when security games go green: designing defender strategies to prevent poaching and illegal fishing...

24
When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1 , Peter Stone 2 , Milind Tambe 1 University of Southern California 1 University of Texas at Austin 2

Upload: ambrose-chandler

Post on 28-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

When Security Games Go Green:Designing Defender Strategies to Prevent

Poaching and Illegal Fishing

Fei Fang1, Peter Stone2, Milind Tambe1

University of Southern California1

University of Texas at Austin2

Page 3: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

3

In collaboration with Panthera

A tropical forest in southeast asia

Main focus: Tiger, Leopard

Other animals: Tapir, Serow, Gaur, etc

Green Security Domains:Understand the Problem In the Field

Page 4: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

4

8-hour patrol in April 2015

Green Security Domains:Understand the Problem In the Field

Page 6: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

6

Green Security Game A model for green security domains Generalize Stackelberg assumption

Planning algorithms Designs defender strategy sequence

Framework including planning and learning Learn parameters from attack data

Contributions

Page 7: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

7

Outline

Background and MotivationContributionsGreen Security Game ModelPlanningPlanning and LearningExperimental ResultsFuture Work and Conclusion

Page 8: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

8

round game, mixed defender strategy in each round

Green Security Game Model

Jan Feb Mar Apr May

0.3 0.4 0.1 0.2 0.5 0 0.1 0.7

0.2 0.2 0.3 0.3 0.4 0.5 0.6 0.1

0.6 0.7 0.1 0.2 0.3 0.2 0 0.9

0.4 0.5 0.6 0.3 0.1 0.2 0.3 0

0.1 0.2 0.3 0.4 0.5 0.3 0.4 0.1

0.3 0.4 0.5 0.5 0.5 0.1 0.1 0.1

0.2 0.2 0.2 0.3 0.3 0.3 0.4 0.5

0.1 0.1 0.6 0.3 0.4 0.2 0.4 0.4

Page 9: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

9

Attacker respond to convex combination of defender strategy in recent rounds

Attackers’ observation maybe delayed (infer from signs)

Information sharing among attackers

A generalization of the Stackelberg assumption ()

Green Security Game Model

Jan Feb Mar Apr May

=?

𝜂3=0.3𝑐1+0.7𝑐2

Page 10: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

10

Attacker chooses target with bounded rationality

Following the SUQR model

Choose more promising targets with higher probability

Evaluation on key properties

Attackers have different characteristics (parameters)

Green Security Game Model

Page 11: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

11

Outline

Background and MotivationContributionsGreen Security Game ModelPlanningPlanning and LearningExperimental ResultsFuture Work and Conclusion

𝜂𝑡=𝑐𝑡 −1

Page 12: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

12

Exploit attackers’ delayed observation ()

A simple example: Patrol Plan A: always uniformly random Patrol Plan B: change her strategy deliberately, detect more

snares overall

Planning

Jan Feb

N 80% 20%

S 20% 80%

N

S

Page 13: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

Solve directly

Optimize over all rounds computationally expensive

Planning

x

Jan Feb Mar Apr May

? ? ? ? ? ? ? ?

? ? ? ? ? ? ? ?

? ? ? ? ? ? ? ?

? ? ? ? ? ? ? ?

? ? ? ? ? ? ? ?

? ? ? ? ? ? ? ?

? ? ? ? ? ? ? ?

? ? ? ? ? ? ? ?

13

Page 14: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

14

Solve greedily Consider current round utility only Ignore impact of current strategy in the future

Planning

x

Jan Feb Mar Apr May

?

0 0 0 0 0 0 0 0

0 0 0 1 0 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 1 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

Page 15: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

15

PlanningPlanAhead-M

PlanAhead-M Look ahead M steps: find an optimal strategy for current

round as if it is the Mth last round of the game Sliding window of size M. Example with M=2

Jan Feb Mar Apr May

𝑬𝟏+𝑬𝟐

𝑬𝟐+𝑬𝟑

𝑬𝟑+𝑬𝟒

𝑬𝟒+𝑬𝟓

Add discount factor to compensate the over-estimation

Page 16: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

16

PlanningFixedSequence-M

Require the defender to execute the sequence of length M repeatedly

Example with M=2: find best strategy A and B

Theoretical guarantee: approximation of the optimal strategy profile

Jan Feb Mar Apr May

A B A B A

Page 17: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

17

Outline

Background and MotivationContributionsGreen Security Game ModelPlanningPlanning and LearningExperimental ResultsFuture Work and Conclusion

Page 18: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

18

Learn parameters in attackers’ bounded rationality model from attack data

Previous work Apply Maximum Likelihood Estimation (MLE) May lead to highly biased results

Our learning algorithm Calculate posterior distribution for each data point

Planning and Learning

Page 19: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

19

Outline

Background and MotivationContributionsGreen Security Game ModelPlanningPlanning and LearningExperimental ResultsFuture Work and Conclusion

Page 20: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

20

Experimental ResultsPlanning

Baseline: FS-1 (Stackelberg), PA-1 (Myopic)

Attacker respond to last round strategy, 10 Targets, 4 Patrollers

Baseline

Page 21: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

21

Experimental ResultsPlanning and Learning

Baseline: Maximum Likelihood Estimation (MLE)

Solution Quality Runtime

Page 22: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

22

Outline

Background and MotivationContributionsGreen Security Game ModelPlanningPlanning and LearningExperimental ResultsFuture Work and Conclusion

𝜂𝑡=𝑐𝑡 −1

Page 23: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

23

Learn the parameters in convex combination from attack data

Consider missing data (silent victims)

Uncertainty in the model and robust strategies

Real-world deployment (on-going)

Trial test: November 2014

Extensive deployment: July 2015

Future Work

Page 24: When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing Fei Fang 1, Peter Stone 2, Milind Tambe 1 University

24

Green Security Game

Planning is necessary with generalized Stackelberg assumption

Learn attackers’ behavior model from data

On-going real-world deployment

Conclusion

Thank [email protected]