Abstract
The global need for security of key infrastructure with limited resources has led to significant interest in research conducted in multiagent systems towards game-theory for real-world security. As reported previously at AAMAS, three applications based on Stackelberg games have been transitioned to real-world deployment. This includes ARMOR, used by the Los Angeles International Airport to randomize checkpoints of roadways and canine patrols [16]; IRIS, which helps the US Federal Air Marshal Service [22] in scheduling air marshals on international flights; and GUARDS [17], which is under evaluation by the US Transportation Security Administration to allocate resources for airport protection. We as a community remain in the early stages of these deployments, and must continue to develop our understanding of core principles of innovative applications of game theory for security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Or the attacker may be sufficiently deterred and dissuaded from attacking the protected target.
- 2.
Creating optimal Stackelberg defender strategies that increase the attacker’s difficulty of surveillance is an open research issue in the literature; here we choose to maximize unpredictability as the first step.
- 3.
In general these types of security games are non-zero-sum [21], though for Boston as a first step it was decided to cast the game as zero-sum.
References
Agmon N, Kraus S, Kaminka GA, Sadov V (2009) Adversarial uncertainty in multi-robot patrol. In IJCAI
Basilico N, Gatti N, Amigoni F (2009) Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In AAMAS
Blair D (2010) Annual threat assessment of the US intelligence community for the senate select committee on intelligence. http://www.dni.gov/testimonies/20100202_testimony.pdf
Camerer CF (2003) Behavioral Game Theory: Experiments in Strategic Interaction. Princeton University Press, USA
Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In ACM EC
Dozier K (2011) Bin laden trove of documents sharpen US aim. http://www.msnbc.msn.com/id/43331634/ns/us_news-security/t/bin-laden-trove-%documents-sharpen-us-aim/
Fudenberg D, Tirole J (1991) Game Theory. MIT, USA
Jain M, Kardes E, Kiekintveld C, Ordonez F, Tambe M (2010) Security games with arbitrary schedules: A branch and price approach. In AAAI
Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Tambe M, Ordonez F (2010) Software assistants for randomized patrol planning for the LAX airport police and the federal air marshal service. Interfaces 40:267–290
Kiekintveld C, Jain M, Tsai J, Pita J, Tambe M, Ordóñez F (2009) Computing optimal randomized resource allocations for massive security games. In AAMAS
Kiekintveld C, Marecki J, Tambe M (2011) Approximation methods for infinite bayesian Stackelberg games: modeling distributional uncertainty. In AAMAS
Korzhyk D, Conitzer V, Parr R (2010) Complexity of computing optimal Stackelberg strategies in security resource allocation games. In Proceedings of The 24th AAAI conference on artificial intelligence. Atlanta, GA, USA, pp 805–810
Korzhyk D, Conitzer V, Parr R (2011) Solving Stackelberg games with uncertain observability. In AAMAS
McKelvey DR, Palfrey TR (1995) Quantal response equilibria for normal form games. Games Econ Behav 10(1):6–38
Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008) Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In AAMAS
Pita J, Jain M, Western C, Portway C, Tambe M, Ordonez F, Kraus S, Parachuri P (2008) Deployed ARMOR protection: the application of a game-theoretic model for security at the Los Angeles International Airport. In AAMAS
Pita J, Tambe M, Kiekintveld C, Cullen S, Steigerwald E (2011) GUARDS – game theoretic security allocation on a national scale. In AAMAS
Rogers BW, Palfrey TR, Camerer CF (2009) Heterogeneous quantal response equilibrium and cognitive hierarchies. J Econ Theory, 144(4)
Shakarian P, Dickerson JP, Subrahmanian VS (2012) Adversarial geospatial abduction problems. ACM Trans Intell Syst Technol 34:1 to 34:35
Shieh E, An B, Yang R, Tambe M, Baldwin C, DiRenzo J, Maule B, Meyer G (2012) Protect: A deployed game theoretic system to protect the ports of the united states. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Taipei, Taiwan
Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, NY
Tsai J, Rathi S, Kiekintveld C, Ordonez F, Tambe M (2009) IRIS: a tool for strategic security allocation in transportation networks. In AAMAS. Budapest, Hungary pp 37–44
Vanek O, Jakob M, Hrstka O, Pechoucek M (2011) Using multi-agent simulation to improve the security of maritime transit. In MABS
Wright J, Leyton-Brown K (2010) Beyond equilibrium: Predicting human behavior in normal form games. In AAAI
Yang R, Kiekintveld C, Ordonez F, Tambe M, John R (2011) Improving resource allocation strategy against human adversaries in security games. In IJCAI
Yang R, Tambe M, Ordonez F (2012) Computing optimal strategy against quantal response in security games. In AAMAS
Yin Z, Jain M, Tambe M, Ordóñez F (2011) Risk-averse strategies for security games with execution and observational uncertainty. In AAAI
Acknowledgements
We thank the USCG offices, and particularly Sector Boston, for their exceptional collaboration. Thanks to Matt Johnson for technical assistance in the preparation of this chapter. The views expressed herein are those of the author(s) and are not to be construed as official or reflecting the views of the Commandant or of the U.S. Coast Guard. This research was supported by the United States Department of Homeland Security through the Center for Risk and Economic Analysis of Terrorism Events (CREATE) under award number 2010-ST-061-RE0001.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Shieh, E. et al. (2013). PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_20
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5311-6_20
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5310-9
Online ISBN: 978-1-4614-5311-6
eBook Packages: Computer ScienceComputer Science (R0)