Skip to main content

Deployed Security Games for Patrol Planning

  • Chapter
  • First Online:
Handbook of Operations Research for Homeland Security

Abstract

Nations and organizations need to secure locations of economic, military, or political importance from groups or individuals that can cause harm. The fact that there are limited security resources prevents complete security coverage, which allows adversaries to observe and exploit patterns in patrolling or monitoring and enables them to plan attacks that avoid existing patrols. The use of randomized security policies that are more difficult for adversaries to predict and exploit can counter their surveillance capabilities and improve security. In this chapter we describe the recent development of models to assist security forces in randomizing their patrols and their deployment in real applications. The systems deployed are based on fast algorithms for solving large instances of Bayesian Stackelberg games that capture the interaction between security forces and adversaries. Here we describe a generic mathematical formulation of these models, present some of the results that have allowed these systems to be deployed in practice, and outline remaining future challenges. We discuss the deployment of these systems in two real-world security applications: (1) The police at the Los Angeles International Airport uses these models to randomize the placement of checkpoints on roads entering the airport and the routes of canine unit patrols within the airport terminals. (2) The Federal Air Marshal Service (FAMS) uses these models to randomize the schedules of air marshals on international flights.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Our current implementation uses complete matrices to represent H and Ca, but sparse representations could offer additional performance improvements.

  2. 2.

    http://www.gnu.org/software/glpk/.

References

  • Agmon N, Sadov V, Kaminka GA, Kraus S (2008) The impact of adversarial knowledge on adversarial planning in perimeter patrol. In: AAMAS

    Google Scholar 

  • An B, Pita J, Shieh E, Tambe M, Kiekintveld C, Marecki J (2011) GUARDS and PROTECT: next generation applications of security games. ACM SIGecom Exchanges 10(1):31–34

    Google Scholar 

  • Avenhaus R, von Stengel B, Zamir S (2002) Inspection games. In: Aumann RJ, Hart S (eds) Handbook of game theory, vol 3. North-Holland, Amsterdam, pp 1947–1987 (Chap. 51)

    Google Scholar 

  • Babu L, Lin L, Batta R (2006) Passenger grouping under constant threat probability in an airport security system. Eur J Oper Res 168:633–644

    Article  Google Scholar 

  • Bard JF (1999) Practical bilevel optimization: algorithms and applications. Nonconvex optimization and its applications, vol 30. Springer, Berlin

    Google Scholar 

  • Basar T, Olsder GJ (1995) Dynamic noncooperative game theory, 2nd edn. Academic, San Diego

    Google Scholar 

  • Bier VM (2007) Choosing what to protect. Risk Anal 27(3):607–620

    Article  Google Scholar 

  • Blanco M, Valino A, Heijs J, Baumert T, Gomez JG (2007) The economic cost of March 11: measuring the direct economic cost of the terrorist attack on March 11, 2004 in Madrid. Terror Polit Viol 19(4):489–509

    Article  Google Scholar 

  • Breton M, Alg A, Haurie A (1988) Sequential stackelberg equilibria in two-person games. Optim Theor Appl 59(1):71–97

    Article  Google Scholar 

  • Brown G, Carlyle M, Kline J, Wood K (2005) A two-sided optimization for theater ballistic missile defense. Oper Res 53:263–275

    Article  Google Scholar 

  • Brown G, Carlyle M, Royset J, Wood K (2005) On the complexity of delaying an adversary’s project. In: Golden B, Raghavan S, Wasil E (eds) The next wave in computing, optimization and decision technologies. Springer, Berlin, pp 3–17

    Chapter  Google Scholar 

  • Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces, 36(6):530–544

    Article  Google Scholar 

  • Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In: ACM EC-06, pp 82–90

    Google Scholar 

  • Dy JG, Brodley CE (2004) Feature selection for unsupervised learning. J Mach Learn Res 5:845–889

    Google Scholar 

  • Ester M, Kriegel H-P, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial database with noise. Technical report, Institute for Computer Science, University of Munich

    Google Scholar 

  • Fayyad U, Piatetsky-Shapiro G, Smyth P (1996) From data mining to knowledge discovery: an overview. AI Mag 17(3):37–54

    Google Scholar 

  • Federal Air Marshal Service (2008). http://en.wikipedia.org/wiki/Federal_Air_Marshal_Service

  • Fudenberg D, Tirole J (1991) Game theory. MIT, Cambridge

    Google Scholar 

  • Gatti N (2008) Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: Ghallab M, Spyropoulos CD, Pakotakis N, Avouris N (eds) ECAI. IOS Press, Amsterdam, pp 403–407

    Google Scholar 

  • General description: Just the facts (2007). http://www.lawa.org/lax/justTheFact.cfm

  • Harsanyi JC, Selten R (1972) A generalized Nash solution for two-person bargaining games with incomplete information. Manag Sci 18(5):80–106

    Article  Google Scholar 

  • Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Ordóñez F, Tambe M (2010) Software assistants for patrol planning at LAX and federal air Marshals service. Interfaces 40(4):267–290

    Article  Google Scholar 

  • Jiang A, Leyton-Brown K (2006) A polynomial-time algorithm for action-graph games. Artif Intell 679–684

    Google Scholar 

  • Kahneman D, Tvesky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–292

    Article  Google Scholar 

  • Kiekintveld C, Jain M, Tsai J, Pita J, Tambe M, Ordóñez F (2009) Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems. Budapest, Hungary, May 10–15, 1:689–696

