Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception

Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu
{"title":"Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception","authors":"Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu","doi":"arxiv-2407.14436","DOIUrl":null,"url":null,"abstract":"Deception plays a crucial role in strategic interactions with incomplete\ninformation. Motivated by security applications, we study a class of two-player\nturn-based deterministic games with one-sided incomplete information, in which\nplayer 1 (P1) aims to prevent player 2 (P2) from reaching a set of target\nstates. In addition to actions, P1 can place two kinds of deception resources:\n\"traps\" and \"fake targets\" to disinform P2 about the transition dynamics and\npayoff of the game. Traps \"hide the real\" by making trap states appear normal,\nwhile fake targets \"reveal the fiction\" by advertising non-target states as\ntargets. We are interested in jointly synthesizing optimal decoy placement and\ndeceptive defense strategies for P1 that exploits P2's misinformation. We\nintroduce a novel hypergame on graph model and two solution concepts: stealthy\ndeceptive sure winning and stealthy deceptive almost-sure winning. These\nidentify states from which P1 can prevent P2 from reaching the target in a\nfinite number of steps or with probability one without allowing P2 to become\naware that it is being deceived. Consequently, determining the optimal decoy\nplacement corresponds to maximizing the size of P1's deceptive winning region.\nConsidering the combinatorial complexity of exploring all decoy allocations, we\nutilize compositional synthesis concepts to show that the objective function\nfor decoy placement is monotone, non-decreasing, and, in certain cases, sub- or\nsuper-modular. This leads to a greedy algorithm for decoy placement, achieving\na $(1 - 1/e)$-approximation when the objective function is sub- or\nsuper-modular. The proposed hypergame model and solution concepts contribute to\nunderstanding the optimal deception resource allocation and deception\nstrategies in various security applications.","PeriodicalId":501316,"journal":{"name":"arXiv - CS - Computer Science and Game Theory","volume":"64 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Computer Science and Game Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2407.14436","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Deception plays a crucial role in strategic interactions with incomplete information. Motivated by security applications, we study a class of two-player turn-based deterministic games with one-sided incomplete information, in which player 1 (P1) aims to prevent player 2 (P2) from reaching a set of target states. In addition to actions, P1 can place two kinds of deception resources: "traps" and "fake targets" to disinform P2 about the transition dynamics and payoff of the game. Traps "hide the real" by making trap states appear normal, while fake targets "reveal the fiction" by advertising non-target states as targets. We are interested in jointly synthesizing optimal decoy placement and deceptive defense strategies for P1 that exploits P2's misinformation. We introduce a novel hypergame on graph model and two solution concepts: stealthy deceptive sure winning and stealthy deceptive almost-sure winning. These identify states from which P1 can prevent P2 from reaching the target in a finite number of steps or with probability one without allowing P2 to become aware that it is being deceived. Consequently, determining the optimal decoy placement corresponds to maximizing the size of P1's deceptive winning region. Considering the combinatorial complexity of exploring all decoy allocations, we utilize compositional synthesis concepts to show that the objective function for decoy placement is monotone, non-decreasing, and, in certain cases, sub- or super-modular. This leads to a greedy algorithm for decoy placement, achieving a $(1 - 1/e)$-approximation when the objective function is sub- or super-modular. The proposed hypergame model and solution concepts contribute to understanding the optimal deception resource allocation and deception strategies in various security applications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
有欺骗性的图上安全游戏中的综合资源分配与策略合成
在不完全信息的战略互动中,欺骗起着至关重要的作用。受安全应用的启发,我们研究了一类具有单边不完全信息的基于双回合的确定性博弈,其中玩家 1(P1)的目标是阻止玩家 2(P2)达到一组目标状态。除了行动之外,P1 还可以放置两种欺骗资源:"陷阱 "和 "假目标",让 P2 不知道博弈的过渡动态和回报。陷阱通过让陷阱状态看起来正常来 "掩人耳目",而假目标则通过把非目标状态当作目标来 "揭露真相"。我们感兴趣的是为 P1 共同合成利用 P2 的错误信息的最佳诱饵放置和欺骗性防御策略。我们在图模型上引入了一个新颖的超博弈和两个求解概念:隐蔽欺骗性必胜和隐蔽欺骗性几乎必胜。这两个概念确定了 P1 可以阻止 P2 在无限步数或概率为一的情况下到达目标而不让 P2 意识到自己被欺骗的状态。考虑到探索所有诱饵分配的组合复杂性,我们利用组合合成概念来证明诱饵放置的目标函数是单调的、非递减的,并且在某些情况下是次模态或超模态的。这就产生了一种诱饵放置的贪婪算法,当目标函数是次模态或超模态时,该算法可实现 $(1 - 1/e)$ 近似值。所提出的超游戏模型和解决概念有助于理解各种安全应用中的最佳欺骗资源分配和欺骗策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
MALADY: Multiclass Active Learning with Auction Dynamics on Graphs Mechanism Design for Extending the Accessibility of Facilities Common revenue allocation in DMUs with two stages based on DEA cross-efficiency and cooperative game The common revenue allocation based on modified Shapley value and DEA cross-efficiency On Robustness to $k$-wise Independence of Optimal Bayesian Mechanisms
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1