Skip to main content

Trends and Applications in Stackelberg Security Games

  • Living reference work entry
  • First Online:
Handbook of Dynamic Game Theory

Abstract

Security is a critical concern around the world, whether it is the challenge of protecting ports, airports, and other critical infrastructure; interdicting the illegal flow of drugs, weapons, and money; protecting endangered wildlife, forests, and fisheries; or suppressing urban crime or security in cyberspace. Unfortunately, limited security resources prevent full security coverage at all times; instead, we must optimize the use of limited security resources. To that end, we founded a new “security games” framework that has led to building of decision aids for security agencies around the world. Security games are a novel area of research that is based on computational and behavioral game theory while also incorporating elements of AI planning under uncertainty and machine learning. Today security-games-based decision aids for infrastructure security are deployed in the US and internationally; examples include deployments at ports and ferry traffic with the US Coast Guard, for security of air traffic with the US Federal Air Marshals, and for security of university campuses, airports, and metro trains with police agencies in the US and other countries. Moreover, recent work on “green security games” has led our decision aids to be deployed, assisting NGOs in protection of wildlife; and “opportunistic crime security games” have focused on suppressing urban crime. In cyber-security domain, the interaction between the defender and adversary is quite complicated with high degree of incomplete information and uncertainty. Recently, applications of game theory to provide quantitative and analytical tools to network administrators through defensive algorithm development and adversary behavior prediction to protect cyber infrastructures has also received significant attention. This chapter provides an overview of use-inspired research in security games including algorithms for scaling up security games to real-world sized problems, handling multiple types of uncertainty, and dealing with bounded rationality and bounded surveillance of human adversaries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Note that not all security games in the literature are Stackelberg security games (see Alpcan and Başar 2010).

  2. 2.

    Note that mixed strategy solutions apply beyond Stackelberg games.

  3. 3.

    DOBSS addresses Bayesian Stackelberg games with multiple follower types, but for simplicity we do not introduce Bayesian Stackelberg games here.

  4. 4.

    We use the term green security games also to avoid any confusion that may come about given that terms related to the environment and security have been adopted for other uses. For example, the term “environmental security” broadly speaking refers to threats posed to humans due to environmental issues, e.g., climate change or shortage of food. The term “environmental criminology” on the other hand refers to analysis and understanding of how different environments affect crime.

References

  • Alarie Y, Dionne G (2001) Lottery decisions and probability weighting function. J Risk Uncertain 22(1):21–33

    Article  MATH  Google Scholar 

  • Alpcan T, Başar T (2010) Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge/New York

    Book  MATH  Google Scholar 

  • An B, Tambe M, Ordonez F, Shieh E, Kiekintveld C (2011) Refinement of strong Stackelberg equilibria in security games. In: Proceedings of the 25th conference on artificial intelligence, pp 587–593

    Google Scholar 

  • Blocki J, Christin N, Datta A, Procaccia AD, Sinha A (2013) Audit games. In: Proceedings of the 23rd international joint conference on artificial intelligence

    Google Scholar 

  • Blocki J, Christin N, Datta A, Procaccia AD, Sinha A (2015) Audit games with multiple defender resources. In: AAAI conference on artificial intelligence (AAAI)

    Google Scholar 

  • Botea A, Müller M, Schaeffer J (2004) Near optimal hierarchical path-finding. J Game Dev 1:7–28

    Google Scholar 

  • Breton M, Alg A, Haurie A (1988) Sequential Stackelberg equilibria in two-person games. Optim Theory Appl 59(1):71–97

    Article  MathSciNet  MATH  Google Scholar 

  • Brunswik E (1952) The conceptual framework of psychology, vol 1. University of Chicago Press, Chicago/London

    Google Scholar 

  • Chandran R, Beitchman G (2008) Battle for Mumbai ends, death toll rises to 195. Times of India. http://articles.timesofindia.indiatimes.com/2008-11-29/india/27930171_1_taj-hotel-three-terrorists-nariman-house

