A double oracle algorithm for allocating resources on nodes in graph-based security games

被引:0
|
作者
Zhou Yang
Junwu Zhu
Ling Teng
Jiajie Xu
Zeyu Zhu
机构
[1] Yangzhou University,
来源
关键词
Game theory; Double oracle; Minimax equilibria; Distributed artificial intelligence; Mixed integer linear programming;
D O I
暂无
中图分类号
学科分类号
摘要
In the graph-based security game, the defender allocates security resources strategically to protect targets against the adversary. In this paper, firstly, we come up with a new double oracle algorithm for scheduling resources optimally on nodes in graph-based security games. The police scattered on the street can only detect those terrorists on that street, while the police at the intersection place can detect all the terriorists on all the streets crisscrossing the intersection. Secondly, in real world situation, even the police meets the criminals at the same place, criminals still could escape. To match the real world situation, we define a parameter called detection probability, representing the chance the attacker is caught when they are checked by the defenders. Thirdly, we design a double oracle algorithm to find the equilibrium. But the computational complexity of best response oracles are extremely high. We design greedy algorithms and combine them with best response oracles to improve the algorithm efficiency without loss of correctness.
引用
收藏
页码:10961 / 10977
页数:16
相关论文
共 50 条
  • [1] A double oracle algorithm for allocating resources on nodes in graph-based security games
    Yang, Zhou
    Zhu, Junwu
    Teng, Ling
    Xu, Jiajie
    Zhu, Zeyu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10961 - 10977
  • [2] Abstraction Methods for Solving Graph-Based Security Games
    Basak, Anjon
    Fang, Fei
    Thanh Hong Nguyen
    Kiekintveld, Christopher
    [J]. AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2016, 10003 : 13 - 33
  • [3] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PEERJ, 2023, 11
  • [4] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PeerJ Computer Science, 2023, 9
  • [5] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [6] Double Oracle Algorithm for Computing Equilibria in Continuous Games
    Adam, Lukas
    Horcik, Rostislav
    Kasl, Tomas
    Kroupa, Tomas
    [J]. THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 5070 - 5077
  • [7] Research on a Graph-Based Algorithm
    Dai, Shang-ping
    Duan Xin
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, 2008, : 17 - 20
  • [8] Graph-Based IoT Microservice Security
    Pahl, Marc-Oliver
    Aubet, Francois-Xavier
    Liebald, Stefan
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [9] Graph-Based Analysis in Network Security
    Collins, M. Patrick
    [J]. 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1333 - 1337
  • [10] A Graph-based Approach for Adaptive Serious Games
    Hare, Ryan
    Patel, Nidhi
    Tang, Ying
    Patel, Pankti
    [J]. 2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 872 - 877