Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu
{"title":"有欺骗性的图上安全游戏中的综合资源分配与策略合成","authors":"Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu","doi":"arxiv-2407.14436","DOIUrl":null,"url":null,"abstract":"Deception plays a crucial role in strategic interactions with incomplete\ninformation. Motivated by security applications, we study a class of two-player\nturn-based deterministic games with one-sided incomplete information, in which\nplayer 1 (P1) aims to prevent player 2 (P2) from reaching a set of target\nstates. In addition to actions, P1 can place two kinds of deception resources:\n\"traps\" and \"fake targets\" to disinform P2 about the transition dynamics and\npayoff of the game. Traps \"hide the real\" by making trap states appear normal,\nwhile fake targets \"reveal the fiction\" by advertising non-target states as\ntargets. We are interested in jointly synthesizing optimal decoy placement and\ndeceptive defense strategies for P1 that exploits P2's misinformation. We\nintroduce a novel hypergame on graph model and two solution concepts: stealthy\ndeceptive sure winning and stealthy deceptive almost-sure winning. These\nidentify states from which P1 can prevent P2 from reaching the target in a\nfinite number of steps or with probability one without allowing P2 to become\naware that it is being deceived. Consequently, determining the optimal decoy\nplacement corresponds to maximizing the size of P1's deceptive winning region.\nConsidering the combinatorial complexity of exploring all decoy allocations, we\nutilize compositional synthesis concepts to show that the objective function\nfor decoy placement is monotone, non-decreasing, and, in certain cases, sub- or\nsuper-modular. This leads to a greedy algorithm for decoy placement, achieving\na $(1 - 1/e)$-approximation when the objective function is sub- or\nsuper-modular. The proposed hypergame model and solution concepts contribute to\nunderstanding the optimal deception resource allocation and deception\nstrategies in various security applications.","PeriodicalId":501316,"journal":{"name":"arXiv - CS - Computer Science and Game Theory","volume":"64 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception\",\"authors\":\"Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu\",\"doi\":\"arxiv-2407.14436\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Deception plays a crucial role in strategic interactions with incomplete\\ninformation. Motivated by security applications, we study a class of two-player\\nturn-based deterministic games with one-sided incomplete information, in which\\nplayer 1 (P1) aims to prevent player 2 (P2) from reaching a set of target\\nstates. In addition to actions, P1 can place two kinds of deception resources:\\n\\\"traps\\\" and \\\"fake targets\\\" to disinform P2 about the transition dynamics and\\npayoff of the game. Traps \\\"hide the real\\\" by making trap states appear normal,\\nwhile fake targets \\\"reveal the fiction\\\" by advertising non-target states as\\ntargets. We are interested in jointly synthesizing optimal decoy placement and\\ndeceptive defense strategies for P1 that exploits P2's misinformation. We\\nintroduce a novel hypergame on graph model and two solution concepts: stealthy\\ndeceptive sure winning and stealthy deceptive almost-sure winning. These\\nidentify states from which P1 can prevent P2 from reaching the target in a\\nfinite number of steps or with probability one without allowing P2 to become\\naware that it is being deceived. Consequently, determining the optimal decoy\\nplacement corresponds to maximizing the size of P1's deceptive winning region.\\nConsidering the combinatorial complexity of exploring all decoy allocations, we\\nutilize compositional synthesis concepts to show that the objective function\\nfor decoy placement is monotone, non-decreasing, and, in certain cases, sub- or\\nsuper-modular. This leads to a greedy algorithm for decoy placement, achieving\\na $(1 - 1/e)$-approximation when the objective function is sub- or\\nsuper-modular. The proposed hypergame model and solution concepts contribute to\\nunderstanding the optimal deception resource allocation and deception\\nstrategies in various security applications.\",\"PeriodicalId\":501316,\"journal\":{\"name\":\"arXiv - CS - Computer Science and Game Theory\",\"volume\":\"64 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Computer Science and Game Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2407.14436\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Computer Science and Game Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2407.14436","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception
Deception plays a crucial role in strategic interactions with incomplete
information. Motivated by security applications, we study a class of two-player
turn-based deterministic games with one-sided incomplete information, in which
player 1 (P1) aims to prevent player 2 (P2) from reaching a set of target
states. In addition to actions, P1 can place two kinds of deception resources:
"traps" and "fake targets" to disinform P2 about the transition dynamics and
payoff of the game. Traps "hide the real" by making trap states appear normal,
while fake targets "reveal the fiction" by advertising non-target states as
targets. We are interested in jointly synthesizing optimal decoy placement and
deceptive defense strategies for P1 that exploits P2's misinformation. We
introduce a novel hypergame on graph model and two solution concepts: stealthy
deceptive sure winning and stealthy deceptive almost-sure winning. These
identify states from which P1 can prevent P2 from reaching the target in a
finite number of steps or with probability one without allowing P2 to become
aware that it is being deceived. Consequently, determining the optimal decoy
placement corresponds to maximizing the size of P1's deceptive winning region.
Considering the combinatorial complexity of exploring all decoy allocations, we
utilize compositional synthesis concepts to show that the objective function
for decoy placement is monotone, non-decreasing, and, in certain cases, sub- or
super-modular. This leads to a greedy algorithm for decoy placement, achieving
a $(1 - 1/e)$-approximation when the objective function is sub- or
super-modular. The proposed hypergame model and solution concepts contribute to
understanding the optimal deception resource allocation and deception
strategies in various security applications.