Exploiting an Adversary's Intentions in Graphical Coordination Games

03/16/2020
by   Brandon C. Collins, et al.
0

How does information regarding an adversary's intentions affect optimal system design? This paper addresses this question in the context of graphical coordination games where an adversary can indirectly influence the behavior of agents by modifying their payoffs. We study a situation in which a system operator must select a graph topology in anticipation of the action of an unknown adversary. The designer can limit her worst-case losses by playing a security strategy, effectively planning for an adversary which intends maximum harm. However, fine-grained information regarding the adversary's intention may help the system operator to fine-tune the defenses and obtain better system performance. In a simple model of adversarial behavior, this paper asks how much a system operator can gain by fine-tuning a defense for known adversarial intent. We find that if the adversary is weak, a security strategy is approximately optimal for any adversary type; however, for moderately-strong adversaries, security strategies are far from optimal.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/05/2019

The Impact of Complex and Informed Adversarial Behavior in Graphical Coordination Games

How does system-level information impact the ability of an adversary to ...
research
06/04/2019

A risk-security tradeoff in graphical coordination games

A system relying on the collective behavior of decision-makers can be vu...
research
03/03/2019

Decision-Focused Learning of Adversary Behavior in Security Games

Stackelberg security games are a critical tool for maximizing the utilit...
research
10/30/2015

Learning Adversary Behavior in Security Games: A PAC Model Perspective

Recent applications of Stackelberg Security Games (SSG), from wildlife c...
research
06/15/2023

Who Needs to Know? Minimal Knowledge for Optimal Coordination

To optimally coordinate with others in cooperative games, it is often cr...
research
06/04/2019

Risk and security tradeoffs in graphical coordination games

A system whose operation relies on the collective behavior of a populati...
research
08/20/2022

Adversarial contamination of networks in the setting of vertex nomination: a new trimming method

As graph data becomes more ubiquitous, the need for robust inferential g...

Please sign up or login with your details

Forgot password? Click here to reset