Non-Additive Security Games

Authors

  • Sinong Wang The Ohio State University
  • Fang Liu The Ohio State University
  • Ness Shroff The Ohio State University

DOI:

https://doi.org/10.1609/aaai.v31i1.10567

Keywords:

Game theory, Security, Algorithms, Complexity

Abstract

Security agencies have found security games to be useful models to understand how to better protect their assets. The key practical elements in this work are: (i) the attacker can simultaneously attack multiple targets, and (ii) different targets exhibit different types of dependencies based on the assets being protected (e.g., protection of critical infrastructure, network security, etc.). However, little is known about the computational complexity of these problems, especially when there exist dependencies among the targets. Moreover, previous security game models do not in general scale well. In this paper, we investigate a general security game where the utility function is defined on a collection of subsets of all targets, and provide a novel theoretical framework to show how to compactly represent such a game, efficiently compute the optimal (minimax) strategies, and characterize the complexity of this problem. We apply our theoretical framework to the network security game. We characterize settings under which we find a polynomial time algorithm for computing optimal strategies. In other settings we prove the problem is NP-hard and provide an approximation algorithm.

Downloads

Published

2017-02-10

How to Cite

Wang, S., Liu, F., & Shroff, N. (2017). Non-Additive Security Games. Proceedings of the AAAI Conference on Artificial Intelligence, 31(1). https://doi.org/10.1609/aaai.v31i1.10567

Issue

Section

AAAI Technical Track: Game Theory and Economic Paradigms