Skip to main content

Scaling-Up Stackelberg Security Games Applications Using Approximations

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11199))

Included in the following conference series:

  • 1810 Accesses

Abstract

Stackelberg Security Games (SSGs) have been adopted widely for modeling adversarial interactions, wherein scalability of equilibrium computation is an important research problem. While prior research has made progress with regards to scalability, many real world problems cannot be solved satisfactorily yet as per current requirements; these include the deployed federal air marshals (FAMS) application and the threat screening (TSG) problem at airports. We initiate a principled study of approximations in zero-sum SSGs. Our contribution includes the following: (1) a unified model of SSGs called adversarial randomized allocation (ARA) games, (2) hardness of approximation for zero-sum ARA, as well as for the FAMS and TSG sub-problems, (3) an approximation framework for zero-sum ARA with instantiations for FAMS and TSG using intelligent heuristics, and (4) experiments demonstrating the significant 1000x improvement in runtime with an acceptable loss.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We remark that modeling-wise the extension to general-sum case, non-linearity in probabilities or exponentially many targets is straightforward; here we restrict the model as it suffices for the domains we consider.

  2. 2.

    Typically player types denotes different utilities but as Harsanyi [12] originally formulated, types capture any incomplete information including, as for our case, lack of information about adversary action space. The game is still zero-sum.

References

  1. Ausiello, G., Protasi, M., Marchetti-Spaccamela, A., Gambosi, G., Crescenzi, P., Kann, V.: Complexity and Approximation: Combinatorial Optimization Problems and Their Approximability Properties. Springer, Heidelberg (1999). https://doi.org/10.1007/978-3-642-58412-1

    Book  MATH  Google Scholar 

  2. Bansal, N., Korula, N., Nagarajan, V., Srinivasan, A.: Solving packing integer programs via randomized rounding with alterations. Theory Comput. 8(1), 533–565 (2012)

    Article  MathSciNet  Google Scholar 

  3. Bošanský, B., Jiang, A.X., Tambe, M., Kiekintveld, C.: Combining compact representation and incremental generation in large games with sequential strategies. In: AAAI (2015)

    Google Scholar 

  4. Brown, M., Sinha, A., Schlenker, A., Tambe, M.: One size does not fit all: a game-theoretic approach for dynamically and effectively screening for threats. In: AAAI (2016)

    Google Scholar 

  5. Brown, N., Sandholm, T.: Safe and nested subgame solving for imperfect-information games. In: NIPS, pp. 689–699 (2017)

    Google Scholar 

  6. Bucarey, V., Casorrán, C., Figueroa, Ó., Rosas, K., Navarrete, H., Ordóñez, F.: Building real stackelberg security games for border patrols. In: Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S. (eds.) GameSec 2017. LNCS, vol. 10575, pp. 193–212. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68711-7_11

    Chapter  MATH  Google Scholar 

  7. Budish, E., Che, Y.K., Kojima, F., Milgrom, P.: Designing random allocation mechanisms: theory and applications. Am. Econ. Rev. 103(2), 585–623 (2013)

    Article  Google Scholar 

  8. Chekuri, C., Vondrák, J., Zenklusen, R.: Dependent randomized rounding for matroid polytopes and applications. arXiv preprint arXiv:0909.4348 (2009)

  9. FAA: Airport capacity profiles (2014). https://goo.gl/YZvzsU. Accessed 15 May 2018

  10. Gandhi, R., Khuller, S., Parthasarathy, S., Srinivasan, A.: Dependent rounding and its applications to approximation algorithms. J. ACM (JACM) 53(3), 324–360 (2006)

    Article  MathSciNet  Google Scholar 

  11. Guo, Q., An, B., Vorobeychik, Y., Tran-Thanh, L., Gan, J., Miao, C.: Coalitional security games. In: AAMAS (2016)

    Google Scholar 

  12. Harsanyi, J.: Games with incomplete information played by Bayesian players, I-III part I. the basic model. Manag. Sci. 14(3) (1967)

    Google Scholar 

  13. Jain, M., Kardeş, E., Kiekintveld, C., Tambe, M., Ordóñez, F.: Security games with arbitrary schedules: a branch and price approach. In: AAAI, pp. 792–797 (2010)

    Google Scholar 

  14. Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ordóñez, F., Tambe, M.: Computing optimal randomized resource allocations for massive security games. In: AAMAS (2009)

    Google Scholar 

  15. Korzhyk, D., Conitzer, V., Parr, R.: Complexity of computing optimal Stackelberg strategies in security resource allocation games. In: AAAI (2010)

