Infrastructure security games
نویسندگان
چکیده
Infrastructure security against possible attacks involves making decisions under uncertainty. This paper presents game theoretic models of the interaction between an adversary and a first responder in order to study problem of the security within a transportation infrastructure. The risk measure used is based on the consequence of an attack in terms of the number of people affected or the occupancy level of a critical infrastructure, e.g. stations, trains, subway cars, escalators, bridges, etc. The objective of the adversary is to inflict the maximum damage to a transportation network by selecting a set of nodes to attack, while the first responder (emergency management center) allocates resources (emergency personnel or personnel-hours) to the sites of interest in an attempt to find the hidden adversary. This paper considers both static and dynamic, in which the first responder is mobile, games. The unique equilibrium strategy This research has been supported by the Rutgers University TCC/FTA (Transportation Coordinating Council/ Federal Transit Administration) M. Baykal-Gürsoy is a faculty member in the Industrial and Systems Engineering Department, and affiliated with RUTCOR and CAIT, Rutgers University, 96 Frelinghuysen Rd, Piscataway, NJ 08854-801 E-mail: [email protected] Z. Duan is a Ph.D. candidate in the I&SE department, Rutgers University E-mail: [email protected] H. V. Poor is a faculty member in the Department of Electrical Engineering, Princeton University, Princeton, NJ E-mail: [email protected] A. Garnaev is a faculty member in the Department of Computer Modelling and Multi-Processor Systems, Saint Petersburg State University, St Petersburg, Russia, E-mail: [email protected] October 2, 2013 DRAFT Infrastructure Security Games Baykal-Gürsoy et al. pair is given in closed form for the simple static game. For the dynamic game, the equilibrium for the first responder becomes the best patrol policy within the infrastructure. This model uses partially observable Markov decision processes (POMDPs) in which the payoff functions depend on an exogenous people flow, and thus, are time varying. A numerical example illustrating the algorithm is presented to evaluate an equilibrium strategy pair.
منابع مشابه
Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources
Game theory has become an important tools for making resource allocations decision in security domains, including critical infrastructure protection. Many of these games are formulated as Stackelberg security games. We present new analysis and algorithms for a class of Stackelberg security games with identical, fully protective defender resources. The first algorithm has worst-case complexity l...
متن کاملStackelberg Security Games (SSG) Basics and Application Overview
Security is a critical concern around the world, whether it is the challenge of protecting ports, airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and money, protecting endangered species, forests and fisheries, suppressing urban crime or security in cyberspace. Unfortunately, limited security resources prevent full security coverage at all times; inst...
متن کاملRandomizing Security Activities with Attacker Circumvention Strategies
Game theoretic methods for making resource allocation decision in security domains have attracted growing attention from both researchers and security practitioners, including deployed applications at both the LAX airport and the Federal Air Marshals Service. We develop a new class of security games designed to model decisions faced by the Transportation Security Administration and other agenci...
متن کاملA Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture)
There has been a growing interest in decision and game theoretic approaches to networked system security as evidenced by the increasing number of publications and conferences such as the Conference on Decision and Game Theory for Security (GameSec). This presentation aims to give an overview on security games and their applications to network and critical infrastructure security based on the re...
متن کاملA Branch and Price Approach to Solving Security Games with Arbitrary Scheduling Constraints
Algorithms to solve security games have seen successful real-world deployment by LAX police and the Federal Air Marshal Service. These algorithms provide randomized schedules to optimally allocate limited security resources for infrastructure protection. Unfortunately, these algorithms fail to scale-up or to provide a correct solution for massive security games with arbitrary scheduling constra...
متن کاملMinimum Support Size of the Defender’s Strong Stackelberg Equilibrium Strategies in Security Games
Stackelberg security games have been applied to address challenges in security resource allocation of realworld infrastructure protection tasks. The key to such an application is to efficiently compute the defender’s optimal strategy in consideration of the attacker’s surveillance capability and best response. Experimental results show that the defender’s optimal strategy often uses only a smal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- European Journal of Operational Research
دوره 239 شماره
صفحات -
تاریخ انتشار 2014