Game Theory for Safety and Security. Arunesh Sinha

Similar documents
Research Statement Arunesh Sinha aruneshs/

Modeling Security Decisions as Games

Scalable Randomized Patrolling for Securing Rapid Transit Networks

Exploring Information Asymmetry in Two-Stage Security Games

A short introduction to Security Games

Computational Game Theory for Security: Progress and Challenges

CPS 570: Artificial Intelligence Game Theory

Stochastic Game Models for Homeland Security

Game Theory for Security:

Anavilhanas Natural Reserve (about 4000 Km 2 )

Game Theoretic Analysis of Security and Sustainability

PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States

Intel Labs, Hillsboro, OR, June 2013 Aug 2013 Research Intern: Machine learning based detection of activity of mobile-phone users.

Randomizing Regression Tests Using Game Theory

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

Milind Tambe on game theory in security applications Machine...

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Database Audit Workload Prioritization via Game Theory

Technology Evolutionary Games in Complex Transportation Systems in the Face of Adaptive Adversaries

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan

S&T Stakeholders Conference

Guidetti Translates Thesis Into Profession

Thanh H. Nguyen. Research Interests: Artificial Intelligence, Multi-Agent Systems, Game Theory, Machine Learning, Operations Research, Optimization.

Game Theory. Department of Electronics EL-766 Spring Hasan Mahmood

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport

Alternation in the repeated Battle of the Sexes

S&T Stakeholders Conference

Cognitive Radios Games: Overview and Perspectives

A Game Theoretic Approach on Addressing Cooperation among Human Adversaries

A Game Theoretic Approach on Addressing Collusion among Human Adversaries

What Do You Expect? Concepts

Five-In-Row with Local Evaluation and Beam Search

Practice Session 2. HW 1 Review

Chapter 3 Learning in Two-Player Matrix Games

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Introduction to Industrial Organization Professor: Caixia Shen Fall 2014 Lecture Note 6 Games and Strategy (ch.4)-continue

Central Bank Intervention in Large Value Payment Systems: An experimental approach

/13/$ IEEE

Stanford Center for AI Safety

MSc(CompSc) List of courses offered in

STEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS

1 Game Theory and Strategic Analysis

Wireless Network Security Spring 2014

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016

Artificial Intelligence. What is AI?

Backward Induction and Stackelberg Competition

Game Theory and Randomized Algorithms

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu

Control of the Contract of a Public Transport Service

Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization

CSC304 Lecture 3. Game Theory (More examples, PoA, PoS) CSC304 - Nisarg Shah 1

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Arpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore

100 Year Study on AI: 1st Study Panel Report

Game theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in

Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks Sneha Thankachan M.E 1, M.Jebakumari M.

Identifying Materials using Radio Frequency

Advisor: Professor Frank Y.S. Lin Present by Tim Q.T. Chen

The extensive form representation of a game

Game Theory ( nd term) Dr. S. Farshad Fatemi. Graduate School of Management and Economics Sharif University of Technology.

NEXTOR Symposium November 2000 Robert Hoffman Metron, Inc.

Chapter 1 Introduction

Self-Organising, Open and Cooperative P2P Societies From Tags to Networks

Machine Learning and Data Mining Course Summary

ECON 282 Final Practice Problems

Dominant and Dominated Strategies

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Game Theoretic Resistance to DoS Attacks Using Hidden Difficul

Extensive Form Games. Mihai Manea MIT

Copyright 2008, Yan Chen

Online Resource to The evolution of sanctioning institutions: an experimental approach to the social contract

Elements of Artificial Intelligence and Expert Systems

Artificial Intelligence. Minimax and alpha-beta pruning

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Dependable AI Systems

Report to Congress regarding the Terrorism Information Awareness Program

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes

n-person Games in Normal Form

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Crime Prediction and Prevention using Agent-Based Modeling

system design & management

Social Identity Theory

Situational Awareness Object (SAO), A Simple, Yet Powerful Tool for Operational C2 Systems

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

FOSS in Military Computing

Engineered Resilient Systems DoD Science and Technology Priority

Machine Learning in Iterated Prisoner s Dilemma using Evolutionary Algorithms

Executive Summary. Chapter 1. Overview of Control

Fictitious Play applied on a simplified poker game

1\2 L m R M 2, 2 1, 1 0, 0 B 1, 0 0, 0 1, 1

An Introduction to Poker Opponent Modeling

This one-day event is open to all licensed. law-enforcement professionals, specialty investigators and criminal justice students.

Chapter 1 The Field of Computing. Slides Modified by Vicky Seno

Texas Hold em Inference Bot Proposal. By: Brian Mihok & Michael Terry Date Due: Monday, April 11, 2005

CSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi

Complex DNA and Good Genes for Snakes

Transcription:

Game Theory for Safety and Security Arunesh Sinha

Motivation: Real World Security Issues 2

Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3

Prior Work Stackelberg Games have been very successful in practice 4

Defender-Adversary Interaction: Stackelberg Game Defender moves first laying out defense Adversary knows the defender s mixed strategy Does not know the coin flips Stackelberg Equilibrium: Optimal randomization Day: 53 12 4 p 1 =0.75 p 2 =0.25 1,0 3,3 9,9 1,0 5

Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 6

Threat Screening Games Screening for Threats 7

Airport Passenger Screening Problem Threat Screening Games Transport Security Administration (TSA) screens 800 million passengers Dynamics Aviation Risk Management Solution (DARMS) [with USC/CREATE and Milind Tambe] An intelligent approach to screening passengers Screening Effectiveness Timely Screening 8

