attacker can only start attack at nodes 1,2,3. patroller must return to starting node.

Results for all Graphs 1.The Value of the game is non-decreasing in m: the longer the attacker takes to complete the attack, the higher the probability to the attack being intercepted. 2.The Value of the game is non-decreasing in the number of edges |E|: with more edges there are more patrolling paths and thus better for the patroller Monotonicity Results

Results for all Graphs 3.The Value of the periodic game is less than or equal to the value of the open game: the one-off game has more patroller strategies and less attacker strategies. Monotonicity Results

Results for all Graphs 4.If Q’ is obtained from Q by node identification, then since any patrol on Q that intercepts an attack, has a corresponding patrol on Q’ that intercepts the same attack Node Identification one node Q Q’

Results for all Graphs 5.We have: The patroller can guarantee the lower bound by: picking a node equiprobably and waiting there The attacker can guarantee the upper bound by: fixing an attack time interval and attacking at a node equiprobably during that interval; out of these n pure attacker strategies, the patroller can intercept at most m of them, in a time interval of length m The lower bound can be achieved for the disconnected graph with n nodes: Bounds on Value

Results for all Graphs 6.For the special case where is the complete graph with n nodes, Ruckle (1983) has shown that: Hence, Result: For m=1: Henceforth we assume Game with m=1

Strategy Reduction Techniques Symmetrization Adjacency preserving bijections on Q: Nodes 2 and 3 are equivalent There exists an optimal attack strategy that attacks nodes 2 and 3 equiprobably For the periodic game, the time shifted patrols are equivalent the attack intervals are equivalent under some rotation of the time cycle. we only need to consider the attack node not the attack interval. Time symmetrization: Graph symmetrization: Symmetrical Strategies: mixed strategies which give equal probability to equivalent strategies

Strategy Reduction Techniques Dominance Walks w 1, w 2 same except on (t-1, t, t+1). walk w 2 dominates w 1 : If w 1 intercepts an attack (i,  ) then w 2 also intercepts (i,  ). Let 1 be a leaf node connected to node 2: We call node 2 a penultimate node. the attacker should not attack at penultimate nodes. From above, walk w does not duel at a node for 3 consecutive periods. If w intercepts (1,  ) then it must intercept (2,  ). For :

Strategy Reduction Techniques Decomposition Decomposition Result: We have, which holds with equality if the are disjoint in.

Proof Techniques: example Kite Graph Periodic game on Q, with T=3 and m=3: From dominance, we know that attacker would never attack at penultimate node 4, since it is always better to attack at the adjacent leaf node. No feasible patroller strategy that visits both node 5 and any one of 1,2 or 3. Without node 4 the graph decomposes into two graphs Q 1 and Q 2 shown below. From decomposition we have: Q1Q1 Q2Q

Generic Strategies Uniform Attacker Strategy Attacker’s Diametrical Strategy The attacker attacks equiprobably over all time intervals and over all nodes. d(i,j) = minimum number of edges between nodes i and j d = diameter of Q = maximum d(i,j) for all pairs i, j. The attacker picks random attack time  and attacks equiprobably nodes i and j that have distance d. We have: The diametrical strategy guarantees the above upper bound: If m, T are large as compared to d, the best the patroller can do against the diametrical strategy is to go back and forth across the graph diameter (m/2d) If d is large as compared to m, T, the best the patroller can do against the diametrical strategy is to stay at the diametrical nodes and win half the time (1/2).

Solutions for Special Graphs Hamiltonian Graph Any graph with a Hamiltonian cycle: Value (of V o ) is Patroller - Random Hamiltonian patrol: pick a node at random and follow the Hamiltonian cycle in a fixed direction For any attack interval, the nodes visited by the patroller form an m-arc of the Hamiltonian cycle, which contains attack node i with probability m/n. Attacker - uniform attacking strategy, attack equiprobably over time and nodes

Solutions for Special Graphs Hamiltonian Graphs: example Periodic game on Q, T=10, m=4: Q has a Hamiltonian cycle and T=10 is a multiple of n=10:

Solutions for Special Graphs Bipartite Graphs A B No odd cycles We assume: Attacker can guarantee, if he fixes the attack interval and attacks equiprobably on each node of the larger set B. When Q is complete bipartite and a=b, there exists a Hamiltonian cycle and the value is achieved.

Solutions for Special Graphs Bipartite Graphs: The Star Graph : star graph with n nodes : cycle graph with 2(n-1) nodes a = 1, b = n-1 T is a multiple of 2(n-1) By node identification: Since is bipartite: Thus, attack leaf nodes equiprobably patrols leaf nodes every second period

Solutions for Special Graphs Line Graph 123 d = diameter = n-1 The diametrical attacker strategy guarantees the upper bound for the attacker The Hamiltonian patrol on the cycle graph is equivalent to walking up and down the line graph (oscillation strategy). We use node identification, to show that the upper bound is achieved:

Solutions for Special Graphs Consider the line graph with n=3. Let m=2. Line Graph 123 Attacker can guarantee ½ by attacking at the endpoints equiprobably: no walk can intercept both. Patroller can guarantee ½ by playing equiprobably the following oscillations: every attack is intercepted by at least one oscillation.

Current and Future Work Current work: Patrolling a border or a channel: The Line Graph for large n, as compared to m (n >= m+2). Computational work: Show that the problem is NP-complete. For m=2, the game can be formulated as a network flow problem for cases where dwelling at a node is a dominated strategy. Constraint generation methods where the most violated constraints are generated: mixed integer programming is used to find the most violated constraint a heuristic to find a violated constraint Extended Patrolling Games: Multiple patrollers/attackers. Version with in-game observation

The End Thank you.