    Google Scholar 

  16. Letchford, J., Conitzer, V.: Solving security games on graphs via marginal probabilities. In: AAAI (2013)

    Google Scholar 

  17. Moravčík, M., et al.: Deepstack: expert-level artificial intelligence in heads-up no-limit poker. Science (2017)

    Google Scholar 

  18. Raghavan, P., Thompson, C.D.: Randomized rounding: a technique for provably good algorithms and algorithmic proofs. Combinatorica 7(4), 365–374 (1987)

    Article  MathSciNet  Google Scholar 

  19. Schlenker, A., Brown, M., Sinha, A., Tambe, M., Mehta, R.: Get me to my gate on time: efficiently solving general-sum Bayesian threat screening games. In: ECAI, pp. 1476–1484 (2016)

    Google Scholar 

  20. Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, New York (2011)

    Book  Google Scholar 

  21. Tsai, J., Yin, Z., Kwak, J., Kempe, D., Kiekintveld, C., Tambe, M.: Urban security: game-theoretic resource allocation in networked physical domains. In: AAAI (2010)

    Google Scholar 

  22. USDOT: Bureau of transportation statistics (2016). https://goo.gl/Goz84L. Accessed 15 May 2018

  23. Xu, H.: The mysteries of security games: equilibrium computation becomes combinatorial algorithm design. In: ACM-EC (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arunesh Sinha .

Editor information

Editors and Affiliations

Appendix

Appendix

Implementability: Viewing SSGs as ARAs provides an easy way of determining implementability using results from randomized allocation [7]. First, we define bi-hierarchical assignment constraints as those that can be partitioned into two sets \(H_1, H_2\) such that two constraints \(S, S'\) in the same partition (\(H_1\) or \(H_2\)) it is the case that either \(S \subseteq S'\) or \(S' \subseteq S\) or \(S \cap S' = \phi \). Further, as defined in [7], canonical assignment constraints are those that impose constraints on all rows and columns of the matrix. We obtain the following result

Proposition 1

All marginal strategies are implementable, or more formally \(conv(P) = MgS\), if the assignment constraints are bi-hierarchical. Given canonical assignment constraints, if all marginal strategies are implementable then the assignment constraints are bi-hierarchical.

As Fig. 1 reveals, both FAMS and TSG have non-implementable marginals due to overlapping constraints. The proof of the proposition is straightforward applications of Theorems 1 and 2 in Budish et al. [7].

Fig. 6.
figure 6

RAND modified heuristic comparison

Modified Heuristic is Bad: The modified RAND approach is compared to RAND in Fig. 6. It can be seen that the loss increases a lot with almost 35% loss over RAND for 110 flights.

Proof of Theorem 1: First we define some problems related to the DB problem.

  • DBR is the problem \(\max _{\mathbf {x} \in P} \mathbf {d} \cdot \mathbf {x}\) where \(\mathbf {d}\) is a vector of positive constants. DBR is a combinatorial problem.

  • The continuous version of DBR is DBR-C: \(\max _{\mathbf {x} \in conv(P)} \mathbf {d} \cdot \mathbf {x}\).

  • The unweighted version of the DBR is DBR-U: \(\max _{\mathbf {x} \in P} \mathbf {1} \cdot \mathbf {x}\).

Proof

For the first part, given a NP hard DBR-U instance (for the decision version of DBR-U), we construct an ARA instance such that the feasibility problem for that ARA instance solves the hard DBR-U decision problem. Thus, as the feasibility is NP Hard, there exists no approximation. First, since the ARA problem is so general there exists DBR-U problems that are NP Hard. For example, the DBR-U problem for FAMS has been shown to be NP Hard [23]. Given the hard DBR-U problem, form an ARA problem with by adding the constraint \(\mathbf {1} \cdot \mathbf {x} = k\). Also, let there be only one target t in the problem, so that the objective becomes \(U(\mathbf {x}, t)\) instead of z and all constraints in the optimization are just the marginal space constraints and \(\mathbf {1} \cdot \mathbf {x} = k\). Now, the existence of any solution of the optimization gives a feasible point \(\mathbf {x} = \sum _m a_m \mathbf {P_m}\), where \(\mathbf {P_m} \in P\) is integral. Also, it must be that \(\mathbf {1} \cdot \mathbf {P_j} \ge \mathbf {1} \cdot \mathbf {x} = k\) for some j. Then, \(\mathbf {P_j}\) is a solution to the decision version of the DBR-U problem, i.e., does there exist a solution of the DBR-U optimization problem with value \(\ge k\)? Thus, since finding the existence of any solution for ARA is NP Hard, thus, no approximation exists in poly time.