Actors Threat Screening Games Screener (TSA) Adversary (e.g., terrorist) Benign Screenees 9

Current Screening Approach Two broad passengers categories TSA Pre and general Same type of screening in each category (some exceptions, e.g. children) Long queues Lot of screening time spent on benign passengers 10

Proposed Solution Threat Screening Games Finer categories for passengers: risk levels and flight Randomized screening Low High Risk, Domestic International 5 40 95 210 X-Ray + Metal Detector X-Ray + AIT 090 30 X-Ray 04 20 Metal Detector 11

Actions of Players Threat Screening Games Defender: Allocation of screening teams to passengers Resource capacity constraints: For example, X-ray can be used only 40 times/ hour Passenger flow constraints: All passengers in all categories must be screened Adversary: Choose a passenger category to arrive in 12

Payoffs of Players Defender payoff: Measures the loss incurred from a successful attack Probability of attack is a function of the defender and adversary strategy Adversary payoff: Measures the gain from a successful attack Probability of attack is a function of the defender and adversary strategy 13

Optimization Problem Threat Screening Games Maximize defender payoff (i.e., minimize loss) Function of defender randomized strategy and adversary best response Subject to The adversary plays a best response 14

Technical Challenges Threat Screening Games Very large game: ~ 10 41 defender actions The equilibrium computation is NP Hard Current large scale optimization approaches like Column Generation (CG) fail Invalid solution with compact representation (CR) approach 15

Technical Contribution Threat Screening Games We propose the Marginal Guided Algorithm (MGA) Brown, Sinha, Schlenker, Tambe; One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats [AAAI 2016] Runtime (seconds) 10000 1000 100 10 1 0.1 10 20 30 40 50 Flights MGA CG Screener Utility 0-1 -2-3 -4 10 20 30 40 50 Flights MGA CG 16

General Model for Screening Threat Screening Games 17

Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 18

Privacy Concern in HealthCare Audit Games 19

What s Going On? Audit Games } Permissive access control regime } Trust employees to do the right thing } Malicious insiders can cause breaches 20

Auditing Audit Games Post-hoc inspection of employee accesses to patient health records Detect violations Punish violators Auditing is ubiquitous and effective against insider threat Financial auditing, computer security auditing 21

Audit Game Model Audit Games Auditors k Inspections, k n n suspicious cases Adversary 22

Actions of Players Audit Games Defender chooses a randomized allocation of limited resources Also, chooses a punishment level Adversary plays his best response: chooses a misdeed to commit Adversary gets punished if the misdeed is caught 23

Payoff of Players Defender payoff includes the loss incurred from a successful breach Probability of breach is a function of the defender and adversary strategy Defender payoff includes loss from a high punishment level (Punishment is not free) High punishment level Negative work environment -> loss for organization Immediate loss from punishment -> Suspension/Firing means loss for org. Adversary payoff includes the gain from a successful breach Probability of attack is a function of the defender and adversary strategy Adversary payoff includes the loss due to punishment when caught 24

Optimization Problem Audit Games Maximize defender payoff (i.e., minimize loss) Function of defender randomized strategy, punishment level and adversary best response Subject to The adversary plays a best response (non-linear) Used techniques like Second Order Cone Programs for fast computation [IJCAI 2013, AAAI 2015] 25

General Model for Auditing Punishment costs lead to tradeoff between deterrence and loss due to misdeed Optimal inspection allocation and punishment policy can be computed efficiently 26

Outline Threat Screening Games Audit games Crime Prediction using Learning in Games 27

A Big Problem Crime Prediction In 2009 7,857,000 crime $10,994,562,000 Urban Crime 28

Challenges Model behavior of criminals What is their utility? Criminals are not homogenous Crime has spatial aspects Opportunity Real world data about frequent defender-adversary interaction available 29

Predictive Policing Solution Crime Prediction Our contribution [AAMAS 2015, 2016] Learn crime and crime evolution in response to patrolling Then, design optimal patrols Distinct from crime predicts crime philosophy in criminology [Chen 2004; McCue 2015] Deployment: Licensed to a start-up ArmorWay; deployment in University of Southern California Accuracy 1 0.5 0 EMC2 Crime predicts crime Random 30

The Role of Learning in Stackelberg Games Data about past interaction Learn Adversary Behavior Adversary Model Plan Optimal Defender Strategy Defender Strategy 31

Domain Description Crime Prediction Five patrol areas Eight hour shifts Crime data: number of crimes/shift/area Patrol data: number of officers/shift/area 32

Learning Model Crime Prediction Dynamic Bayesian Network (AAMAS 15) Captures interaction between officers and criminals D: Number of defenders (known) X: Number of criminals (hidden) Y: Number of crimes (known) T: Step = Shift Expectation-Maximization with intelligent factoring T T+1 33

Crime Prediction Input Defender Strategy Planning Search problem Search space grows exponentially with the number of steps that are planned ahead DBN (Criminal Model) DOGS algorithm (AAMAS 2015) Output Crime Number Apply Dynamic Programming in the search problem 34

Experimental Results Crime heat map without patrol Crime heat map with random patrol Crime heat map with optimal patrol 35

Data Enables Learning in Games Data about past interaction Learn Adversary Behavior Adversary Model Plan Optimal Defender Strategy Defender Strategy 36

Takeaway Game theory enables intelligent randomized allocation of limited security resources against an adaptive adversary 37

Thank You 38