    Google Scholar 

  • Chapron G, Miquelle DG, Lambert A, Goodrich JM, Legendre S, Clobert J (2008) The impact on tigers of poaching versus prey depletion. J Appl Ecol 45:1667–1674

    Article  Google Scholar 

  • Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In: Proceedings of the ACM conference on electronic commerce (ACM-EC), pp 82–90

    Google Scholar 

  • Durkota K, Lisy V, Kiekintveld C, Bosansky B (2015) Game-theoretic algorithms for optimal network security hardening using attack graphs. In: Proceedings of the 2015 intemational conference on autonomous agents and multiagent systems (AAMAS’15)

    Google Scholar 

  • Etchart-Vincent N (2009) Probability weighting and the level and spacing of outcomes: an experimental study over losses. J Risk Uncertain 39(1):45–63

    Article  MATH  Google Scholar 

  • Fang F, Jiang AX, Tambe M (2013) Protecting moving targets with multiple mobile resources. J Artif Intell Res 48:583–634

    MathSciNet  MATH  Google Scholar 

  • Fang F, Stone P, Tambe M (2015) When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: International joint conference on artificial intelligence (IJCAI)

    Google Scholar 

  • Fang F, Nguyen TH, Pickles R, Lam WY, Clements GR, An B, Singh A, Tambe M, Lemieux A (2016) Deploying paws: field optimization of the protection assistant for wildlife security. In: Proceedings of the twenty-eighth innovative applications of artificial intelligence conference (IAAI 2016)

    Google Scholar 

  • Fave FMD, Brown M, Zhang C, Shieh E, Jiang AX, Rosoff H, Tambe M, Sullivan J (2014a) Security games in the field: an initial study on a transit system (extended abstract). In: International conference on autonomous agents and multiagent systems (AAMAS) [Short paper]

    Google Scholar 

  • Fave FMD, Jiang AX, Yin Z, Zhang C, Tambe M, Kraus S, Sullivan J (2014b) Game-theoretic security patrolling with dynamic execution uncertainty and a case study on a real transit system. J Artif Intell Res 50:321–367

    MathSciNet  MATH  Google Scholar 

  • Gonzalez R, Wu G (1999) On the shape of the probability weighting function. Cogn Psychol 38:129–166

    Article  Google Scholar 

  • Hamilton BA (2007) Faregating analysis. Report commissioned by the LA Metro. http://boardarchives.metro.net/Items/2007/11_November/20071115EMACItem2%7.pdf

    Google Scholar 

  • Haskell WB, Kar D, Fang F, Tambe M, Cheung S, Denicola LE (2014) Robust protection of fisheries with compass. In: Innovative applications of artificial intelligence (IAAI)

    Google Scholar 

  • Humphrey SJ, Verschoor A (2004) The probability weighting function: experimental evidence from Uganda, India and Ethiopia. Econ Lett 84(3):419–425

    Article  Google Scholar 

  • IUCN (2015) IUCN red list of threatened species. version 2015.2. http://www.iucnredlist.org

  • Jain M, Kardes E, Kiekintveld C, Ordonez F, Tambe M (2010a) Security games with arbitrary schedules: a branch and price approach. In: Proceedings of the 24th AAAI conference on artificial intelligence, pp 792–797

    Google Scholar 

  • Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Tambe M, Ordonez F (2010b) Software assistants for randomized patrol planning for the LAX airport police and the federal air marshal service. Interfaces 40:267–290

    Article  Google Scholar 

  • Jain M, Korzhyk D, Vanek O, Pechoucek M, Conitzer V, Tambe M (2011) A double oracle algorithm for zero-sum security games on graphs. In: Proceedings of the 10th international conference on autonomous agents and multiagent systems (AAMAS)

    Google Scholar 

  • Jain M, Tambe M, Conitzer V (2013) Security scheduling for real-world networks. In: AAMAS

    Google Scholar 

  • Jiang A, Yin Z, Kraus S, Zhang C, Tambe M (2013a) Game-theoretic randomization for security patrolling with dynamic execution uncertainty. In: AAMAS

