Skip to main content

2013 | OriginalPaper | Buchkapitel

3. Deployed Security Games for Patrol Planning

verfasst von : Fernando Ordóñez, Milind Tambe, Juan F. Jara, Manish Jain, Christopher Kiekintveld, Jason Tsai

Erschienen in: Handbook of Operations Research for Homeland Security

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nations and organizations need to secure locations of economic, military, or political importance from groups or individuals that can cause harm. The fact that there are limited security resources prevents complete security coverage, which allows adversaries to observe and exploit patterns in patrolling or monitoring and enables them to plan attacks that avoid existing patrols. The use of randomized security policies that are more difficult for adversaries to predict and exploit can counter their surveillance capabilities and improve security. In this chapter we describe the recent development of models to assist security forces in randomizing their patrols and their deployment in real applications. The systems deployed are based on fast algorithms for solving large instances of Bayesian Stackelberg games that capture the interaction between security forces and adversaries. Here we describe a generic mathematical formulation of these models, present some of the results that have allowed these systems to be deployed in practice, and outline remaining future challenges. We discuss the deployment of these systems in two real-world security applications: (1) The police at the Los Angeles International Airport uses these models to randomize the placement of checkpoints on roads entering the airport and the routes of canine unit patrols within the airport terminals. (2) The Federal Air Marshal Service (FAMS) uses these models to randomize the schedules of air marshals on international flights.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Our current implementation uses complete matrices to represent H and Ca, but sparse representations could offer additional performance improvements.
 
Literatur
Zurück zum Zitat Agmon N, Sadov V, Kaminka GA, Kraus S (2008) The impact of adversarial knowledge on adversarial planning in perimeter patrol. In: AAMAS Agmon N, Sadov V, Kaminka GA, Kraus S (2008) The impact of adversarial knowledge on adversarial planning in perimeter patrol. In: AAMAS
Zurück zum Zitat An B, Pita J, Shieh E, Tambe M, Kiekintveld C, Marecki J (2011) GUARDS and PROTECT: next generation applications of security games. ACM SIGecom Exchanges 10(1):31–34 An B, Pita J, Shieh E, Tambe M, Kiekintveld C, Marecki J (2011) GUARDS and PROTECT: next generation applications of security games. ACM SIGecom Exchanges 10(1):31–34
Zurück zum Zitat Avenhaus R, von Stengel B, Zamir S (2002) Inspection games. In: Aumann RJ, Hart S (eds) Handbook of game theory, vol 3. North-Holland, Amsterdam, pp 1947–1987 (Chap. 51) Avenhaus R, von Stengel B, Zamir S (2002) Inspection games. In: Aumann RJ, Hart S (eds) Handbook of game theory, vol 3. North-Holland, Amsterdam, pp 1947–1987 (Chap. 51)
Zurück zum Zitat Babu L, Lin L, Batta R (2006) Passenger grouping under constant threat probability in an airport security system. Eur J Oper Res 168:633–644CrossRef Babu L, Lin L, Batta R (2006) Passenger grouping under constant threat probability in an airport security system. Eur J Oper Res 168:633–644CrossRef
Zurück zum Zitat Bard JF (1999) Practical bilevel optimization: algorithms and applications. Nonconvex optimization and its applications, vol 30. Springer, Berlin Bard JF (1999) Practical bilevel optimization: algorithms and applications. Nonconvex optimization and its applications, vol 30. Springer, Berlin
Zurück zum Zitat Basar T, Olsder GJ (1995) Dynamic noncooperative game theory, 2nd edn. Academic, San Diego Basar T, Olsder GJ (1995) Dynamic noncooperative game theory, 2nd edn. Academic, San Diego
Zurück zum Zitat Blanco M, Valino A, Heijs J, Baumert T, Gomez JG (2007) The economic cost of March 11: measuring the direct economic cost of the terrorist attack on March 11, 2004 in Madrid. Terror Polit Viol 19(4):489–509CrossRef Blanco M, Valino A, Heijs J, Baumert T, Gomez JG (2007) The economic cost of March 11: measuring the direct economic cost of the terrorist attack on March 11, 2004 in Madrid. Terror Polit Viol 19(4):489–509CrossRef
Zurück zum Zitat Breton M, Alg A, Haurie A (1988) Sequential stackelberg equilibria in two-person games. Optim Theor Appl 59(1):71–97CrossRef Breton M, Alg A, Haurie A (1988) Sequential stackelberg equilibria in two-person games. Optim Theor Appl 59(1):71–97CrossRef
Zurück zum Zitat Brown G, Carlyle M, Kline J, Wood K (2005) A two-sided optimization for theater ballistic missile defense. Oper Res 53:263–275CrossRef Brown G, Carlyle M, Kline J, Wood K (2005) A two-sided optimization for theater ballistic missile defense. Oper Res 53:263–275CrossRef
Zurück zum Zitat Brown G, Carlyle M, Royset J, Wood K (2005) On the complexity of delaying an adversary’s project. In: Golden B, Raghavan S, Wasil E (eds) The next wave in computing, optimization and decision technologies. Springer, Berlin, pp 3–17CrossRef Brown G, Carlyle M, Royset J, Wood K (2005) On the complexity of delaying an adversary’s project. In: Golden B, Raghavan S, Wasil E (eds) The next wave in computing, optimization and decision technologies. Springer, Berlin, pp 3–17CrossRef
Zurück zum Zitat Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces, 36(6):530–544CrossRef Brown G, Carlyle M, Salmeron J, Wood K (2006) Defending critical infrastructure. Interfaces, 36(6):530–544CrossRef
Zurück zum Zitat Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In: ACM EC-06, pp 82–90 Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In: ACM EC-06, pp 82–90
Zurück zum Zitat Dy JG, Brodley CE (2004) Feature selection for unsupervised learning. J Mach Learn Res 5:845–889 Dy JG, Brodley CE (2004) Feature selection for unsupervised learning. J Mach Learn Res 5:845–889
Zurück zum Zitat Ester M, Kriegel H-P, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial database with noise. Technical report, Institute for Computer Science, University of Munich Ester M, Kriegel H-P, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial database with noise. Technical report, Institute for Computer Science, University of Munich
Zurück zum Zitat Fayyad U, Piatetsky-Shapiro G, Smyth P (1996) From data mining to knowledge discovery: an overview. AI Mag 17(3):37–54 Fayyad U, Piatetsky-Shapiro G, Smyth P (1996) From data mining to knowledge discovery: an overview. AI Mag 17(3):37–54
Zurück zum Zitat Fudenberg D, Tirole J (1991) Game theory. MIT, Cambridge Fudenberg D, Tirole J (1991) Game theory. MIT, Cambridge
Zurück zum Zitat Gatti N (2008) Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: Ghallab M, Spyropoulos CD, Pakotakis N, Avouris N (eds) ECAI. IOS Press, Amsterdam, pp 403–407 Gatti N (2008) Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: Ghallab M, Spyropoulos CD, Pakotakis N, Avouris N (eds) ECAI. IOS Press, Amsterdam, pp 403–407
Zurück zum Zitat Harsanyi JC, Selten R (1972) A generalized Nash solution for two-person bargaining games with incomplete information. Manag Sci 18(5):80–106CrossRef Harsanyi JC, Selten R (1972) A generalized Nash solution for two-person bargaining games with incomplete information. Manag Sci 18(5):80–106CrossRef
Zurück zum Zitat Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Ordóñez F, Tambe M (2010) Software assistants for patrol planning at LAX and federal air Marshals service. Interfaces 40(4):267–290CrossRef Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Ordóñez F, Tambe M (2010) Software assistants for patrol planning at LAX and federal air Marshals service. Interfaces 40(4):267–290CrossRef
Zurück zum Zitat Jiang A, Leyton-Brown K (2006) A polynomial-time algorithm for action-graph games. Artif Intell 679–684 Jiang A, Leyton-Brown K (2006) A polynomial-time algorithm for action-graph games. Artif Intell 679–684
