Approximation approaches for solving security games with surveillance cost : a preliminary study
Security game models have been deployed to allocate limited security resources for critical infrastructure protection. Much work on this topic assumes that attackers have perfect knowledge of the defender’s randomized strategy. However, this assumption is not realistic, considering surveillance c...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/155034 https://dl.acm.org/doi/proceedings/10.5555/2772879 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-155034 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1550342022-01-28T06:41:01Z Approximation approaches for solving security games with surveillance cost : a preliminary study Guo, Qingyu An, Bo Kolobov, Andrey School of Computer Science and Engineering 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015) Engineering::Computer science and engineering Security Games Markov Decision Process Security game models have been deployed to allocate limited security resources for critical infrastructure protection. Much work on this topic assumes that attackers have perfect knowledge of the defender’s randomized strategy. However, this assumption is not realistic, considering surveillance cost, since attackers may only have partial knowledge of the defender’s strategies, and may dynamically decide whether to attack or conduct more surveillance. Recently, a model called OPTS (OPtimal sTopping Security games) considered surveillance cost and formulated the attacker’s optimal decision making problem as a finite state space MDP (Markov Decision Process). However, the known exact algorithms for this MDP cannot scale up. In this paper, we extend several approximation approaches based on the MCTS (MonteCarlo Tree Search) method and RTDP (Real-Time Dynamic Programming) to MDPs of the OPTS model. We also propose an iterative deepening based approximation algorithm. Experimental results show that these approaches can solve much larger security games with surveillance cost. Ministry of Education (MOE) National Research Foundation (NRF) Accepted version This work is supported by Singapore MOE AcRF Tier 1 grant MOE RG33/13. This research is also supported by the National Research Foundation, Prime Minister’s Office, Singapore under its IDM Futures Funding Initiative and administered by the Interactive and Digital Media Programme Office. 2022-01-28T04:46:36Z 2022-01-28T04:46:36Z 2015 Conference Paper Guo, Q., An, B. & Kolobov, A. (2015). Approximation approaches for solving security games with surveillance cost : a preliminary study. 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). 978-1-4503-3413-6 https://hdl.handle.net/10356/155034 https://dl.acm.org/doi/proceedings/10.5555/2772879 en MOE RG33/13 © 2015 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved. This paper was published in Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015) and is made available with permission of International Foundation for Autonomous Agents and Multiagent Systems. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering Security Games Markov Decision Process |
spellingShingle |
Engineering::Computer science and engineering Security Games Markov Decision Process Guo, Qingyu An, Bo Kolobov, Andrey Approximation approaches for solving security games with surveillance cost : a preliminary study |
description |
Security game models have been deployed to allocate limited security resources for critical infrastructure protection.
Much work on this topic assumes that attackers have perfect
knowledge of the defender’s randomized strategy. However, this assumption is not realistic, considering surveillance
cost, since attackers may only have partial knowledge of the
defender’s strategies, and may dynamically decide whether
to attack or conduct more surveillance. Recently, a model
called OPTS (OPtimal sTopping Security games) considered
surveillance cost and formulated the attacker’s optimal decision making problem as a finite state space MDP (Markov
Decision Process). However, the known exact algorithms for
this MDP cannot scale up. In this paper, we extend several approximation approaches based on the MCTS (MonteCarlo Tree Search) method and RTDP (Real-Time Dynamic
Programming) to MDPs of the OPTS model. We also propose an iterative deepening based approximation algorithm.
Experimental results show that these approaches can solve
much larger security games with surveillance cost. |
author2 |
School of Computer Science and Engineering |
author_facet |
School of Computer Science and Engineering Guo, Qingyu An, Bo Kolobov, Andrey |
format |
Conference or Workshop Item |
author |
Guo, Qingyu An, Bo Kolobov, Andrey |
author_sort |
Guo, Qingyu |
title |
Approximation approaches for solving security games with surveillance cost : a preliminary study |
title_short |
Approximation approaches for solving security games with surveillance cost : a preliminary study |
title_full |
Approximation approaches for solving security games with surveillance cost : a preliminary study |
title_fullStr |
Approximation approaches for solving security games with surveillance cost : a preliminary study |
title_full_unstemmed |
Approximation approaches for solving security games with surveillance cost : a preliminary study |
title_sort |
approximation approaches for solving security games with surveillance cost : a preliminary study |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/155034 https://dl.acm.org/doi/proceedings/10.5555/2772879 |
_version_ |
1723453422230831104 |