    Google Scholar 

  • Koller D, Milch B (2003) Multi-agent influence diagrams for representing and solving games. Games Econ Behav 45(1):181–221

    Article  Google Scholar 

  • Larson R (1974) A hypercube queueing modeling for facility location and redistricting in urban emergency services. J Comput Oper Res 1:67–95

    Article  Google Scholar 

  • Leitmann G (1978) On generalized stackelberg strategies. J Optim Theor Appl 26(4):637–643

    Article  Google Scholar 

  • Looney R (2002) Economic costs to the United States stemming from the 9/11 attacks. Strateg Insights 1(6)

    Google Scholar 

  • Lye K-w, Wing JM (2005) Game strategies in network security. Int J Inf Secur 4(1–2):71–86

    Google Scholar 

  • McKelvey RD, Palfrey TR (1995) Quantal response equilibria for normal form games. Games Econ Behav 10:6–38

    Article  Google Scholar 

  • Nie X, Batta R, Drury CG, Lin L (2007) Optimal placement of suicide bomber detectors. Mil Oper Res 12:65–78

    Article  Google Scholar 

  • Osbourne MJ, Rubinstein A (1994) A course in game theory. MIT, Cambridge

    Google Scholar 

  • Paruchuri P, Tambe M, Ordonez F, Kraus S (2006) Security in multiagent systems by policy randomization. In: Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-06). Hakodate, Japan, May 8–12, 273–280

    Google Scholar 

  • Paruchuri P, Pearce JP, Tambe M, Ordóñez F, Kraus S (2007) An efficient heuristic approach for security against multiple adversaries. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007). Honolulu, Hawaii, May 14–18

    Google Scholar 

  • Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordóñez F, Kraus S (2008) Playing games with security: an efficient exact algorithm for bayesian stackelberg games. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems. Estoril, Portugal, May 12–16

    Google Scholar 

  • Pita J, Jain M, Western C, Portway C, Tambe M, Ordóñez F, Kraus S, Parachuri P (2008) Deployed ARMOR protection: The application of a game-theoretic model for security at the Los Angeles international airport. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems. Estoril, Portugal, May 12–16

    Google Scholar 

  • Pita J, Tambe M, Kiekintveld C, Cullen S, Steigerwald E (2011) GUARDS – game theoretic security allocation on a national scale. In: Proceedings of the 10th International conference on autonomous agents and multiagent systems. Taipei, Taiwan, May 2–6, 1:37–44

    Google Scholar 

  • Ruan S, Meirina C, Yu F, Pattipati KR, Popp RL (2005) Patrolling in a stochastic environment. In: 10th international command and control research and tech. symposium, June 13–16

    Google Scholar 

  • Sandler T, Arce DG (2003) Terrorism and game theory. Simul Gaming 34(3):319–337

    Article  Google Scholar 

  • Srivastava V, Neel J, MacKenzie AB, Menon R, Dasilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutuor 7(4)

    Google Scholar 

  • Stevens D, Hamilton T, Schaffer M, Dunham-Scott D, Medby JJ, Chan EW, Gibson J, Eisman M, Mesic R, Kelley CT, Kim J, LaTourrette T, Riley KJ (2006) Implementing security improvement options at Los Angeles international airport. http://www.rand.org/pubs/documented_briefings/2006/RAND_DB499-1.pdf

    Google Scholar 

  • Thornton P (2005) London bombings: Economic cost of attacks estimated at 2bn. July http://www.independent.co.uk/news/business/news/economic-cost-of-attacks-estimated-at-1632bn-499281.html

  • Treisman M, Faulkner A (1987) Generation of random sequences by human subjects: Cognitive operations or psychological process? J Exp Psychol 116(4):337–355

    Google Scholar 

  • TSA: Federal Air Marshals (2008). http://www.tsa.gov/lawenforcement/programs/fams.shtm.

  • Tsai J, Rathi S, Kiekintveld C, Ordóñez F, Tambe M (2009) IRIS - A tool for strategic security application in transportation networks. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, Budapest, Hungary, May 10–15

    Google Scholar 

  • von Stackelberg H (1934) Marktform und Gleichgewicht. Springer, Vienna

    Google Scholar 

  • von Stengel B, Zamir S (2004) Leadership with commitment to mixed strategies. Technical report LSE-CDAM-2004-01, CDAM research report

    Google Scholar 

  • Wagenaar WA (1972) Generation of random sequences by human subjects: A critical survey of literature. Psychol Bull 77(1):65–72

    Article  Google Scholar 

  • Wein LM (2009) Homeland security: From mathematical models to policy implementation: the 2008 Philip McCord Morse lecture. Oper Res 57(4):801–811

    Article  Google Scholar 

  • Willis H, Morral A, Kelly T, Medby J (2005) Estimating terrorism risk. RAND Corporation. Santa Monica. http://www.rand.org/pubs/monographs/2005/RANDMG388.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fernando Ordóñez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Ordóñez, F., Tambe, M., Jara, J.F., Jain, M., Kiekintveld, C., Tsai, J. (2013). Deployed Security Games for Patrol Planning. In: Herrmann, J. (eds) Handbook of Operations Research for Homeland Security. International Series in Operations Research & Management Science, vol 183. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5278-2_3

Download citation

Publish with us

Policies and ethics