Zurück zum Zitat Kahneman D, Tvesky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–292CrossRef Kahneman D, Tvesky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47(2):263–292CrossRef
Zurück zum Zitat Kiekintveld C, Jain M, Tsai J, Pita J, Tambe M, Ordóñez F (2009) Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems. Budapest, Hungary, May 10–15, 1:689–696 Kiekintveld C, Jain M, Tsai J, Pita J, Tambe M, Ordóñez F (2009) Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems. Budapest, Hungary, May 10–15, 1:689–696
Zurück zum Zitat Koller D, Milch B (2003) Multi-agent influence diagrams for representing and solving games. Games Econ Behav 45(1):181–221CrossRef Koller D, Milch B (2003) Multi-agent influence diagrams for representing and solving games. Games Econ Behav 45(1):181–221CrossRef
Zurück zum Zitat Larson R (1974) A hypercube queueing modeling for facility location and redistricting in urban emergency services. J Comput Oper Res 1:67–95CrossRef Larson R (1974) A hypercube queueing modeling for facility location and redistricting in urban emergency services. J Comput Oper Res 1:67–95CrossRef
Zurück zum Zitat Leitmann G (1978) On generalized stackelberg strategies. J Optim Theor Appl 26(4):637–643CrossRef Leitmann G (1978) On generalized stackelberg strategies. J Optim Theor Appl 26(4):637–643CrossRef
Zurück zum Zitat Looney R (2002) Economic costs to the United States stemming from the 9/11 attacks. Strateg Insights 1(6) Looney R (2002) Economic costs to the United States stemming from the 9/11 attacks. Strateg Insights 1(6)
Zurück zum Zitat Lye K-w, Wing JM (2005) Game strategies in network security. Int J Inf Secur 4(1–2):71–86 Lye K-w, Wing JM (2005) Game strategies in network security. Int J Inf Secur 4(1–2):71–86
Zurück zum Zitat McKelvey RD, Palfrey TR (1995) Quantal response equilibria for normal form games. Games Econ Behav 10:6–38CrossRef McKelvey RD, Palfrey TR (1995) Quantal response equilibria for normal form games. Games Econ Behav 10:6–38CrossRef
Zurück zum Zitat Nie X, Batta R, Drury CG, Lin L (2007) Optimal placement of suicide bomber detectors. Mil Oper Res 12:65–78CrossRef Nie X, Batta R, Drury CG, Lin L (2007) Optimal placement of suicide bomber detectors. Mil Oper Res 12:65–78CrossRef
Zurück zum Zitat Osbourne MJ, Rubinstein A (1994) A course in game theory. MIT, Cambridge Osbourne MJ, Rubinstein A (1994) A course in game theory. MIT, Cambridge
Zurück zum Zitat Paruchuri P, Tambe M, Ordonez F, Kraus S (2006) Security in multiagent systems by policy randomization. In: Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-06). Hakodate, Japan, May 8–12, 273–280 Paruchuri P, Tambe M, Ordonez F, Kraus S (2006) Security in multiagent systems by policy randomization. In: Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS-06). Hakodate, Japan, May 8–12, 273–280
Zurück zum Zitat Paruchuri P, Pearce JP, Tambe M, Ordóñez F, Kraus S (2007) An efficient heuristic approach for security against multiple adversaries. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007). Honolulu, Hawaii, May 14–18 Paruchuri P, Pearce JP, Tambe M, Ordóñez F, Kraus S (2007) An efficient heuristic approach for security against multiple adversaries. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007). Honolulu, Hawaii, May 14–18
Zurück zum Zitat Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordóñez F, Kraus S (2008) Playing games with security: an efficient exact algorithm for bayesian stackelberg games. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems. Estoril, Portugal, May 12–16 Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordóñez F, Kraus S (2008) Playing games with security: an efficient exact algorithm for bayesian stackelberg games. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems. Estoril, Portugal, May 12–16
