computing game theoretic solutions for security
play

Computing Game-Theoretic Solutions for Security Vincent Conitzer - PowerPoint PPT Presentation

Computing Game-Theoretic Solutions for Security Vincent Conitzer Dmytro Korzhyk Dmytro Korzhyk Joshua Letchford Joshua Letchford Duke University overview article: V. Conitzer. Computing Game-Theoretic Solutions and Applications to Security.


  1. Computing Game-Theoretic Solutions for Security Vincent Conitzer Dmytro Korzhyk Dmytro Korzhyk Joshua Letchford Joshua Letchford Duke University overview article: V. Conitzer. Computing Game-Theoretic Solutions and Applications to Security. Proc. AAAI’12.

  2. Real-world security applications Milind Tambe’s TEAMCORE group (USC) Airport sec rit Airport security • Where should checkpoints, canine units, etc. be deployed? deployed? Federal Air Marshals Which flights get a FAM ? FAM ? • Whi h fli ht t US Coast Guard US Coast Guard • Which patrol routes should be followed?

  3. Penalty kick example probability .7 probability .3 action probability 1 Is this a action action “rational” probability .6 outcome? If not, what probability .4 is?

  4. Penalty kick (also known as: matching pennies) .5 .5 L L R R 0, 0 0 0 -1 1 1, 1 .5 5 L L -1 1 1, 1 0 0 0, 0 .5 5 R R

  5. Security example Terminal A Terminal B action action action

  6. Security game y g A B 0, 0 -1, 2 A -1, 1 0, 0 B

  7. Modeling and representing games THIS TALK 2, 2 -1, 0 (unless -7 -8 -7, -8 0 0 0, 0 specified specified otherwise) normal-form games extensive-form games Bayesian games Bayesian games stochastic games action-graph games graphical games hi l [L [Leyton-Brown & Tennenholtz IJCAI’03 B & T h l IJCAI’03 [Bhat & Leyton-Brown, UAI’04] [Kearns, Littman, Singh UAI’01] MAIDs [Jiang, Leyton-Brown, Bhat GEB’11] [Koller & Milch. IJCAI’01/GEB’03]

  8. How to defend penalties Them L R 0, 0 -1, 1 L Us Us -1, 1 0, 0 R • Assume opponent knows our strategy… – hopeless? • … but we can use randomization • If we play L 60% R 40% If we play L 60%, R 40%... • … opponent will play R… • … we get .6*(-1) + .4*(0) = -.6 t 6*( 1) 4*(0) 6 • Better: L 50%, R 50% guarantees -.5 (optimal)

  9. A locally more popular sport go for 3 go for 2 go for 3 go for 2 0, 0 , -2, 2 , defend the 3 -3 3 3, 3 0 0 0, 0 defend the 2 defend the 2

  10. Solving basketball Them 3 2 0, 0 -2, 2 3 Us Us -3, 3 0, 0 2 • If we 50% of the time defend the 3, opponent will shoot 3 – We get .5*(-3) + .5*(0) = -1.5 g ( ) ( ) • Should defend the 3 more often: 60% of the time • • Opponent has choice between Opponent has choice between – Go for 3: gives them .6*(0) + .4*(3) = 1.2 – Go for 2: gives them .6*(2) + .4*(0) = 1.2 G f 2 i th 6*(2) 4*(0) 1 2 • We get -1.2 (the maximin value)

  11. Let’s change roles Them 3 2 0, 0 -2, 2 3 Us Us -3, 3 0, 0 2 • Suppose we know their strategy • If 50% of the time they go for 3, then we defend 3 y g , – We get .5*(0)+.5*(-2) = -1 von Neumann’s minimax theorem [1928]: maximin • Optimal for them: 40% of the time go for 3 Optimal for them: 40% of the time go for 3 value = minimax value (~ linear programming duality) – If we defend 3, we get .4*(0)+.6*(-2) = -1.2 – If we defend 2, we get .4 (-3)+.6 (0) = -1.2 If we defend 2 we get 4*( 3)+ 6*(0) = 1 2 • This is the minimax value

  12. Example linear program • We make reproductions of W k d ti f two paintings maximize 3x + 2y y subject to 4x + 2y ≤ 16 x + 2y ≤ 8 • Painting 1 sells for $3, painting 2 sells for $2 sells for $2 x + y ≤ 5 x + y ≤ 5 • Painting 1 requires 4 units of x ≥ 0 x 0 blue, 1 green, 1 red , g , • Painting 2 requires 2 blue, 2 y ≥ 0 green, 1 red g , • We have 16 units blue, 8 green, 5 red

  13. Solving the linear program graphically maximize 3x + 2y 8 subject to 4x + 2y ≤ 16 6 x + 2y ≤ 8 4 optimal solution: x + y ≤ 5 x + y ≤ 5 x=3, y=2 3 2 x ≥ 0 x 0 2 y ≥ 0 0 2 4 6 8

  14. Solving for minimax strategies using linear programming • maximize u • subject to • subject to for any c , Σ r p r u R (r, c) ≥ u Σ r p r = 1 Can also convert linear programs to two-player zero-sum games, so they are equivalent g y q

  15. Some of the questions raised • Equilibrium selection? D S D 0 0 0, 0 -1 1 -1, 1 S 1, -1 -5, -5 • How should we model temporal / information • How should we model temporal / information 2, 2 -1, 0 structure? -7, -8 0, 0 • What structure should utility functions have? • Do our algorithms scale? • Do our algorithms scale?

  16. Observing the defender’s distribution in security Terminal A Terminal B observe Mo Tu We Th Fr Sa This model is not uncontroversial… [Pita, Jain, Tambe, Ordóñez, Kraus AIJ’10; Korzhyk, Yin, Kiekintveld, C., Tambe JAIR’11; Korzhyk, C., Parr AAMAS’11]

  17. Commitment Commitment 1, 1 3, 0 U i Unique Nash N h 0, 0 2, 1 equilibrium von Stackelberg • Suppose the game is played as follows: – Player 1 commits to playing one of the rows, – Player 2 observes the commitment and then chooses a column Player 2 observes the commitment and then chooses a column • Optimal strategy for player 1: commit to Down

  18. Commitment as an extensive-form game i f • For the case of committing to a pure strategy: Player 1 Player 1 Up Down Player 2 Player 2 Left Right Left Right 1, 1 3, 0 0, 0 2, 1

  19. Commitment to mixed strategies g 0 1 1, 1 , 3, 0 , .49 0, 0 2, 1 .51 – Sometimes also called a Stackelberg (mixed) strategy

  20. Commitment as an extensive-form game… i f • … for the case of committing to a mixed strategy: for the case of committing to a mixed strategy: Player 1 (1,0) (0,1) (.5,.5) (=Up) (=Down) … … Player 2 Left Right Left Right Left Right 2, 1 1, 1 3, 0 .5, .5 2.5, .5 0, 0 • • Economist: Just an extensive form game nothing new here Economist: Just an extensive-form game, nothing new here • Computer scientist: Infinite-size game! Representation matters

  21. Computing the optimal mixed strategy to commit to [C & Sandholm EC’06 von Stengel & Zamir GEB’10] [C. & Sandholm EC 06, von Stengel & Zamir GEB 10] • Separate LP for every column c* : p y maximize Σ r p r u R (r, c*) leader utility subject to subject to for all c , Σ r p r u C (r, c*) ≥ Σ r p r u C (r, c) follower optimality Σ r p r = 1 distributional constraint Slide 7

  22. … applied to the previous game applied to the previous game 1, 1 3, 0 p 0, 0 2, 1 q maximize 1p + 0q maximize 3p + 2q subject to subject to subject to subject to 1p + 0q ≥ 0p + 1q 0p + 1q ≥ 1p + 0q p + q = 1 p + q = 1 p ≥ 0 p ≥ 0 p ≥ 0 p ≥ 0 q ≥ 0 q ≥ 0 Slide 7

  23. Visualization Visualization L L C C R R U 0,1 1,0 0,0 ( , , ) (0,1,0) = M M 4,0 0,1 0,0 D 0,0 1,0 1,1 C R R L (1,0,0) = U (0,0,1) = D

  24. Other nice properties of commitment to mixed strategies 0, 0 0, 0 -1, 1 1, 1 • Agrees w. Nash in zero-sum games -1, 1 0, 0 • Leader’s payoff at least as good as p y g ≥ any Nash eq. or even correlated eq. ( von Stengel & Zamir [GEB ‘10]; see also C ( von Stengel & Zamir [GEB 10]; see also C. & Korzhyk [AAAI ‘11], Letchford, Korzhyk, C. [JAAMAS ’14] ) [JAAMAS 14] ) 0, 0 -1, 1 • No equilibrium selection problem 1, -1 -5, -5 More discussion: V. Conitzer. On Stackelberg Mixed Strategies. [Synthese, to appear.]

  25. Example security game • 3 airport terminals to defend (A, B, C) • Defender can place checkpoints at 2 of them • Attacker can attack any 1 terminal Att k tt k 1 t i l A A B B C C {A B} {A, B} 0 0, -1 0, -1 -2, 3 1 0 1 2 3 {A, C} 0, -1 -1, 1 {A, C} 0 1 1 1 0, 0 0 0 {B, C} -1, 1 0, -1 { , } 1 1 0 1 0 0 0, 0

  26. Security resource allocation games [Kiekintveld, Jain, Tsai, Pita, Ordóñez, Tambe AAMAS’09] • Set of targets T g Set of security resources  available to the defender (leader) • • • Set of schedules Set of schedules Resource  can be assigned to one of the schedules in • • Attacker (follower) chooses one target to attack • Utilities: if the attacked target is defended, otherwise t 1 s s 1 •  1 t 3 t 2 s 2 2  2 t 5 t 4 s 3

  27. Game-theoretic properties of security resource allocation games [Korzhyk, Yin, Kiekintveld, C., Tambe JAIR’11] • For the defender: For the defender: Stackelberg strategies are also Nash strategies – minor assumption needed – not true with multiple attacks • Interchangeability property for • Interchangeability property for Nash equilibria (“solvable”) 1, 2 1, 0 2, 2 • no equilibrium selection problem 1, 1 1, 0 2, 1 • still true with multiple attacks 0, 1 0, 0 0, 1 [Korzhyk, C., Parr IJCAI’11]

  28. Compact LP Co pac • Cf. ERASER-C algorithm by Kiekintveld et al. [2009] • Separate LP for every possible t* attacked: Defender utility f d ili Marginal probability Marginal probability of t* being defended (?) Distributional constraints Distributional constraints Attacker optimality Slide 11

  29. Counter-example to the compact LP  2 .5 .5 t t t t .5 5  1 t t .5 • LP suggests that we can cover every target with probability 1… • … but in fact we can cover at most 3 b t in fact e can co er at most 3 Slide 12 targets at a time

Recommend


More recommend