Abstract
Game-theoretic security resource allocation problems have generated significant interest in the area of designing and developing security systems. These approaches traditionally utilize the Stackelberg game model for security resource scheduling in order to improve the protection of critical assets. The basic assumption in Stackelberg games is that a defender will act first, then an attacker will choose their best response after observing the defender’s strategy commitment (e.g., protecting a specific asset). Thus, it requires an attacker’s full or partial observation of a defender’s strategy. This assumption is unrealistic in real-time threat recognition and prevention. In this paper, we propose a new solution concept (i.e., a method to predict how a game will be played) for deriving the defender’s optimal strategy based on the principle of acceptable costs of minimax regret. Moreover, we demonstrate the advantages of this solution concept by analyzing its properties.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A defender’s knowledge of both players’ payoff matrices and an attacker’s knowledge of their own payoff matrix.
- 2.
While surveillance information can be represented by some imprecise probability theories [7], due to space restrictions, in this paper we focus on probability theory.
- 3.
Regret is an emotion associated with decisions which yield undesirable outcomes.
- 4.
Formally, in a two-player game, a probability distribution p for the pure strategies of a given player i (\(A_i=\{a_1,\dots ,a_n\}\)) is an equalizer if and only if there exists \(c\in \mathfrak {R}\) (\(\mathfrak {R}\) is the set of real numbers) and any pure strategy \(b_j\) for their opponent, s.t. the following equation holds \(\Sigma _{t=1}^{n} p(a_{t}) u_{i}(a_{t},b_{j})=c\).
- 5.
\(k=l\) means that both players select the same target (i.e., the attacker loses), while \(i\ne j\) and \(s\ne r\) mean that players select different targets (i.e., the attacker wins).
- 6.
Since a defender may have multiple available security resources, our Linear Programs will also consider this situation based on Definition 3.
References
Chua, H.F., Gonzalez, R., Taylor, S.F., Welsh, R.C., Liberzon, I.: Decision-related loss: regret and disappointment. NeuroImage 47(4), 2031–2040 (2009)
Gong, S., Loy, C., Xiang, T.: Security and surveillance. In: Moeslund, T.B., Hilton, A., Krüger, V., Sigal, L. (eds.) Visual Analysis of Humans, pp. 455–472. Springer, London (2011)
Harsanyi, J.C.: Rational Behaviour and Bargaining Equilibrium in Games and Social Situations. Cambridge University Press, Cambridge (1986)
Kiekintveld, C., Kreinovich, V.: Efficient approximation for security games with interval uncertainty. In: Proceedings of the AAAI Spring Symposium on Game Theory for Security, Sustainability, and Health GTSSH (2012)
Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. Nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness. J. Artif. Intell. Res. 41(2), 297–327 (2011)
Kuhnen, C.M., Knutson, B.: The neural basis of financial risk taking. Neuron 47(5), 763–770 (2005)
Ma, J., Liu, W., Miller, P.: Event modelling and reasoning with uncertain information for distributed sensor networks. In: Deshpande, A., Hunter, A. (eds.) SUM 2010. LNCS, vol. 6379, pp. 236–249. Springer, Heidelberg (2010)
Ma, W., Luo, X., Liu, W.: An ambiguity aversion framework of security games under ambiguities. IJCAI 2013, 271–278 (2013)
Osborne, M.J.: An Introduction to Game Theory. Oxford University Press, New York (2004)
Pita, J., Jain, M., Ordonez, F., Portway, C., Tambe, M., Western, C., Paruchuri, P., Kraus, S.: Using game theory for Los Angeles airport security. AI Mag. 30(1), 43–57 (2009)
Pita, J., Jain, M., Tambe, M., Ordóñez, F., Kraus, S.: Robust solutions to stackelberg games: addressing bounded rationality and limited observations in human cognition. Artif. Intell. 174(15), 1142–1171 (2010)
Pruzhansky, V.: Some interesting properties of maximin strategies. Int. J. Game Theory 40(2), 351–365 (2011)
Savage, L.J.: The theory of statistical decision. J. Am. Stat. Assoc. 46(253), 54–67 (1951)
Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems Lessons Learned. Cambridge University Press, Cambridge (2011)
Wasserkrug, S., Gal, A., Etzion, O.: Inference of security hazards from event composition based on incomplete or uncertain information. IEEE Trans. Knowl. Data Eng. 20(8), 1111–1114 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ma, W., Liu, W., McAreavey, K. (2015). Game-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance Information. In: Destercke, S., Denoeux, T. (eds) Symbolic and Quantitative Approaches to Reasoning with Uncertainty. ECSQARU 2015. Lecture Notes in Computer Science(), vol 9161. Springer, Cham. https://doi.org/10.1007/978-3-319-20807-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-20807-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-20806-0
Online ISBN: 978-3-319-20807-7
eBook Packages: Computer ScienceComputer Science (R0)