robust allocation of a defensive budget considering an attacker’s private information

52
Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi-Cin Lin Advisor: Frank, Yeong-Sung Lin

Upload: gayle

Post on 24-Feb-2016

30 views

Category:

Documents


0 download

DESCRIPTION

Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information. Mohammad E. Nikoofal and Jun Zhuang Presenter: Yi- Cin Lin Advisor: Frank, Yeong -Sung Lin . Agenda. Introduction Problem Formulation Stacklberg Equilibrium Approach Apply Robust Game to Real Data - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Robust Allocation of a Defensive Budget Considering

an Attacker’s Private InformationMohammad E. Nikoofal and Jun Zhuang

Presenter: Yi-Cin LinAdvisor: Frank, Yeong-Sung Lin

Page 2: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Agenda

• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions

Page 3: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Agenda

• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions

Page 4: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Introduction

Terrorist attacks

Page 5: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Introduction

Understand the terrorist group

before an attack occurs

Deter an attack Decrease the

expected damage of an attack

Page 6: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Introduction

• Deciding how, where, and when to allocate resources to protect critical infrastructure is a difficult problem, specifically when we have no accurate estimation about the attacker’s attributes

Defender’s private information

Common knowledge

Attacker’s private information

Page 7: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Introduction

• Uncertainty– Precise estimation of the probability of an attack

– Exact assessment of the attacker’s effort

– Identification of actual targets and the attacker’s valuation of those targets

125

13

2

Page 8: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Introduction

• There are two principal methods proposed to address data uncertainty over the years:

– Stochastic-optimization programming

– Robust optimization

Page 9: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Introduction

• Stochastic-optimization programming– Assuming different scenarios for data to occur

with different probabilities– Optimize the expected value of some objective

function

• Difficulties with such an approach are • Knowing the exact distribution for the data• Computational challenges

Page 10: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Introduction

• Robust optimization– Optimize the worst-case performance of the

system

Random parameters

Discrete(Scenario base)

Continuous

Page 11: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Introduction

• We propose a robust-optimization game-theoretical approach to model the uncertainty in attacker’s attributes where uncertainty is characterized on bounded intervals based on the attacker’s target valuation.

Page 12: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Agenda

• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions

Page 13: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Problem Formulation

• Assumption

– The attacker could attack at most one target

– In the sequential game, some targets may be left undefended in equilibrium

Page 14: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Problem Formulation

Page 15: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Problem Formulation- Damage Function

• Damage Function Specifications:To define the player’s optimization problem, let us specify a damage function with the following properties-

and are twice differentiable with respect to the defender’s and attacker’s effort , where 0,

Page 16: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Problem Formulation- Damage Function

• Let us define the expected damage from the standpoint of the defender and the attacker, respectively, as follows:

Page 17: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Problem Formulation- Defender’s Optimization Model

• Defender’s Optimization ModelThe defender seeks to find the optimal defensive resource allocation, , which minimizes the total expected damage and the to tal defensive investment costs

Page 18: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Problem Formulation- Defender’s Optimization Model

• The defender wishes to minimize her defense costs and expected losses

Page 19: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Problem Formulation- Attacker’s Optimization Model

• We assume that the strategic attacker concentrates his attack budget to launch an attack on only one target, the target that maximizes his payoffs.

Attacker’s utility

Page 20: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Agenda

• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions

Page 21: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Attacker’s Best Response

• The concept in this part is based on the work by Zhuang and Bier [19]

• The defender employs the attacker’s best response to estimate the attacker’s effort

Page 22: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Attacker’s Best Response

• Satisfying the optimality condition

• Yields the attacker’s best response as follows

is the least possible level of defense required to deter anattack on target

Page 23: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Attacker’s Best Response

• Satisfying the optimality condition

• Yields the attacker’s best response as follows

Page 24: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• We need first extract the attacker’s best response function (7) and then plug it into the defender’s optimization problem (3)–(5) to obtain her best response.

Page 25: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• To satisfy the optimality condition, first we need to relax the budget constraint. The common way to deal with such a condition is to penalize the objective function by where is the Lagrange multiplier

Page 26: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• The Lagrangian function might be defined as follows:

• Lagrangian function above gives the defender’s optimization problem as follows

Page 27: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• There is an optimal threshold for each target to be defended in equilibrium such that target i is defended if and only if the defender’s valuation of the target is greater than its optimal threshold

Page 28: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• Before determining the defender’s robust-optimization equilibrium, let us assume that the defender can define a free-distribution interval for the attacker’s target valuation such that

Page 29: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• Obstacle

• The decision maker can extend the length of an interval to satisfy her belief about uncertain parameters.

Page 30: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• Assuming , alternatively we can say which is centered at its

nominal value and of half-length and of half-length , but its exact value is unknown

Page 31: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• Assuming , alternatively we can say which is centered at its

nominal value and of half-length and of half-length , but its exact value is unknown

Nominal value=

Half length=

Page 32: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

In particular, the defender may assume her valuation of Target , which is , as the nominal value for the attacker’s valuation of target , which is , and then define the extreme bounds as a fraction of , for example, [0.5 , 1.5 ]

Nominal value=

Half length=

Page 33: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• We define the scaled deviation of the uncertain parameter from its nominal value as . It is clear that the scaled deviation takes on a value in [–1, 1]

Page 34: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• Moreover, following Bertsimas and Sim, [33] we impose a constraint on uncertainty in the following way: the total scaled deviation of the uncertainty parameters cannot exceed some threshold , called the budget of uncertainty, which leads to:

Page 35: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium (Nominal case) (Worst case)

• Bertsimas and Sim [33] show that having the threshold varied in allows greater flexibility to build a robust model without excessively affecting the optimal cost.

Page 36: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• To define the defender’s robustoptimization equilibrium, consider the following set:

Page 37: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• We now use the concept of robust game theory proposed by Aghassi and Bertsimas [34] to obtain the robust-optimization equilibrium for the defender

Page 38: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Stacklberg Equilibrium Approach- Defender Robust-Optimization Equilibrium

• Defender’s robust-optimization problem as follows:

Page 39: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Agenda

• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions

Page 40: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Apply Robust Game to Real Data Monetary

value Mortality

value Political

value

Total defensive budget Total target valuation

Page 41: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information
Page 42: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information
Page 43: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Apply Robust Game to Real Data

Page 44: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information
Page 45: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information
Page 46: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Apply Robust Game to Real Data

Page 47: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Apply Robust Game to Real Data

Page 48: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Agenda

• Introduction• Problem Formulation• Stacklberg Equilibrium Approach• Apply Robust Game to Real Data• Conclusions

Page 49: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Conclusions

• In this article, we model the attacker’s attributes as uncertain parameters on bounded intervals, we proposed robust-optimization equilibrium for the defender, which gives her the flexibility to adjust the robustness of the solution to the level of her conservatism.

Page 50: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Conclusions

• By applying our proposed approach to real data, we studied the effect of the defender’s assumptions of the extreme bounds of the uncertain parameters on the robustness of her solution, and also the impacts of the effectiveness ratio of attack on the robustness of the defender’s solution.

Page 51: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Conclusions

• This article can be extended by considering a sce nario when the attacker tries to attack on multiple targets in a simultaneous game, where the value of a set of targets is more than the sum of each individual target. Such a model would be a robust version of Colonel Blotto games.

Page 52: Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information

Conclusions

• One can extend the proposed model in this article to focus on facing with nonstrategic attackers, as nonstrategic attacking is considered exogenously (e.g., he may only strike the most valuable target, regardless of the observed defense levels)