ebook img

Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned PDF

334 Pages·2011·2.02 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned

SecurityandGameTheory Globalthreatsofterrorism,drug-smuggling,andothercrimeshaveledtoasignificant increaseintheneedtodeploylimitedsecurityresourcestomaximizetheireffectiveness. Gametheoryprovidesasoundmathematicalapproachforsucheffectivedeployment of limited security resources. A typical resulting approach is to randomize security schedulestoavoidpredictability,takingintoaccounttheimportanceofdifferenttargets andpotentialadversaryreactions. Thisbookdistillstheforefrontofthisresearchongametheoryforsecuritytoprovide thefirstandonlystudyoflong-termdeployedapplicationsofgametheoryinthesecurity ofkeyorganizationssuchastheLosAngelesInternationalAirportpoliceandtheU.S. FederalAirMarshalsService.Theauthorandhisresearchgroupdrawontheirexten- siveexperienceworkingwithsecurityofficialstointelligentlyallocatelimitedsecurity resourcestoprotecttargets,outliningtheapplicationsoftheiralgorithmsinresearchand therealworld. The book also includes professional perspectives from security experts Erroll G. Southers;LieutenantCommanderJoeDiRenzoIII,U.S.CoastGuard;LieutenantCom- manderBenMaule,U.S.CoastGuard;CommanderErikJensen,U.S.CoastGuard;and LieutenantFredS.BertschIV,U.S.CoastGuard. milind tambe is a Professor of Computer Science and Industrial and Systems Engineering at the University of Southern California (USC). His research is in the areaofArtificialIntelligence,specificallyagent-basedandmulti-agentsystems.Heis aFellowoftheAssociationforAdvancementofArtificialIntelligenceandrecipientof theAssociationforComputingMachinery’sAutonomousAgentsResearchAward.He is also the recipient of the Christopher Columbus Fellowship Foundation Homeland SecurityAward,aspecialcommendationgivenbytheLosAngelesInternationalAir- port’s police from the city of LosAngeles, Commander First Coast Guard District’s OperationalExcellenceAward,theUSCViterbiSchoolofEngineering’suse-inspired researchaward,anOkawaFoundationfacultyresearchaward,theUSCStevenB.Sample TeachingandMentoringaward,andtheACMrecognitionofserviceaward. Security and Game Theory Algorithms, Deployed Systems, Lessons Learned MILIND TAMBE UniversityofSouthernCalifornia cambridge university press Cambridge,NewYork,Melbourne,Madrid,CapeTown, Singapore,SãoPaulo,Delhi,Tokyo,MexicoCity CambridgeUniversityPress 32AvenueoftheAmericas,NewYork,NY10013-2473,USA www.cambridge.org Informationonthistitle:www.cambridge.org/9781107096424 ©MilindTambe2012 Thispublicationisincopyright.Subjecttostatutoryexception andtotheprovisionsofrelevantcollectivelicensingagreements, noreproductionofanypartmaytakeplacewithoutthewritten permissionofCambridgeUniversityPress. Firstpublished2012 PrintedintheUnitedStatesofAmerica AcatalogrecordforthispublicationisavailablefromtheBritishLibrary. LibraryofCongressCataloginginPublicationData Tambe,Milind,1965– Securityandgametheory:algorithms,deployedsystems,lessonslearned/MilindTambe. p. cm. Includesbibliographicalreferencesandindex. ISBN978-1-107-09642-4(hardback) 1. Computersecurity. 2. Gametheory. 