For the second part, we present a AP approximation preserving reduction (with problem mapping that does not depend on approximation ratio); such a reduction preserves membership in PTAS, APX, log-APX, Poly-APX (see [1]). Given any DBR problem, we construct the ARA problem with one target such that \(T = \{1, \ldots , k\}\times \{1, \ldots , n\}\). Choose the weights \(w_{i,j}\)’s such that \(w_{i,j} \propto d_{i,j}\) and \(w_{i,j} \le 1/\max _{\mathbf {x} \in MgS} \sum _{i,j} x_{i,j}\). Observe that \(\max _{\mathbf {x} \in MgS} \sum _{i,j} x_{i,j}\) is computable efficiently and \(\max _{\mathbf {x} \in MgS} \sum _{i,j} x_{i,j} \ge \max _{\mathbf {x} \in conv(P)} \sum _{i,j} x_{i,j}\), thus, the ARA is well-defined. Thus, due to just one target, the ARA optimization is same as \(\max _{\mathbf {x} \in conv(P)} \mathbf {w} \cdot \mathbf {x}\). Suppose we can solve this problem with r approximation with the solution mixed strategy being \( \mathbf {x}^\epsilon = \sum _{i=1}^m a_i \mathbf {P_i}\) for some pure strategies \(\mathbf {P_i}\). Now, since \(w_{i,j} \propto d_{i,j}\) we also know that this solution also provides r approximation for DBR-C. Let the optimal solution for DBR-C be OPT; note that OPT is also the optimal solution for DBR. \( \mathbf {x}^\epsilon \) provides a solution value \(\mathbf {w} \cdot \mathbf {x}^\epsilon \ge OPT/r\). Further, as the objective is linear in \(\mathbf {x}\) and \( \mathbf {x}^\epsilon = \sum _{i=1}^m a_i \mathbf {P_i}\), it must be the case that there exists a \(j \in \{1, \ldots , m\}\) such that \(\mathbf {w} \cdot \mathbf {P_j} \ge \mathbf {w} \cdot \mathbf {x}^\epsilon \ge OPT/r\). Thus, since \(\mathbf {P_j} \in P\), \(\mathbf {P_j}\) provides r approximation for DBR. Since, m the number of the pure strategies in support of \(\mathbf {x}^\epsilon \) is polynomial, \(\mathbf {P_j}\) can be found in polynomial time by a linear search.

Proof of Theorem 2.

Proof

Given an independent set problem with V vertices, we construct a TSG with \(\{1, \ldots , V + 1\}\) team types, where each team type in \(1, \ldots , V\) corresponds to a vertex. The \(V+1\) team is special in the sense that it does not correspond to any vertex and it is made up of just one resource with a very large resource capacity 2V. Construct just one passenger category with passengers \(N = V+1\). Since, there is just one passenger category (and target) we will use \(x_i\) as the matrix entries instead of \(x_{i,j}\). Choose \(U^t_s = V+1\) and \(U^t_u = 0\) and efficiencies \(E_i = 1\) for all teams, except \(E_{V+1} = 0\). Then, the objective of the integer LP is \(\sum _{i=1}^V x_i = \mathbf {1}_V \cdot \mathbf {x}\) where \( \mathbf {1}_V \) is a vector with first V components as 1 and last component as 0.

Next, have resources for every edge \((i,k) \in E\) with resource capacity 1. This provides the inequality \(\sum _{(i,k) \in E} x_i + x_j \le 1\). Also, we have \(x_{V+1} \le 2V\). Inspection of every passengers provides the constraints \(\sum _{i=1}^{V+1} x_i = V+1\). Treating \(x_{V+1}\) as a slack, we can see that the constraint \(x_{V+1} \le 2V\) and \(\sum _{i=1}^{V+1} x_i = V+1\) are redundant. For the left over constraints \(\sum _{(i,k) \in E} x_i + x_j \le 1\), we can easily check that any valid integral assignment (pure strategy) is an independent set. Moreover, the objective \(\sum _{i=1}^V x_i \) tries to maximize the independent set. The optimal value of this optimization over conv(P) is an extreme point which is integral and equal to the maximum independent set OPT. Thus, suppose a solution \(\mathbf {x}^\epsilon \) to the SSE problem with value \(\ge OPT/r\). Further, as the objective is linear in \(\mathbf {x}\) and \( \mathbf {x}^\epsilon = \sum _{i=1}^m a_i \mathbf {P_i}\), it must be the case that there exists a \(j \in \{1, \ldots , m\}\) such that \( \mathbf {1}_V \cdot \mathbf {P_j} \ge \mathbf {1}_V \cdot \mathbf {x}^\epsilon \ge OPT/r\). Thus, since \(\mathbf {P_j} \in P\), \(\mathbf {P_j}\) provides r approximation for maximum independent set. Since, m the number of the pure strategies in support of \(\mathbf {x}^\epsilon \) is polynomial, \(\mathbf {P_j}\) can be found in poly time by a linear search.

