Playing Stackelberg Security Games in perfect formulations

IF 6.7 2区 管理学 Q1 MANAGEMENT
Pamela Bustamante-Faúndez , Víctor Bucarey L. , Martine Labbé , Vladimir Marianov , Fernando Ordoñez
{"title":"Playing Stackelberg Security Games in perfect formulations","authors":"Pamela Bustamante-Faúndez ,&nbsp;Víctor Bucarey L. ,&nbsp;Martine Labbé ,&nbsp;Vladimir Marianov ,&nbsp;Fernando Ordoñez","doi":"10.1016/j.omega.2024.103068","DOIUrl":null,"url":null,"abstract":"<div><p>Protecting critical infrastructure from intentional damage requires foreseeing the strategies of possible attackers. We formulate this problem as a Stackelberg Security Game. A <em>defender</em> must decide which specific targets to protect with limited resources, thus maximizing their expected utility (e.g., minimizing damage value) and considering that a second player (or players), called an <em>attacker</em>, responds in the best possible way.</p><p>Since Stackelberg Security Games are generally NP-hard, the main challenge in finding optimal strategies in real applications is to develop efficient methodologies for large instances.</p><p>We propose a general methodology to find a Strong Stackelberg Equilibrium for Stackelberg Security Games, exploiting the structure in the defender’s strategy set. This methodology consists of two steps. First, we formulate the problem by using variables representing the probability of defending each target. The formulation must be either a polynomial-size MILP and/or an MILP with an exponential number of constraints that are separable in polynomial time through branch-and-cut. In the second step, we recover the mixed strategies in the original space efficiently (in polynomial time) by using column generation. We apply this methodology to various security applications studied in the last decade. We generalize known examples and propose new examples. Finally, we provide an extensive computational study of the various formulations based on marginal probabilities.</p></div>","PeriodicalId":19529,"journal":{"name":"Omega-international Journal of Management Science","volume":null,"pages":null},"PeriodicalIF":6.7000,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Omega-international Journal of Management Science","FirstCategoryId":"91","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0305048324000355","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MANAGEMENT","Score":null,"Total":0}
引用次数: 0

Abstract

Protecting critical infrastructure from intentional damage requires foreseeing the strategies of possible attackers. We formulate this problem as a Stackelberg Security Game. A defender must decide which specific targets to protect with limited resources, thus maximizing their expected utility (e.g., minimizing damage value) and considering that a second player (or players), called an attacker, responds in the best possible way.

Since Stackelberg Security Games are generally NP-hard, the main challenge in finding optimal strategies in real applications is to develop efficient methodologies for large instances.

We propose a general methodology to find a Strong Stackelberg Equilibrium for Stackelberg Security Games, exploiting the structure in the defender’s strategy set. This methodology consists of two steps. First, we formulate the problem by using variables representing the probability of defending each target. The formulation must be either a polynomial-size MILP and/or an MILP with an exponential number of constraints that are separable in polynomial time through branch-and-cut. In the second step, we recover the mixed strategies in the original space efficiently (in polynomial time) by using column generation. We apply this methodology to various security applications studied in the last decade. We generalize known examples and propose new examples. Finally, we provide an extensive computational study of the various formulations based on marginal probabilities.

在完美公式中玩斯泰克尔伯格安全游戏
要保护关键基础设施免遭蓄意破坏,就必须预见到可能的攻击者的策略。我们将这一问题表述为 "堆栈伯格安全博弈"。防御者必须决定用有限的资源保护哪些特定目标,从而使其预期效用最大化(例如,使损害值最小化),并考虑到第二个玩家(或多个玩家),即攻击者、由于 Stackelberg 安全博弈通常是 NP 难的,因此在实际应用中寻找最优策略的主要挑战是为大型实例开发有效的方法。我们提出了一种通用方法,利用防御者策略集的结构,为 Stackelberg 安全博弈寻找强 Stackelberg 均衡。该方法包括两个步骤。首先,我们使用代表防御每个目标概率的变量来表述问题。该表述必须是多项式大小的 MILP 和/或具有指数数量约束条件的 MILP,这些约束条件可通过分支切割法在多项式时间内分离。第二步,我们利用列生成技术在原始空间中高效地(多项式时间内)恢复混合策略。我们将这一方法应用于过去十年中研究的各种安全应用。我们归纳了已知的例子,并提出了新的例子。最后,我们对各种基于边际概率的公式进行了广泛的计算研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Omega-international Journal of Management Science
Omega-international Journal of Management Science 管理科学-运筹学与管理科学
CiteScore
13.80
自引率
11.60%
发文量
130
审稿时长
56 days
期刊介绍: Omega reports on developments in management, including the latest research results and applications. Original contributions and review articles describe the state of the art in specific fields or functions of management, while there are shorter critical assessments of particular management techniques. Other features of the journal are the "Memoranda" section for short communications and "Feedback", a correspondence column. Omega is both stimulating reading and an important source for practising managers, specialists in management services, operational research workers and management scientists, management consultants, academics, students and research personnel throughout the world. The material published is of high quality and relevance, written in a manner which makes it accessible to all of this wide-ranging readership. Preference will be given to papers with implications to the practice of management. Submissions of purely theoretical papers are discouraged. The review of material for publication in the journal reflects this aim.
文献相关原料
公司名称 产品信息 采购帮参考价格
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信