Two-Phase Attacks in Security Games
Abstract
A standard model of a security game assumes a one-off assault during which the attacker cannot update their strategy even if new actionable insights are gained in the process. In this paper, we propose a version of a security game that takes into account a possibility of a two-phase attack. Specifically, in the first phase, the attacker makes a preliminary move to gain extra information about this particular instance of the game. Based on this information, the attacker chooses an optimal concluding move. We derive a compact-form mixed-integer linear program that computes an optimal strategy of the defender. Our simulation shows that this strategy mitigates serious losses incurred to the defender by a two-phase attack while still protecting well against less sophisticated attackers.
Cite
Text
Nagorko et al. "Two-Phase Attacks in Security Games." Uncertainty in Artificial Intelligence, 2023.Markdown
[Nagorko et al. "Two-Phase Attacks in Security Games." Uncertainty in Artificial Intelligence, 2023.](https://mlanthology.org/uai/2023/nagorko2023uai-twophase/)BibTeX
@inproceedings{nagorko2023uai-twophase,
title = {{Two-Phase Attacks in Security Games}},
author = {Nagorko, Andrzej and Ciosmak, Pawel and Michalak, Tomasz},
booktitle = {Uncertainty in Artificial Intelligence},
year = {2023},
pages = {1489-1498},
volume = {216},
url = {https://mlanthology.org/uai/2023/nagorko2023uai-twophase/}
}