Proof of Theorem 5.

Proof

Consider the event of a target t having an infeasible assignment after the comb sampling. Call this event \(E_t\). Let \(C_{t,i}\) be the event that resource i covers this target t. Then, \(P(E_t) = \sum _{i} P(E_t|C_{t,i})P(C_{t,i})\). From the guarantees of comb sampling we know that \(P(C_{t,i}) = \sum _{j: (i,j) \in T} x^m_{i,j} \le 1\) and \(P(x_{i,j} = 1) = x^m_{i,j}\). Also, by comb sampling if \(x_{i,j} = 1\) then \(x_{i,j'} = 0\) for any \(j'\ne j\). Next, we know that \(P(E_t|C_{t,i})\) is the probability that the any of the other \(x_{i',j}\) is assigned a one, which is \(1 - \) the probability that all other \(x_{i',j}\) are assigned 0. Thus,

$$P(E_t|C_{t,i}) = 1 - \prod _{i' \ne i} (1- P(C_{t,i})) $$

Let \(p_{t,i} = P(C_{t,i})\). Considering the fact that \(\prod _i (1 - p_{t,i}) > 1 - \sum _i p_{t,i}\), we get

$$1 - \prod _{i' \ne i} (1- P(C_{t,i})) \le \sum _{(i',j): i'\ne i \wedge (i',j) \in T} x^m_{i',j} \le 1 - \sum _j x^m_{i,j}$$

where the last inequality is due to the fact that \(\sum _{(i,j) \in T} x^m_{i,j} \le 1\).

Thus, \(P(E_t) \le \sum _{i} (1 - p_{t,i})p_{t,i} \le \sum _{i} p_{t,i} - \sum _{i} (p_{t,i})^2\). Next, we know from standard sum of squares inequality that \(\sum _{i} (p_i)^2 \ge (\sum _{i} p_i)^2/k\). Thus, we get \(P(E_t) \le (\sum _{i} p_i) (1 - \sum _{i} p_i/k)\) The RHS is maximized when \(\sum _{i} p_i = 1\), thus, \(P(E_t) \le 1 - 1/k\). Also, then \(P(\lnot E_t) \ge 1/k\)

Now consider the coverage of target t: \(x^m_t = \sum _{(i,j) \in T} x^m_{i,j}\). According to our algorithm the allocation for target t continues to remain 1 with probability \((1/2)^C\) if its allocation is already feasible after comb sampling (and we always obtain a pure strategy). This is because this target shares schedules with C other targets and thus in the worst case may be reduced with 1/2 probability for each of the C targets. We do a worst case analysis and assume that no resource is allocated to a target when the sampled allocation is infeasible for that target. Thus, let \(y_t\) denote the random variable denoting that target t is covered. Thus, \(E(y_t) = P(y_t = 1) = P(y_t = 1|E_t) P(E_t) + P(y_t = 1|\lnot E_t)P(\lnot E_t)\). Now, \(P(y_t = 1|\lnot E_t)\) is same as \(x^m_t/2^C\) and we assumed the worst case of \(P(y_t = 1|E_t) = 0\). Thus, we have \(E(y_t) \ge x^m_t/2^Ck\). As the utilities are linear in \(y_t\), we have the utility for t as \(U_t \ge U_t^m/2^Ck\), where \(U_t^m\) is the utility under the marginal \(\mathbf {x}^m\). Thus, if \(t^*\) is the choice of adversary under the marginal \(\mathbf {x}^m\) we know that \(U_{t^*}^m\) is the lowest utility for the defender over all targets t. Hence, we can conclude that the utility with the approximation is at least \(U_{t^*}^m/2^Ck\)

Proof of Theorem 4.

Proof

The main assumption in the proof is that the steps after comb sampling changes the probability of detecting an adversary in passenger category j by at most 1/c. Also, by assumption of the theorem since Algorithm 1 does not fail ever, the change in utility for any passenger category j is at most a factor of 1/c. By similar reasoning as for FAMS, we conclude that this provides a c-approximation.

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sinha, A., Schlenker, A., Dmello, D., Tambe, M. (2018). Scaling-Up Stackelberg Security Games Applications Using Approximations. In: Bushnell, L., Poovendran, R., Başar, T. (eds) Decision and Game Theory for Security. GameSec 2018. Lecture Notes in Computer Science(), vol 11199. Springer, Cham. https://doi.org/10.1007/978-3-030-01554-1_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01554-1_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01553-4

  • Online ISBN: 978-3-030-01554-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics