Infrastructure security games

نویسندگان

  • Melike Baykal-Gursoy
  • Zhe Duan
  • H. Vincent Poor
  • Andrey Garnaev
چکیده

Infrastructure security against possible attacks involves making decisions under uncertainty. This paper presents game theoretic models of the interaction between an adversary and a first responder in order to study problem of the security within a transportation infrastructure. The risk measure used is based on the consequence of an attack in terms of the number of people affected or the occupancy level of a critical infrastructure, e.g. stations, trains, subway cars, escalators, bridges, etc. The objective of the adversary is to inflict the maximum damage to a transportation network by selecting a set of nodes to attack, while the first responder (emergency management center) allocates resources (emergency personnel or personnel-hours) to the sites of interest in an attempt to find the hidden adversary. This paper considers both static and dynamic, in which the first responder is mobile, games. The unique equilibrium strategy This research has been supported by the Rutgers University TCC/FTA (Transportation Coordinating Council/ Federal Transit Administration) M. Baykal-Gürsoy is a faculty member in the Industrial and Systems Engineering Department, and affiliated with RUTCOR and CAIT, Rutgers University, 96 Frelinghuysen Rd, Piscataway, NJ 08854-801 E-mail: [email protected] Z. Duan is a Ph.D. candidate in the I&SE department, Rutgers University E-mail: [email protected] H. V. Poor is a faculty member in the Department of Electrical Engineering, Princeton University, Princeton, NJ E-mail: [email protected] A. Garnaev is a faculty member in the Department of Computer Modelling and Multi-Processor Systems, Saint Petersburg State University, St Petersburg, Russia, E-mail: [email protected] October 2, 2013 DRAFT Infrastructure Security Games Baykal-Gürsoy et al. pair is given in closed form for the simple static game. For the dynamic game, the equilibrium for the first responder becomes the best patrol policy within the infrastructure. This model uses partially observable Markov decision processes (POMDPs) in which the payoff functions depend on an exogenous people flow, and thus, are time varying. A numerical example illustrating the algorithm is presented to evaluate an equilibrium strategy pair.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources

Game theory has become an important tools for making resource allocations decision in security domains, including critical infrastructure protection. Many of these games are formulated as Stackelberg security games. We present new analysis and algorithms for a class of Stackelberg security games with identical, fully protective defender resources. The first algorithm has worst-case complexity l...

متن کامل

Stackelberg Security Games (SSG) Basics and Application Overview

Security is a critical concern around the world, whether it is the challenge of protecting ports, airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and money, protecting endangered species, forests and fisheries, suppressing urban crime or security in cyberspace. Unfortunately, limited security resources prevent full security coverage at all times; inst...

متن کامل

Randomizing Security Activities with Attacker Circumvention Strategies

Game theoretic methods for making resource allocation decision in security domains have attracted growing attention from both researchers and security practitioners, including deployed applications at both the LAX airport and the Federal Air Marshals Service. We develop a new class of security games designed to model decisions faced by the Transportation Security Administration and other agenci...

متن کامل

A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture)

There has been a growing interest in decision and game theoretic approaches to networked system security as evidenced by the increasing number of publications and conferences such as the Conference on Decision and Game Theory for Security (GameSec). This presentation aims to give an overview on security games and their applications to network and critical infrastructure security based on the re...

متن کامل

A Branch and Price Approach to Solving Security Games with Arbitrary Scheduling Constraints

Algorithms to solve security games have seen successful real-world deployment by LAX police and the Federal Air Marshal Service. These algorithms provide randomized schedules to optimally allocate limited security resources for infrastructure protection. Unfortunately, these algorithms fail to scale-up or to provide a correct solution for massive security games with arbitrary scheduling constra...

متن کامل

Minimum Support Size of the Defender’s Strong Stackelberg Equilibrium Strategies in Security Games

Stackelberg security games have been applied to address challenges in security resource allocation of realworld infrastructure protection tasks. The key to such an application is to efficiently compute the defender’s optimal strategy in consideration of the attacker’s surveillance capability and best response. Experimental results show that the defender’s optimal strategy often uses only a smal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • European Journal of Operational Research

دوره 239  شماره 

صفحات  -

تاریخ انتشار 2014