CSC304 Lecture 7 Game Theory : Security games, Applications to security
CSC304 - Nisarg Shah 1
CSC304 Lecture 7 Game Theory : Security games, Applications to - - PowerPoint PPT Presentation
CSC304 Lecture 7 Game Theory : Security games, Applications to security CSC304 - Nisarg Shah 1 Until now Simultaneous-move Games All players act simultaneously Nash equilibria = stable outcomes Each player is best responding
CSC304 - Nisarg Shah 1
CSC304 - Nisarg Shah 2
CSC304 - Nisarg Shah 3
➢ Cannot change later
➢ Follower must believe that leader’s commitment is credible
➢ Can assume to be a pure strategy without loss of generality ➢ If multiple actions are best response, break ties in favor of
the leader
CSC304 - Nisarg Shah 4
➢ Can’t I, as player 1, commit to playing 𝑦1 in a
simultaneous-move game too?
➢ Player 2 wouldn’t believe you. I’ll play 𝑦1. No you won’t. I’m playing 𝑦2; 𝑦1 is not a best response. Doesn’t
committing. Yeah right.
CSC304 - Nisarg Shah 5
CSC304 - Nisarg Shah 6
➢ Can also represent “information sets”, multiple moves, …
Player 1 Player 2 Player 2 (1,1) (3,0) (0,0) (2,1)
CSC304 - Nisarg Shah 7
P1 P2 Left Right Up (1 , 1) (3 , 0) Down (0 , 0) (2 , 1)
CSC304 - Nisarg Shah 8
P1 P2 Left Right Up (1 , 1) (3 , 0) Down (0 , 0) (2 , 1)
CSC304 - Nisarg Shah 9
P1 P2 Left Right Up (1 , 1) (3 , 0) Down (0 , 0) (2 , 1)
CSC304 - Nisarg Shah 10
➢ P1 commits to: Up w.p. 0.5 − 𝜗, Down w.p. 0.5 + 𝜗 ➢ P2 is still better off playing Right ➢ 𝔽[Reward] to P1 ≈ 2.5 ➢ Note: If P1 plays both actions with probability exactly 0.5,
we assume P2 plays Right (break ties in favor of leader)
P1 P2 Left Right Up (1 , 1) (3 , 0) Down (0 , 0) (2 , 1)
CSC304 - Nisarg Shah 11
➢ If 𝑦1
∗, 𝑦2 ∗ is a NE, P1 can always commit to 𝑦1 ∗, ensure
∗, and achieve the reward in the NE
➢ P1 may be able to commit to a better strategy than 𝑦1
∗
➢ Law enforcement is better off committing to a mixed
patrolling strategy, and announcing the strategy publicly!
CSC304 - Nisarg Shah 12
𝑦1
𝑦2
𝑈𝐵 𝑦2 = min 𝑦2
𝑦1
𝑈𝐵 𝑦2
➢ Simultaneous-move, P1 going first, and P2 going first are
essentially identical scenarios.
CSC304 - Nisarg Shah 13
𝑦1
𝑈 𝐵 𝑔 𝑦1
𝑦2
𝑈 𝐶 𝑦2
CSC304 - Nisarg Shah 14
➢ Strategies that cause P2 to play Left ➢ Strategies that cause P2 to play Right
P1 P2 Left Right Up (1 , 1) (3 , 0) Down (0 , 0) (2 , 1)
CSC304 - Nisarg Shah 15
P1 P2 Left Right Up (1 , 1) (3 , 0) Down (0 , 0) (2 , 1) Reward of P1 assuming P2 plays Left Condition that causes P2 to play Left
CSC304 - Nisarg Shah 16
P1 P2 Left Right Up (1 , 1) (3 , 0) Down (0 , 0) (2 , 1)
Answer=1
CSC304 - Nisarg Shah 17
P1 P2 Left Right Up (1 , 1) (3 , 0) Down (0 , 0) (2 , 1)
Answer=2.5
CSC304 - Nisarg Shah 18
➢ For each action 𝑡2
∗ of P2…
➢ Write a linear program with the mixed strategy 𝑦1 of P1
as the unknown, which…
➢ Maximizes the reward of P1 when P1 plays 𝑦1, P2
responds with 𝑡2
∗…
➢ Subject to the constraint that 𝑦1 in fact incentivizes P2 to
play 𝑡2
∗
CSC304 - Nisarg Shah 19
max Σ𝑡1∈𝑇1𝑦1 𝑡1 ⋅ 𝜌1(𝑡1, 𝑡2
∗)
subject to ∀𝑡2 ∈ 𝑇2, Σ𝑡1∈𝑇1 𝑦1 𝑡1 ⋅ 𝜌2 𝑡1, 𝑡2
∗
≥ Σ𝑡1∈𝑇1𝑦1 𝑡1 ⋅ 𝜌2 𝑡1, 𝑡2 Σ𝑡1∈𝑇1𝑦1 𝑡1 = 1 ∀𝑡1 ∈ 𝑇1, 𝑦1 𝑡1 ≥ 0
∗,
take the maximum
to 𝑡2
∗ optimizes over
all 𝑦1 for which 𝑡2
∗ is
the best response
CSC304 - Nisarg Shah 20
➢ Defender (leader) has 𝑙 identical
patrol units
➢ Defender wants to defend a set of 𝑜
targets 𝑈
➢ In a pure strategy, each resource can
protect a subset of targets 𝑇 ⊆ 𝑈 from a given collection 𝒯
➢ A target is covered if it is protected by
at least one resource
➢ Attacker wants to select a target to
attack
CSC304 - Nisarg Shah 21
➢ For each target, the defender and the
attacker have two utilities: one if the target is covered, one if it is not.
➢ Defender commits to a mixed
strategy; attacker follows by choosing a target to attack.
CSC304 - Nisarg Shah 22
➢ In security games, this is 𝒯 𝑙 ➢ Exponential in 𝑙
CSC304 - Nisarg Shah 23
CSC304 - Nisarg Shah 24
➢ Must return home
➢ Continuous-time strategies
➢ Bathroom breaks !!!
➢ Poachers are not fully rational