Visible to the public Security Game with Non-additive Utilities and Multiple Attacker Resources

TitleSecurity Game with Non-additive Utilities and Multiple Attacker Resources
Publication TypeConference Paper
Year of Publication2017
AuthorsWang, Sinong, Shroff, Ness
Conference NameProceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5032-7
KeywordsComplexity, computational game theory, game theoretic security, human factors, Metrics, pubcrawl, Scalability, security games
Abstract

There has been significant interest in studying security games for modeling the interplay of attacks and defenses on various systems involving critical infrastructure, financial system security, political campaigns, and civil safeguarding. However, existing security game models typically either assume additive utility functions, or that the attacker can attack only one target. Such assumptions lead to tractable analysis, but miss key inherent dependencies that exist among different targets in current complex networks. In this paper, we generalize the classical security game models to allow for non-additive utility functions. We also allow attackers to be able to attack multiple targets. We examine such a general security game from a theoretical perspective and provide a unified view. In particular, we show that each security game is equivalent to a combinatorial optimization problem over a set system e, which consists of defender's pure strategy space. The key technique we use is based on the transformation, projection of a polytope, and the ellipsoid method. This work settles several open questions in security game domain and extends the state-of-the-art of both the polynomial solvable and NP-hard class of the security game.

URLhttp://doi.acm.org/10.1145/3078505.3078519
DOI10.1145/3078505.3078519
Citation Keywang_security_2017