有欺骗性的图上安全游戏中的综合资源分配与策略合成

Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu
{"title":"有欺骗性的图上安全游戏中的综合资源分配与策略合成","authors":"Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu","doi":"arxiv-2407.14436","DOIUrl":null,"url":null,"abstract":"Deception plays a crucial role in strategic interactions with incomplete\ninformation. Motivated by security applications, we study a class of two-player\nturn-based deterministic games with one-sided incomplete information, in which\nplayer 1 (P1) aims to prevent player 2 (P2) from reaching a set of target\nstates. In addition to actions, P1 can place two kinds of deception resources:\n\"traps\" and \"fake targets\" to disinform P2 about the transition dynamics and\npayoff of the game. Traps \"hide the real\" by making trap states appear normal,\nwhile fake targets \"reveal the fiction\" by advertising non-target states as\ntargets. We are interested in jointly synthesizing optimal decoy placement and\ndeceptive defense strategies for P1 that exploits P2's misinformation. We\nintroduce a novel hypergame on graph model and two solution concepts: stealthy\ndeceptive sure winning and stealthy deceptive almost-sure winning. These\nidentify states from which P1 can prevent P2 from reaching the target in a\nfinite number of steps or with probability one without allowing P2 to become\naware that it is being deceived. Consequently, determining the optimal decoy\nplacement corresponds to maximizing the size of P1's deceptive winning region.\nConsidering the combinatorial complexity of exploring all decoy allocations, we\nutilize compositional synthesis concepts to show that the objective function\nfor decoy placement is monotone, non-decreasing, and, in certain cases, sub- or\nsuper-modular. This leads to a greedy algorithm for decoy placement, achieving\na $(1 - 1/e)$-approximation when the objective function is sub- or\nsuper-modular. The proposed hypergame model and solution concepts contribute to\nunderstanding the optimal deception resource allocation and deception\nstrategies in various security applications.","PeriodicalId":501316,"journal":{"name":"arXiv - CS - Computer Science and Game Theory","volume":"64 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception\",\"authors\":\"Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu\",\"doi\":\"arxiv-2407.14436\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Deception plays a crucial role in strategic interactions with incomplete\\ninformation. Motivated by security applications, we study a class of two-player\\nturn-based deterministic games with one-sided incomplete information, in which\\nplayer 1 (P1) aims to prevent player 2 (P2) from reaching a set of target\\nstates. In addition to actions, P1 can place two kinds of deception resources:\\n\\\"traps\\\" and \\\"fake targets\\\" to disinform P2 about the transition dynamics and\\npayoff of the game. Traps \\\"hide the real\\\" by making trap states appear normal,\\nwhile fake targets \\\"reveal the fiction\\\" by advertising non-target states as\\ntargets. We are interested in jointly synthesizing optimal decoy placement and\\ndeceptive defense strategies for P1 that exploits P2's misinformation. We\\nintroduce a novel hypergame on graph model and two solution concepts: stealthy\\ndeceptive sure winning and stealthy deceptive almost-sure winning. These\\nidentify states from which P1 can prevent P2 from reaching the target in a\\nfinite number of steps or with probability one without allowing P2 to become\\naware that it is being deceived. Consequently, determining the optimal decoy\\nplacement corresponds to maximizing the size of P1's deceptive winning region.\\nConsidering the combinatorial complexity of exploring all decoy allocations, we\\nutilize compositional synthesis concepts to show that the objective function\\nfor decoy placement is monotone, non-decreasing, and, in certain cases, sub- or\\nsuper-modular. This leads to a greedy algorithm for decoy placement, achieving\\na $(1 - 1/e)$-approximation when the objective function is sub- or\\nsuper-modular. The proposed hypergame model and solution concepts contribute to\\nunderstanding the optimal deception resource allocation and deception\\nstrategies in various security applications.\",\"PeriodicalId\":501316,\"journal\":{\"name\":\"arXiv - CS - Computer Science and Game Theory\",\"volume\":\"64 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Computer Science and Game Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2407.14436\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Computer Science and Game Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2407.14436","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在不完全信息的战略互动中,欺骗起着至关重要的作用。受安全应用的启发,我们研究了一类具有单边不完全信息的基于双回合的确定性博弈,其中玩家 1(P1)的目标是阻止玩家 2(P2)达到一组目标状态。除了行动之外,P1 还可以放置两种欺骗资源:"陷阱 "和 "假目标",让 P2 不知道博弈的过渡动态和回报。陷阱通过让陷阱状态看起来正常来 "掩人耳目",而假目标则通过把非目标状态当作目标来 "揭露真相"。我们感兴趣的是为 P1 共同合成利用 P2 的错误信息的最佳诱饵放置和欺骗性防御策略。我们在图模型上引入了一个新颖的超博弈和两个求解概念:隐蔽欺骗性必胜和隐蔽欺骗性几乎必胜。这两个概念确定了 P1 可以阻止 P2 在无限步数或概率为一的情况下到达目标而不让 P2 意识到自己被欺骗的状态。考虑到探索所有诱饵分配的组合复杂性,我们利用组合合成概念来证明诱饵放置的目标函数是单调的、非递减的,并且在某些情况下是次模态或超模态的。这就产生了一种诱饵放置的贪婪算法,当目标函数是次模态或超模态时,该算法可实现 $(1 - 1/e)$ 近似值。所提出的超游戏模型和解决概念有助于理解各种安全应用中的最佳欺骗资源分配和欺骗策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception
Deception plays a crucial role in strategic interactions with incomplete information. Motivated by security applications, we study a class of two-player turn-based deterministic games with one-sided incomplete information, in which player 1 (P1) aims to prevent player 2 (P2) from reaching a set of target states. In addition to actions, P1 can place two kinds of deception resources: "traps" and "fake targets" to disinform P2 about the transition dynamics and payoff of the game. Traps "hide the real" by making trap states appear normal, while fake targets "reveal the fiction" by advertising non-target states as targets. We are interested in jointly synthesizing optimal decoy placement and deceptive defense strategies for P1 that exploits P2's misinformation. We introduce a novel hypergame on graph model and two solution concepts: stealthy deceptive sure winning and stealthy deceptive almost-sure winning. These identify states from which P1 can prevent P2 from reaching the target in a finite number of steps or with probability one without allowing P2 to become aware that it is being deceived. Consequently, determining the optimal decoy placement corresponds to maximizing the size of P1's deceptive winning region. Considering the combinatorial complexity of exploring all decoy allocations, we utilize compositional synthesis concepts to show that the objective function for decoy placement is monotone, non-decreasing, and, in certain cases, sub- or super-modular. This leads to a greedy algorithm for decoy placement, achieving a $(1 - 1/e)$-approximation when the objective function is sub- or super-modular. The proposed hypergame model and solution concepts contribute to understanding the optimal deception resource allocation and deception strategies in various security applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信