game theoretic approach to security problems
play

Game-Theoretic Approach to Security Problems Antonn Ku cera ech - PowerPoint PPT Presentation

Game-Theoretic Approach to Security Problems Antonn Ku cera ech Joint work with Tom Brzdil, David Klaka, Tom Lamser, and Vojt Rehk (IJCAI 2018, AAMAS 2018) Brno, September 2018 Antonn Ku cera (FI MU Brno)


  1. Game-Theoretic Approach to Security Problems Antonín Kuˇ cera ech ˇ Joint work with Tomáš Brázdil, David Klaška, Tomáš Lamser, and Vojtˇ Rehák (IJCAI 2018, AAMAS 2018) Brno, September 2018 Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 1 / 13

  2. Security Problems One of the basic problems in operations research, heavily studied by AI community. How to use the (limited) security sources to achieve the best coverage of a given set of vulnerable targets? Many technical variants: static allocation of security resources, mobile partrollers/attackers, various levels of target importance/vulnerability, etc. Popular solution concept: Stackelberg equilibrium The leader commits to a strategy and the follower chooses his best response so that they cannot gain anything by revising their choice. The defender/attacker correspond to the leader/follower. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 2 / 13

  3. Adversarial Patrolling Problem 2 3 4 2 3 3 Defender’s strategy: σ : V + → ∆( V ) π : V + → V ∪ {∗} Attacker’s strategy: (must be “prefix free”) P σ,π ( DRuns ) val = sup σ inf π P σ,π ( DRuns ) Optimal Defender’s strategy exists. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 3 / 13

  4. Patrolling in a General Environment Deciding whether val = 1 or val ≤ 1 − 1 n is NP-hard. There is an exponential-time algorithm for computing ε -optimal strategies. Existing strategy synthesis algorithms are mostly based on (non)linear programming and often compute only positional strategies for games with hundreds of vertices. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 4 / 13

  5. Patrolling in the Internet Environment The graph is fully connected. The number of targets can reach millions/billions. The Defender’s are software processes run by a central authority (they are fully coordinated). The targets have different importance Intrusion detection is not perfect. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 5 / 13

  6. Patrolling in the Internet Environment (2) In the Internet patrolling, we can compute (sub)optimal strategies for k Defenders quickly for VERY large instances. Furthermore, we can quickly determine the number of Defenders needed to achieve a given level of protection. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 6 / 13

  7. Patrolling in the Internet Environment (2) In the Internet patrolling, we can compute (sub)optimal strategies for k Defenders quickly for VERY large instances. Furthermore, we can quickly determine the number of Defenders needed to achieve a given level of protection. Key new concepts: Modular strategies. A suitable (de)composition principle. The use of mathematical programming is completely avoided. We need to solve a certain system of non-linear equations. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 6 / 13

  8. Modular Strategies A Defender’s strategy σ is modular if σ ( h ) depends only on | h | mod c where c is a suitable integer. Hence, a modular strategy can be seen as a function with domain N . In particular, modular strategies are independent of the current Defender’s position (the currently visited vertex/vertices). Hence, modular strategies do not subsume positional strategies. Intuitively, modular strategies appear weak. This intuition is incorrect. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 7 / 13

  9. The (De)Composition Principle Suppose there is only one Defender. Let G 1 , . . . , G ℓ be fully connected patrolling graphs. Suppose we already computed a modular Defender’s strategy σ i for every G i . Let η be a “suitable” distribution over { 1 , . . . , n } . We can compose the modular strategies σ 1 , . . . , σ n into a modular strategy σ for G 1 , . . . , G n as follows: σ ( ℓ ) = A “ ν -combination” of σ 1 ( ℓ ) , . . . , σ n ( ℓ ) For k Defenders, we first need to “assign” them to G 1 , . . . , G n , i.e., choose k 1 , . . . , k n such that � k i = 1 k i = k , and solve G i for k i Defenders. We can give a lower bound on val σ based on val ( σ 1 ) , . . . , val ( σ n ) . Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 8 / 13

  10. Example 1 u 0 u 1 u 2 Attack length = 2

  11. Example 1 σ ( h ) = µ ℓ , ℓ = | h | mod 2 µ 0 ( u 0 ) = 0, u 0 µ 0 ( u 1 ) = κ , µ 0 ( u 2 ) = 1 − κ µ 1 ( u 0 ) = κ , µ 1 ( u 1 ) = 0, µ 1 ( u 2 ) = 1 − κ √ u 1 u 2 κ = ( 5 − 1 ) / 2 = 0 . 618 . . . Attack length = 2 Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 9 / 13

  12. Example 2 v 1 v 2 v 0 t 0 t 1 d ( t i )= 2 , d ( v i )= 3

  13. Example 2 v 1 v 2 σ ( h ) selects uniformly between v | h | + 1 mod 3 and t | h | + 1 mod 2 v 0 val σ = 1 / 2 val = 1 / 2 t 0 t 1 d ( t i )= 2 , d ( v i )= 3 Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 10 / 13

  14. An Upper Bound on the Value We give an upper bound on the achievable value which can be computed “quickly” for a given patrolling problem. This bound is not tight in general, but can serve as a “yardstick” for measuring the quality of constructed strategies. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 11 / 13

  15. Our Algorithm We design a concrete strategy synthesis algorithm by designing a suitable decomposition tactic. Computing appropriate “mixing ratios” for the modular strategies constructed for the subgames requires solving a system of non-linear equations, which is done by Maple. The algorithm can solve instances with billions of vertices and thousands of Defenders in seconds. The value of the produced strategies matches the principal bound in some well-defined cases. If the intrusion times are taken from a fixed finite set of eligible values, then the values of the constructed strategies approach the upper bound very quickly as the number of targets increases. Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 12 / 13

  16. Future Work What is precise complexity of the patrolling problem in the Internet environment? Can we compute (a symbolic representaion of) optimal strategies for all instances? Can we solve other types of games compositionaly? Antonín Kuˇ cera (FI MU Brno) Patrolling Games IFIP WG 2.2 Meeting, September 2018 13 / 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend