Algorithms for a risk-averse Stackelberg game with multiple adversaries

被引:1
作者
Chicoisne, Renaud [1 ]
Ordonez, Fernando [2 ]
机构
[1] Univ Clermont Auvergne, CNRS, Mines St Etienne, INP,LIMOS, Clermont Ferrand, France
[2] Univ Chile, Ind Engn Dept, Beauchef 850, Santiago, Chile
关键词
Stackelberg security games; Risk averse optimization; Entropic risk measure; Quantal response; Piecewise linear approximation; Decomposition; VARIABLES; MODEL;
D O I
10.1016/j.cor.2023.106367
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We consider a Stackelberg game that arises in a security domain (SSG), where a defender can simultaneously protect.. out of.. targets from an adversary that observes the defense strategy before deciding on an utility maximizing attack. Given the high stakes in security settings, it is reasonable that the defender in this game is risk averse with respect to the attacker's decisions. Here we focus on developing efficient solution algorithms for a specific SSG, where the defender uses an entropic risk measure to model risk aversion to the attacker's strategies, and where multiple attackers select targets following logit quantal response equilibrium models. This problem can be formulated as a nonconvex nonlinear optimization problem. We propose two solution methods: (1) approximate the problem through convex mixed integer nonlinear programs (MINR) and (2) a general purpose methodology (CELL) to optimize nonconvex and nonseparable fractional problems through mixed integer linear programming approximations. Both methods provide arbitrarily good incumbents and lower bounds on SSG. We present cutting plane methods to solve these problems for large instances. Our computational experiments illustrate the advantages of introducing risk aversion into the defender's behavior and show that MINR dominates CELL, producing in 2 h solutions that are within 2% of optimal on average.
引用
收藏
页数:13
相关论文
共 36 条
[1]  
Ahuja Ravindra K., 1993, Network Flows: Theory, Algorithms and Applications
[2]   A bilevel fixed charge location model for facilities under imminent attack [J].
Aksen, Deniz ;
Aras, Necati .
COMPUTERS & OPERATIONS RESEARCH, 2012, 39 (07) :1364-1381
[3]   A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard [J].
An, Bo ;
Ordonez, Fernando ;
Tambe, Milind ;
Shieh, Eric ;
Yang, Rong ;
Baldwin, Craig ;
DiRenzo, Joseph, III ;
Moretti, Kathryn ;
Maule, Ben ;
Meyer, Garrett .
INTERFACES, 2013, 43 (05) :400-420
[4]  
Ben-Akiva M.E., 2018, Discrete choice analysis: Theory and application to travel demand
[5]   Partitioning procedures for solving mixed-variables programming problems [J].
Benders, J. F. .
COMPUTATIONAL MANAGEMENT SCIENCE, 2005, 2 (01) :3-19
[6]   Choosing what to protect [J].
Bier, Vicki M. .
RISK ANALYSIS, 2007, 27 (03) :607-620
[7]   On pricing and composition of bundles [J].
Bitran, Gabriel R. ;
Ferrer, Juan-Carlos .
PRODUCTION AND OPERATIONS MANAGEMENT, 2007, 16 (01) :93-108
[8]   Defending critical infrastructure [J].
Brown, Gerald ;
Carlyle, Matthew ;
Salmeron, Javier ;
Wood, Kevin .
INTERFACES, 2006, 36 (06) :530-544
[9]   A cognitive hierarchy model of games [J].
Camerer, CF ;
Ho, TH ;
Chong, JK .
QUARTERLY JOURNAL OF ECONOMICS, 2004, 119 (03) :861-898
[10]   Risk Averse Stackelberg Security Games with Quantal Response [J].
Chicoisne, Renaud ;
Ordonez, Fernando .
DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 :83-100