Zurück zum Zitat Pita J, Jain M, Western C, Portway C, Tambe M, Ordóñez F, Kraus S, Parachuri P (2008) Deployed ARMOR protection: The application of a game-theoretic model for security at the Los Angeles international airport. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems. Estoril, Portugal, May 12–16 Pita J, Jain M, Western C, Portway C, Tambe M, Ordóñez F, Kraus S, Parachuri P (2008) Deployed ARMOR protection: The application of a game-theoretic model for security at the Los Angeles international airport. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems. Estoril, Portugal, May 12–16
Zurück zum Zitat Pita J, Tambe M, Kiekintveld C, Cullen S, Steigerwald E (2011) GUARDS – game theoretic security allocation on a national scale. In: Proceedings of the 10th International conference on autonomous agents and multiagent systems. Taipei, Taiwan, May 2–6, 1:37–44 Pita J, Tambe M, Kiekintveld C, Cullen S, Steigerwald E (2011) GUARDS – game theoretic security allocation on a national scale. In: Proceedings of the 10th International conference on autonomous agents and multiagent systems. Taipei, Taiwan, May 2–6, 1:37–44
Zurück zum Zitat Ruan S, Meirina C, Yu F, Pattipati KR, Popp RL (2005) Patrolling in a stochastic environment. In: 10th international command and control research and tech. symposium, June 13–16 Ruan S, Meirina C, Yu F, Pattipati KR, Popp RL (2005) Patrolling in a stochastic environment. In: 10th international command and control research and tech. symposium, June 13–16
Zurück zum Zitat Sandler T, Arce DG (2003) Terrorism and game theory. Simul Gaming 34(3):319–337CrossRef Sandler T, Arce DG (2003) Terrorism and game theory. Simul Gaming 34(3):319–337CrossRef
Zurück zum Zitat Srivastava V, Neel J, MacKenzie AB, Menon R, Dasilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutuor 7(4) Srivastava V, Neel J, MacKenzie AB, Menon R, Dasilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutuor 7(4)
Zurück zum Zitat Treisman M, Faulkner A (1987) Generation of random sequences by human subjects: Cognitive operations or psychological process? J Exp Psychol 116(4):337–355 Treisman M, Faulkner A (1987) Generation of random sequences by human subjects: Cognitive operations or psychological process? J Exp Psychol 116(4):337–355
Zurück zum Zitat Tsai J, Rathi S, Kiekintveld C, Ordóñez F, Tambe M (2009) IRIS - A tool for strategic security application in transportation networks. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, Budapest, Hungary, May 10–15 Tsai J, Rathi S, Kiekintveld C, Ordóñez F, Tambe M (2009) IRIS - A tool for strategic security application in transportation networks. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, Budapest, Hungary, May 10–15
Zurück zum Zitat von Stackelberg H (1934) Marktform und Gleichgewicht. Springer, Vienna von Stackelberg H (1934) Marktform und Gleichgewicht. Springer, Vienna
Zurück zum Zitat von Stengel B, Zamir S (2004) Leadership with commitment to mixed strategies. Technical report LSE-CDAM-2004-01, CDAM research report von Stengel B, Zamir S (2004) Leadership with commitment to mixed strategies. Technical report LSE-CDAM-2004-01, CDAM research report
Zurück zum Zitat Wagenaar WA (1972) Generation of random sequences by human subjects: A critical survey of literature. Psychol Bull 77(1):65–72CrossRef Wagenaar WA (1972) Generation of random sequences by human subjects: A critical survey of literature. Psychol Bull 77(1):65–72CrossRef
Zurück zum Zitat Wein LM (2009) Homeland security: From mathematical models to policy implementation: the 2008 Philip McCord Morse lecture. Oper Res 57(4):801–811CrossRef Wein LM (2009) Homeland security: From mathematical models to policy implementation: the 2008 Philip McCord Morse lecture. Oper Res 57(4):801–811CrossRef
Metadaten
Titel
Deployed Security Games for Patrol Planning
verfasst von
Fernando Ordóñez
Milind Tambe
Juan F. Jara
Manish Jain
Christopher Kiekintveld
Jason Tsai
Copyright-Jahr
2013
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-5278-2_3