D 2022

Minimizing Expected Intrusion Detection Time in Adversarial Patrolling

KLAŠKA, David, Antonín KUČERA, Vít MUSIL and Vojtěch ŘEHÁK

Basic information

Original name

Minimizing Expected Intrusion Detection Time in Adversarial Patrolling

Authors

KLAŠKA, David (203 Czech Republic, belonging to the institution), Antonín KUČERA (203 Czech Republic, guarantor, belonging to the institution), Vít MUSIL (203 Czech Republic, belonging to the institution) and Vojtěch ŘEHÁK (203 Czech Republic, belonging to the institution)

Edition

Neuveden, 21st International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2022. p. 1660-1662, 3 pp. 2022

Publisher

International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS)

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

United States of America

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

electronic version available online

References:

RIV identification code

RIV/00216224:14330/22:00126563

Organization unit

Faculty of Informatics

ISBN

978-1-4503-9213-6

ISSN

Keywords in English

Security Games; Adversarial Patrolling

Tags

International impact, Reviewed
Změněno: 28/3/2023 11:53, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

In adversarial patrolling games, a mobile Defender strives to discover intrusions at vulnerable targets initiated by an Attacker. The Attacker’s utility is traditionally defined as the probability of completing an attack, possibly weighted by target costs. However, in many real-world scenarios, the actual damage caused by the Attacker depends on the time elapsed since the attack’s initiation to its detection. We introduce a formal model for such scenarios, and we show that the Defender always has an optimal strategy achieving maximal protection. We also prove that finite-memory Defender’s strategies are sufficient for achieving protection arbitrarily close to the optimum. Then, we design an efficient strategy synthesis algorithm based on differentiable programming and gradient descent.We evaluate the efficiency of our method experimentally.

Links

CZ.02.2.69/0.0/0.0/18_053/0016952, interní kód MU
(CEP code: EF18_053/0016952)
Name: Postdoc2MUNI
Investor: Ministry of Education, Youth and Sports of the CR, Priority axis 2: Development of universities and human resources for research and development
EF18_053/0016952, research and development project
Name: Postdoc2MUNI
MUNI/A/1145/2021, interní kód MU
Name: Rozsáhlé výpočetní systémy: modely, aplikace a verifikace XI. (Acronym: SV-FI MAV XI.)
Investor: Masaryk University
0011629866, interní kód MU
Name: Models, Algorithms, and Tools for Solving Adversarial Security Problems
Investor: Ostatní - foreign