Information Disclosure as a Means to Security
2015, adaptive agents and multi-agents systems
https://doi.org/10.5555/2772879.2773237Abstract
In this paper we present a novel Stackelberg-type model of security domains: Security Assets aSsignment with Information disclosure (SASI). The model combines both the features of the Stackelberg Security Games (SSGs) model and of the Bayesian Persuasion (BP) model. More specifically, SASI includes: a) an uncontrolled, exogenous security state that serves as the Defender's private information; b) multiple security assets with non-accumulating, targetlocal defence capability; c) a pro-active, verifiable and public, unidirectional information disclosure channel from the Defender to the Attacker. We show that SASI with a non-degenerate information disclosure can be arbitrarily more efficient, than a "silent" Stackelberg assets allocation. We also provide a linear program reformulation of SASI that can be solved in polynomial time in SASI parameters. Furthermore, we show that it is possible to remove one of SASI parameters and, rather than require it as an input, recover it by computation. As a result, SASI becomes highly scalable.
References (27)
- N. Agmon. On events in multi-robot patrol in adversarial environments. In Proceedings of the 9th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), volume 2, pages 591-598, 2010.
- N. Agmon, V. Sadov, S. Kraus, and G. A. Kaminka. The impact of adversarial knowledge on adversarial planning in perimeter patrol. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), pages 55-62, 2008.
- A. Azaria, S. Kraus, C. V. Goldman, and Z. Rabinovich. Strategic information disclosure to people with multiple alternatives. ACM Transactions on Intelligent Systems and Technology (TIST), 5(4), 2015.
- V. M. Bier, S. Oliveros, and L. Samuelson. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4):563-587, 2007.
- A. Blum, N. Haghtalab, and A. D. Procaccia. Lazy defenders are almost optimal against diligent attackers. In Proceedings of the 28th AAAI Conference on Artificial Intelligence, pages 573-579, 2014.
- V. Conitzer and D. Korzhyk. Commitment to correlated strategies. In Proceedings of the 25th National Conference on Artificial Intelligence (AAAI), pages 632-637, 2011.
- I. Csiszar. I-divergence geometry of probability distributions and minimisation problems. The Annals of Probability, 3(1):146-158, 1975.
- S. Dughmi, N. Immorlica, and A. Roth. Constrained signalling in auction design. In SODA, 2014.
- Y. Emek, M. Feldman, I. Gamzu, R. Paes Leme, and M. Tennenholtz. Signaling schemes for revenue maximization. In Proceedings of the 13th ACM Conference on Electronic Commerce, EC '12, pages 514-531, New York, NY, USA, 2012. ACM.
- F. Fang, A. X. Jiang, and M. Tambe. Otptimal patrol strategy for protecting moving targets with multiple mobile resources. JAIR, 48:583-634, November 2013.
- M. Guo and A. Deligkas. Revenue maximization via hiding item attributes. In Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, IJCAI'13, pages 157-163. AAAI Press, 2013.
- M. Jain, J. Tsai, J. Pita, C. Kiekintveld, S. Rathi, F. Ordonez, and M. Tambe. Software assistants for randomized patrol planning for the LAX airport police and the Federal Air Marshals service. Interfaces, 40(4):267-290, 2010.
- A. X. Jiang, T. H. Nguyen, M. Tambe, and A. D. Procaccia. Monotonic maximin: A robust stackelberg solution against boundedly rational followers. In Proceedings of the 4th Conference on Decision and Game Theory for Security (GameSec), pages 119-139, 2013.
- E. Kamenica and M. Gentzkow. Bayesian persuasion. American Economic Review, 101(6):2590-2615, 2011.
- J. Letchford and V. Conitzer. Solving security games on graphs via marginal probabilities. In Proceedings of the 27th AAAI Conference on Artificial Intelligence (AAAI-13), pages 591-597, 2013.
- E. Nudelman, J. Wortman, Y. Shoham, and K. Leyton-Bro wn. Run the gamut: A comprehensive approach to evaluating game-theoretic al gorithms. In Proceedings of the Third International Joint Conference on Autonomo us Agents and Multiagent Systems-Volume 2, pages 880-887. IEEE Computer Society, 2004.
- J. Pita, M. Jain, M. Tambe, F. Ordonez, and S. Kraus. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition. Artificial Intelligence, 2010.
- R. Powell. Allocating defensive resources with private information about vulnerability. American Political Science Review, 101(4):799-809, 2007.
- N. Schweizer and N. Szech. Optimal revelation life-changing information. Working Paper, 2012.
- E. Serra and V. S. Subrahmanian. Should behavioral models of terrorist groups be disclosed? IEEE Intelligent Systems, 29(4), 2014.
- E. Serra and V. S. Subrahmanian. A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavior models. IEEE Transactions on Computational Social Systems, 1(1):66-88, 2014.
- E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, and G. Meyer. Protect: A deployed game theoretic system to protect the ports of the united states. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012.
- J. Tsai, S. Rathi, C. Kiekintveld, F. Ordonez, and M. Tambe. IRIS -a tool for strategic security allocation in transportation networks. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems -Industry Track, pages 37-44, 2009.
- H.-S. J. Tsao and S.-C. Fang. Linear programming with inequality constraints via entropic perturbation. International Journal of Mathematics and Mathematical Sciences, 19(1):177-184, 1996.
- H. Xu, Z. Rabinovich, S. Dughmi, and M. Tambe. Two-stage security games -exploring information asymmetry. In The 29th AAAI Conference, 2015. to appear.
- R. Yang, B. Ford, M. Tambe, and A. Lemieux. Adaptive resource allocation for wildlife protection against illegal poachers. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2014.
- J. Zhuang and V. M. Bier. Reasons for secrecy and deception in Homeland-Security resource allocation. Risk Analysis, 30(12):1737-1743, 2010.