计算机科学 ›› 2017, Vol. 44 ›› Issue (5): 153-159.doi: 10.11896/j.issn.1002-137X.2017.05.027

• 信息安全 • 上一篇    下一篇

基于Stackelberg博弈的海事安全问题研究

巩绪福,蔚承建,钱震,车宝真,沈航   

  1. 南京工业大学计算机科学与技术系 南京210009,南京工业大学计算机科学与技术系 南京210009,南京工业大学计算机科学与技术系 南京210009,南京工业大学计算机科学与技术系 南京210009,南京工业大学计算机科学与技术系 南京210009
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受江苏省自然科学基金 (BK20150960)资助

Maritime Security Research Based on Stackelberg Game

GONG Xu-fu, WEI Cheng-jian, QIAN Zhen, CHE Bao-zhen and SHEN Hang   

  • Online:2018-11-13 Published:2018-11-13

摘要: 近年来,安全问题在全世界范围内得到了越来越多的重视,如何利用有限的安全资源最大限度地部署防御策略保护重要的设施以及目标是许多安全部门所面临的一项艰巨的挑战。针对海事安全巡逻问题,提出基于Stackelberg博弈的安全模型进行安全资源调度,在安全资源有限的情况下,对现实世界中出现的时空限制和人类行为不完全理性因素进行了综合考虑,放宽了经典安全博弈模型对攻击者是完美理性这一假设。在随机最优反应均衡理论的基础上考虑了攻击者的行为偏好,对非完全理性情况下的最佳策略和完全理性情况下的最佳策略进行对比和分析,实验结果表明,非完全理性下的新模型在现实问题中可以获得更高的收益,可更有效地用于海事安全巡逻问题。

关键词: 安全资源分配,人类行为模型,海事安全巡逻,Stackelberg博弈

Abstract: In recent years,the security problem is becoming more and more popular all over the world.How to use the limited security resources to maximize the deployment of defensive strategies to protect critical facilities and goals is a critical challenge that a lot of security department have to face.For maritime safety patrol,security model based on Stackelberg game was proposed to carry out the security resource scheduling.In the case of limited security resources,the constraints of time and space appear in real world and factors that human behavior are not completely rational were comprehensive considered,and the security game’s assumption that attack is rational perfectly was relaxed.Based on the theory of quantal response equilibrium,the attacker’s behavior preference was considered,then the optimal strategy under the condition of imperfect rationality and the optimal strategy under the condition of complete rationality were compared and analyzed.Experimental results show that the new model under the condition of imperfect rationality can get higher returns in real-world problems,and can be more effectively used in maritime security patrol.

Key words: Security resource allocation,Human behavior model,Maritime security patrols,Stackelberg game

[1] BASILICO N,GATTI N,AMIGONI F.Leader-follower strategies for robotic patrolling in environments with arbitrary topologies[C]∥Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1.International Foundation for Autonomous Agents and Multiagent Systems,2009:57-64.
[2] HAILE P A,HORTASU A,KOSENOK G.On the empirical content of quantal response equilibrium[J].The American Economic Review,2008,98(1):180-200.
[3] MCKELVEY R D,PALFREY T R.Quantal response equilibria for normal form games[J].Games and economic behavior,1995,10(1):6-38.
[4] BOXALL P,PURCELL J.Strategy and human resource ma-nagement[M].Palgrave Macmillan,2011.
[5] WRIGHT J R,LEYTON-BROWN K.Beyond Equilibrium:Predicting Human Behavior in Normal-Form Games[C]∥AAAI.2010.
[6] PITA J,JAIN M,TAMBE M,et al.Robust solutions to Stacke-lberg games:Addressing bounded rationality and limited observations in human cognition[J].Artificial Intelligence,2010,174(15):1142-1171.
[7] NIKNAM T.A new fuzzy adaptive hybrid particle swarm optimization algorithm for non-linear,non-smooth and non-convex economic dispatch problem[J].Applied Energy,2010,87(1):327-339.
[8] SINGH S,GUPTA P,BHATIA D.Multiparametric sensitivityanalysis in programming problem with linear-plus-linear fractional objective function[J].European Journal of Operational Research,2005,160(1):232-241.
[9] CONITZER V,SANDHOLM T.Computing the optimal strategy to commit to[C]∥Proceedings of the 7th ACM conference on Electronic commerce.ACM,2006:82-90.
[10] PARUCHURI P,PEARCE J P,MARECKI J,et al.Playing ga-mes for security:An efficient exact algorithm for solving Baye-sian Stackelberg games[C]∥Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems-Volume 2.International Foundation for Autonomous Agents and Multiagent Systems,2008:895-902.
[11] XIA Z,ZHANG S.A kind of network security behavior model based on game theory[C]∥International Conference on Parallel and Distributed Computing,Applications and Technologies.IEEE Xplore,2003:950-954.
[12] PITA J,JAIN M,ORDNEZ F,et al.ARMOR Security for Los Angeles International Airport[C]∥AAAI.2008:1884-1885.
[13] JAIN M,TSAI J,PITA J,et al.Software assistants for rando-mized patrol planning for the lax airport police and the federal air marshal service[J].Interfaces,2010,40(4):267-290.
[14] YIN Z,JIANG A X,TAMBE M,et al.TRUSTS:Scheduling ran-domized patrols for fare inspection in transit systems using game theory[J].AI Magazine,2012,33(4):59.
[15] FANG F,STONE P,TAMBE M.When security games gogreen:Designing defender strategies to prevent poaching and illegal fishing[C]∥International Joint Conference on Artificial Intelligence (IJCAI).2015.
[16] LETCHFORD J,KORZHYK D,CONITZER V.On the value of commitment[J].Autonomous Agents and Multi-Agent Systems,2014,28(6):986-1016.
[17] JAIN M.Thwarting Adversaries with Unpredictability:Mas-sive-scale Game-Theoretic Algorithms for Real-world Security Deployments[D].Los Angeless:University of Southern California,2013.
[18] SHIEH E.Not a Lone Ranger:Unleashing Defender Teamwork in Security Games[D].Los Angeless:University of Southern California,2015.
[19] PITA J,JAIN M,ORDNEZ F,et al.ARMOR Security for Los Angeles International Airport[C]∥AAAI.2008:1884-1885.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!