    Google Scholar 

  • Jiang AX, Nguyen TH, Tambe M, Procaccia AD (2013b) Monotonic maximin: a robust Stackelberg solution against boundedly rational followers. In: Conference on decision and game theory for security (GameSec)

    Google Scholar 

  • Johnson M, Fang F, Yang R, Tambe M, Albers H (2012) Patrolling to maximize pristine forest area. In: Proceedings of the AAAI spring symposium on game theory for security, sustainability and health

    Google Scholar 

  • Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–291

    Article  MATH  Google Scholar 

  • Kar D, Fang F, Fave FD, Sintov N, Tambe M (2015) “a game of thrones”: when human behavior models compete in repeated Stackelberg security games. In: International conference on autonomous agents and multiagent systems (AAMAS 2015)

    Google Scholar 

  • Keteyian A (2010) TSA: federal air marshals. http://www.cbsnews.com/stories/2010/02/01/earlyshow/main6162291.shtml. Retrieved 1 Feb 2011

  • Kiekintveld C, Jain M, Tsai J, Pita J, Tambe M, Ordonez F (2009) Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th international conference on autonomous agents and multiagent systems (AAMAS), pp 689–696

    Google Scholar 

  • Korzhyk D, Conitzer V, Parr R (2010) Complexity of computing optimal Stackelberg strategies in security resource allocation games. In: Proceedings of the 24th AAAI conference on artificial intelligence, pp 805–810

    Google Scholar 

  • Leitmann G (1978) On generalized Stackelberg strategies. Optim Theory Appl 26(4):637–643

    Article  MathSciNet  MATH  Google Scholar 

  • Lipton R, Markakis E, Mehta A (2003) Playing large games using simple strategies. In: EC: proceedings of the ACM conference on electronic commerce. ACM, New York, pp 36–41

    Google Scholar 

  • McFadden D (1972) Conditional logit analysis of qualitative choice behavior. Technical report

    Google Scholar 

  • McFadden D (1976) Quantal choice analysis: a survey. Ann Econ Soc Meas 5(4):363–390

    Google Scholar 

  • McKelvey RD, Palfrey TR (1995) Quantal response equilibria for normal form games. Games Econ Behav 10(1):6–38

    Article  MathSciNet  MATH  Google Scholar 

  • Nguyen TH, Yang R, Azaria A, Kraus S, Tambe M (2013) Analyzing the effectiveness of adversary modeling in security games. In: Conference on artificial intelligence (AAAI)

    Google Scholar 

  • Nguyen T, Jiang A, Tambe M (2014) Stop the compartmentalization: Unified robust algorithms for handling uncertainties in security games. In: International conference on autonomous agents and multiagent systems (AAMAS)

    Google Scholar 

  • Nguyen TH, Fave FMD, Kar D, Lakshminarayanan AS, Yadav A, Tambe M, Agmon N, Plumptre AJ, Driciru M, Wanyama F, Rwetsiba A (2015) Making the most of our regrets: regret-based solutions to handle payoff uncertainty and elicitation in green security games. In: Conference on decision and game theory for security

    MATH  Google Scholar 

  • Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008) Playing games with security: an efficient exact algorithm for Bayesian Stackelberg games. In: Proceedings of the 7th international conference on autonomous agents and multiagent systems (AAMAS), pp 895–902

    Google Scholar 

  • Pita J, Jain M, Western C, Portway C, Tambe M, Ordonez F, Kraus S, Parachuri P (2008) Deployed ARMOR protection: the application of a game-theoretic model for security at the Los Angeles International Airport. In: Proceedings of the 7th international conference on autonomous agents and multiagent systems (AAMAS), pp 125–132

    Google Scholar 

  • Pita J, Bellamane H, Jain M, Kiekintveld C, Tsai J, Ordóñez F, Tambe M (2009a) Security applications: lessons of real-world deployment. ACM SIGecom Exchanges 8(2):5

