skip to main content
10.5555/1402795.1402819acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport

Published: 12 May 2008 Publication History

Abstract

Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent full security coverage at all times, which allows adversaries to observe and exploit patterns in selective patrolling or monitoring, e.g. they can plan an attack avoiding existing patrols. Hence, randomized patrolling or monitoring is important, but randomization must provide distinct weights to different actions based on their complex costs and benefits. To this end, this paper describes a promising transition of the latest in multi-agent algorithms -- in fact, an algorithm that represents a culmination of research presented at AAMAS - into a deployed application. In particular, it describes a software assistant agent called ARMOR (Assistant for Randomized Monitoring over Routes) that casts this patrolling/monitoring problem as a Bayesian Stackelberg game, allowing the agent to appropriately weigh the different actions in randomization, as well as uncertainty over adversary types. ARMOR combines three key features: (i) It uses the fastest known solver for Bayesian Stackelberg games called DOBSS, where the dominant mixed strategies enable randomization; (ii) Its mixed-initiative based interface allows users to occasionally adjust or override the automated schedule based on their local constraints; (iii) It alerts the users if mixed-initiative overrides appear to degrade the overall desired randomization. ARMOR has been successfully deployed since August 2007 at the Los Angeles International Airport (LAX) to randomize checkpoints on the roadways entering the airport and canine patrol routes within the airport terminals. This paper examines the information, design choices, challenges, and evaluation that went into designing ARMOR.

References

[1]
General Description: Just the Facts. http://www.lawa.org/lax/justTheFact.cfm, 2007.
[2]
N. Billante. The Beat Goes On: Policing for Crime Prevention. http://www.cis.org.au/IssueAnalysis/ia38/ia38.htm, 2003.
[3]
G. Brown, M. Carlyle, J. Salmeron, and K. Wood. Defending Critical Infrastructure. Interfaces, 36(6):530--544, 2006.
[4]
V. Conitzer and T. Sandholm. Computing the Optimal Strategy to Commit to. In EC, 2006.
[5]
D. Fudenberg and J. Tirole. Game Theory. MIT Press, 1991.
[6]
J. C. Harsanyi and R. Selten. A Generalized Nash Solution for Two-person Bargaining Games With Incomplete Information. Management Science, 18(5):80--106, 1972.
[7]
R. C. Larson. A Hypercube Queuing Model for Facility Location and Redistricting in Urban Emergency Services. Computer and OR, 1(1):67--95, 1974.
[8]
A. Murr. The Element of Surprise. Newsweek National News, http://www.msnbc.msn.com/id/21035785/site/newsweek/page/0/, 28 September 2007.
[9]
P. Paruchuri, J. P. Pearce, J. Marecki, M. Tambe, F. Ordóñez, and S. Kraus. Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In AAMAS, 2008.
[10]
P. Paruchuri, J. P. Pearce, M. Tambe, F. Ordóñez, and S. Kraus. An Efficient Heuristic Approach for Security Against Multiple Adversaries. In AAMAS, 2007.
[11]
P. Paruchuri, M. Tabme, F. Ordóñez, and S. Kraus. Safety in Multiagent Systems by Policy Randomization. In SASEMAS, 2005.
[12]
P. Paruchuri, M. Tambe, F. Ordóñez, and S. Kraus. Security in Multiagent Systems by Policy Randomization. In AAMAS, 2006.
[13]
S. Ruan, C. Meirina, F. Yu, K. R. Pattipati, and R. L. Popp. Patrolling in a Stochastic Environment. In 10th Intl. Command and Control Research and Tech. Symp., 2005.
[14]
D. Stevens and et. al. Implementing Security Improvement Options at Los Angeles International Airport. http://www.rand.org/pubs/documented_briefings/2006/RAND_DB499-1.pdf, 2006.
[15]
W. A. Wagenaar. Generation of Random Sequences by Human Subjects: A Critical Survey of Literature. 1972.

Cited By

View all
  • (2021)Constrained Multiagent Markov Decision ProcessesJournal of Artificial Intelligence Research10.1613/jair.1.1223370(955-1001)Online publication date: 1-May-2021
  • (2020)End-to-end learning and intervention in gamesProceedings of the 34th International Conference on Neural Information Processing Systems10.5555/3495724.3497121(16653-16665)Online publication date: 6-Dec-2020
  • (2019)Computing Stable Solutions in Threshold Network Flow Games With Bounded TreewidthProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332041(2153-2155)Online publication date: 8-May-2019
  • Show More Cited By

Index Terms

  1. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    AAMAS '08: Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: industrial track
    May 2008
    140 pages

    Sponsors

    Publisher

    International Foundation for Autonomous Agents and Multiagent Systems

    Richland, SC

    Publication History

    Published: 12 May 2008

    Check for updates

    Author Tags

    1. Bayesian and Stackelberg games
    2. game theory
    3. security of agent systems

    Qualifiers

    • Research-article

    Conference

    AAMAS08
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 18 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Constrained Multiagent Markov Decision ProcessesJournal of Artificial Intelligence Research10.1613/jair.1.1223370(955-1001)Online publication date: 1-May-2021
    • (2020)End-to-end learning and intervention in gamesProceedings of the 34th International Conference on Neural Information Processing Systems10.5555/3495724.3497121(16653-16665)Online publication date: 6-Dec-2020
    • (2019)Computing Stable Solutions in Threshold Network Flow Games With Bounded TreewidthProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3332041(2153-2155)Online publication date: 8-May-2019
    • (2019)Warning TimeProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331954(1892-1894)Online publication date: 8-May-2019
    • (2019)Patrol Scheduling Against Adversaries with Varying Attack DurationsProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331819(1179-1188)Online publication date: 8-May-2019
    • (2019)Robust Temporal Difference Learning for Critical DomainsProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331713(350-358)Online publication date: 8-May-2019
    • (2019)Level-0 models for predicting human behavior in gamesJournal of Artificial Intelligence Research10.1613/jair.1.1136164:1(357-383)Online publication date: 1-Jan-2019
    • (2019)A game-theoretic framework for dynamic cyber deception in internet of battlefield thingsProceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services10.1145/3360774.3368204(522-526)Online publication date: 12-Nov-2019
    • (2019)A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and PrivacyACM Computing Surveys10.1145/333777252:4(1-28)Online publication date: 30-Aug-2019
    • (2019)Game theory for adaptive defensive cyber deceptionProceedings of the 6th Annual Symposium on Hot Topics in the Science of Security10.1145/3314058.3314063(1-8)Online publication date: 1-Apr-2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media