3. Security,International–Mathematicalmodels. I. Title. QA76.9.M35T362011 005.8–dc23 2011038733 ISBN978-1-107-09642-4Hardback CambridgeUniversityPresshasnoresponsibilityforthepersistenceoraccuracyofURLsfor externalorthird-partyInternetWebsitesreferredtointhispublicationanddoesnotguarantee thatanycontentonsuchWebsitesis,orwillremain,accurateorappropriate. ToSonali,Arjun,andRaam Contents Acknowledgments pagexiii 1 IntroductionandOverviewofSecurityGames 1 MilindTambeandManishJain 1.1 Introduction 1 1.2 Motivation:SecurityGames 3 1.3 OverviewofPartII:ApplicationsofSecurityGames 9 1.4 OverviewofPartIII:AlgorithmicAdvancesto AchieveScale-upinSecurityGames 11 1.5 PartIV:TowardtheFuture 17 1.6 Summary 23 PART I: SECURITY EXPERTS’ PERSPECTIVES 2 LAX–TerrorTarget:TheHistory,theReason,the Countermeasure 27 ErrollG.Southers 2.1 Introduction 27 2.2 ABriefHistoryofSignificantEvents 27 2.3 TerrorismandtheEconomicSignificanceof theAviationDomain 34 2.4 AviationSecurity 36 2.5 LAXTerrorHistory 37 2.6 RANDStudy 39 2.7 LosAngelesWorldAirportsPolice 41 2.8 TerroristOperationalPlanningCycle 44 2.9 CREATEPilotProject 45 2.10 Summary 49 vii viii Contents 3 MaritimeTransportationSystemSecurityandtheUseofGame Theory:APerfectMatchtoAddressOperationalandTactical Concerns 51 Dr.JoeDiRenzoIII,LieutenantCommanderBenMaule,Lieutenant CommanderErikJensen,and LieutenantFredS.BertschIV PART II: DEPLOYED APPLICATIONS 4 DeployedARMORProtection:TheApplicationofa Game-TheoreticModelforSecurityattheLosAngeles InternationalAirport 67 JamesPita,ManishJain,JanuszMarecki,FernandoOrdóñez, ChristopherPortway,MilindTambe,CraigWestern, PraveenParuchuri,andSaritKraus 4.1 Introduction 67 4.2 RelatedWork 69 4.3 SecurityDomainDescription 70 4.4 Approach 72 4.5 SystemArchitecture 76 4.6 DesignChallenges 80 4.7 ExperimentalResults 81 4.8 Summary 86 5 IRIS–AToolforStrategicSecurityAllocationin TransportationNetworks 88 JasonTsai,ShyamsunderRathi,ChristopherKiekintveld, FernandoOrdóñez,andMilindTambe 5.1 Introduction 88 5.2 FederalAirMarshalService 91 5.3 Background 92 5.4 SystemArchitecture 96 5.5 MajorChallenges 98 5.6 OrganizationalAcceptance 100 5.7 ExperimentalResults 102 5.8 Summary 104 6 GUARDS:Game-TheoreticSecurityAllocation onaNationalScale 107 JamesPita,MilindTambe,ChristopherKiekintveld, ShaneCullen,andErinSteigerwald Contents ix 6.1 Introduction 107 6.2 Background 109 6.3 NationalDeploymentChallenges 111 6.4 SystemArchitecture 118 6.5 Evaluation 119 6.6 LessonsinTransitioningResearchintoPractice 124 6.7 RelatedWorkandSummary 125 PART III: EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES 7 CoordinatingRandomizedPoliciesforIncreasingthe SecurityofAgentSystems 131 PraveenParuchuri,JonathanP.Pearce,JanuszMarecki, MilindTambe,FernandoOrdóñez,andSaritKraus 7.1 Introduction 131 7.2 RelatedWork 134 7.3 RandomizationwithNoAdversaryModel 135 7.4 RandomizationUsingaPartialAdversaryModel 140 7.5 ExperimentalResults 147 7.6 ConclusionsandPolicyImplications 153 8 ComputingOptimalRandomizedResourceAllocations forMassiveSecurityGames 156 ChristopherKiekintveld,ManishJain,JasonTsai,JamesPita, FernandoOrdóñez,andMilindTambe 8.1 Introduction 156 8.2 Game-TheoreticModelingofSecurityGames 157 8.3 MotivatingDomains 159 8.4 ACompactRepresentationforMultipleResources 161 8.5 ExploitingPayoffStructure 165 8.6 SchedulingandResourceConstraints 169 8.7 ExperimentalEvaluation 171 8.8 Conclusion 175 9 SecurityGameswithArbitrarySchedules:ABranch- and-PriceApproach 177 ManishJain,ErimKardes¸,ChristopherKiekintveld, MilindTambe,andFernandoOrdóñez 9.1 Introduction 177 9.2 SPARS 178

Description:
Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize securi
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.