    Article  Google Scholar 

  • Pita J, Jain M, Ordóñez F, Tambe M, Kraus S, Magori-Cohen R (2009b) Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties. In: The eighth international conference on autonomous agents and multiagent systems

    MATH  Google Scholar 

  • Pita J, John R, Maheswaran R, Tambe M, Kraus S (2012) A robust approach to addressing human adversaries in security games. In: European conference on artificial intelligence (ECAI)

    Google Scholar 

  • Sanderson E, Forrest J, Loucks C, Ginsberg J, Dinerstein E, Seidensticker J, Leimgruber P, Songer M, Heydlauff A, O’Brien T, Bryja G, Klenzendorf S, Wikramanayake E (2006) Setting priorities for the conservation and recovery of wild tigers: 2005–2015. The technical assessment. Technical report, WCS, WWF, Smithsonian, and NFWF-STF, New York/Washington, DC

    Google Scholar 

  • Shieh E, An B, Yang R, Tambe M, Baldwin C, DiRenzo J, Maule B, Meyer G (2012) PROTECT: a deployed game theoretic system to protect the ports of the United States. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems (AAMAS)

    Google Scholar 

  • von Stackelberg H (1934) Marktform und Gleichgewicht. Springer, Vienna

    Google Scholar 

  • von Stengel B, Zamir S (2004) Leadership with commitment to mixed strategies. Technical report, LSE-CDAM-2004-01, CDAM research report

    Google Scholar 

  • Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, Cambridge

    Book  MATH  Google Scholar 

  • Tversky A, Kahneman D (1992) Advances in prospect theory: cumulative representation of uncertainty. J Risk Uncertain 5(4):297–323

    Article  MATH  Google Scholar 

  • Vanek O, Yin Z, Jain M, Bosansky B, Tambe M, Pechoucek M (2012) Game-theoretic resource allocation for malicious packet detection in computer networks. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems (AAMAS)

    Google Scholar 

  • Yang R, Kiekintveld C, Ordonez F, Tambe M, John R (2011) Improving resource allocation strategy against human adversaries in security games. In: IJCAI

    MATH  Google Scholar 

  • Yang R, Ordonez F, Tambe M (2012) Computing optimal strategy against quantal response in security games. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems (AAMAS)

    Google Scholar 

  • Yang R, Jiang AX, Tambe M, Ordóñez F (2013a) Scaling-up security games with boundedly rational adversaries: a cutting-plane approach. In: Proceedings of the twenty-third international joint conference on artificial intelligence. AAAI Press, pp 404–410

    Google Scholar 

  • Yang R, Jiang AX, Tambe M, Ordóñez F (2013b) Scaling-up security games with boundedly rational adversaries: a cutting-plane approach. In: IJCAI

    Google Scholar 

  • Yang R, Ford B, Tambe M, Lemieux A (2014) Adaptive resource allocation for wildlife protection against illegal poachers. In: International conference on autonomous agents and multiagent systems (AAMAS)

    Google Scholar 

  • Yin Z, Jain M, Tambe M, Ordonez F (2011) Risk-averse strategies for security games with execution and observational uncertainty. In: Proceedings of the 25th AAAI conference on artificial intelligence (AAAI), pp 758–763

    Google Scholar 

  • Yin Z, Jiang A, Johnson M, Tambe M, Kiekintveld C, Leyton-Brown K, Sandholm T, Sullivan J (2012) TRUSTS: scheduling randomized patrols for Fare Inspection in Transit Systems. In: Proceedings of the 24th conference on innovative applications of artificial intelligence (IAAI)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debarun Kar .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this entry

Cite this entry

Kar, D. et al. (2016). Trends and Applications in Stackelberg Security Games. In: Basar, T., Zaccour, G. (eds) Handbook of Dynamic Game Theory. Springer, Cham. https://doi.org/10.1007/978-3-319-27335-8_27-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27335-8_27-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27335-8

  • Online ISBN: 978-3-319-27335-8

  • eBook Packages: Springer Reference Religion and PhilosophyReference Module Humanities and Social SciencesReference Module Humanities

Publish with us

Policies and ethics