Elsevier

Computers & Industrial Engineering

Volume 111, September 2017, Pages 216-227
Computers & Industrial Engineering

A branch and price algorithm for a Stackelberg Security Game

https://doi.org/10.1016/j.cie.2017.06.034Get rights and content

Highlights

Abstract

Mixed integer optimization formulations are an attractive alternative to solve Stackelberg Game problems thanks to the efficiency of state of the art mixed integer algorithms. In particular, decomposition algorithms, such as branch and price methods, make it possible to tackle instances large enough to represent games inspired in real world domians.

In this work we focus on Stackelberg Games that arise from a security application and investigate the use of a new branch and price method to solve its mixed integer optimization formulation. We prove that the algorithm provides upper and lower bounds on the optimal solution at every iteration and investigate the use of stabilization heuristics. Our preliminary computational results compare this solution approach with previous decomposition methods obtained from alternative integer programming formulations of Stackelberg games.

Introduction

Stackelberg games model the strategic interaction between players, where one participant – the leader – is able to commit to a strategy first, knowing that the remaining players – the followers – will take this strategy into account and respond in an optimal manner. These games have been used to represent markets in which a participant has significant market share and can commit to a strategy (von Stackelberg, Bazin, Hill, & Urch, 2010), where government decides tolls or capacities in a transportation network (Labbé, Marcotte, & Savard, 1998), and of late have been used to represent the attacker-defender interaction in security domains (Jain et al., 2010). These games are examples of bilevel optimization problems, which are in general non convex optimization problems that are difficult to solve.

In this work we focus on a specific class of Stackelberg games which we refer to as Stackelberg Security Games (SSG) that arise in security domains and have a particular payoff structure (Yin, Korzhyk, Kiekintveld, Conitzer, & Tambe, 2010). In a SSG, the security (or defender) behaves as the leader selecting a patrolling strategy first and then, possibly many attackers act as the follower, observing the defender’s patrolling strategy and deciding where to attack. Such Stackelberg Security Game models have been used in the deployment of decision support systems with specialized algorithms in real security domain applications (Jain et al., 2010, Pita et al., 2011, Shieh et al., 2012).

Recent work has developed efficient integer optimization solution algorithms for different variants of the SSGs (Hochbaum et al., 2014, Jain et al., 2010, Jain et al., 2011, Jain et al., 2011, Kiekintveld et al., 2009). In general terms these optimization problems are formulated with the defender committing to a mixed (randomized) strategy and the attacker(s) responding with a pure strategy after conducting surveillance of the defender’s mixed strategy. A mixed strategy refers to a probability distribution over the possible actions while a pure strategy corresponds to selecting one of the possible actions. In this SSG, the defender mixed strategies are probability distributions over possible patrolling strategies, while the attacker’s pure strategy corresponds to selecting a specific target to attack. In addition, the number of actions of the defender can be exponential in size, with respect to the targets and defense resources, due to the combinatorics of using N resources to patrol m targets. This illustrates that to solve SSGs we have to address mixed integer optimization problems with exponential number of variables. Addressing the combinatorial size of defender strategies has led to both development of branch and price methods (Kiekintveld et al., 2009) and constraint generation methods (Yang, Jiang, Tambe, & Ordóñez, 2013). There are, however, problem instances that arise from real security applications that still challenge existing solution methods. Here we investigate a new branch and price method developed for a novel formulation of Stackelberg games (MIPSG), introduced in Casorrán-Amilburu, Fortz, Labbé, and Ordóñez (2017). This new formulation has been shown to provide tighter linear relaxations than other existing mixed integer formulations and to give the convex hull of the feasible integer solutions when there is only one follower.

We begin by introducing notation and describing the integer optimization formulations that have been considered previously in the next section. We also introduce the equivalent MIPSG formulation. In Section 3 we present the column generation algorithm for the solution of the linear relaxation of MIPSG, along with a speed up that can be obtained by aggregating subproblems, and the existence of upper and lower bounds at every iteration. We also describe the branching strategies used in adapting this column generation to a Branch and Price method and how to apply dual stabilization techniques. We present our preliminary computational results in Section 4 and provide concluding remarks in Section 5.

Section snippets

Integer optimization formulations of SSG

In a Stackelberg security game we consider that the leader is the defender and the attacker (of possibly many types) is the follower. We let Θ be the set of possible attacker types and assume that pθ corresponds to a known a priori probability distribution that the defender is facing an attacker of type θΘ. The attacker may decide to attack any one of a set of targets Q. The mixed strategy for the θth attacker is the vector of probabilities over this set of targets, which we denote as qθ=(qjθ)j

Column generation for MIPSG

A column generation method on MIPSG aims at solving the linear relaxation of the problem by gradually considering more variables associated to the large set of defender strategies. The linear relaxation of MIPSG relaxes the integrality constraints and considers variables that satisfy 0zijθ,qjθR and xiR. Note that since iXjQzijθ=1 we still have that zijθ,qjθ,xi[0,1]. Below we give the dual problem of the linear relaxation of the MIPSG problem, using the dual variables identified in the

Computational results

We randomly generate a set of instances to be solved for each solution method. The base algorithms considered are the branch and price methods for the MIPSG and the ERASER formulations of the problem, we refer to these solution algorithms as MIPSG-C and ERASER-C, respectively. The ERASER-C algorithm is the state of the art benchmark from prior work (Jain et al., 2010). In addition we solve each instance using the greedy subroutine and the stabilization approach presented above to attempt to

Conclusions

In this paper we have introduced a column generation method to solve a novel mixed integer formulation of Stackelberg Security Games. Decomposition methods are key to be able to solve ever larger problem instances and strong formulations, such as MIPSG, provide good opportunities to develop efficient algorithms. That said, even if the linear relaxation problems of MIPSG yield better integrality gaps than other existing formulations, the relaxations of MIPSG turn out to be challenging to solve

Acknowledgement

Research was supported by CONICYT through Fondecyt grant 1140807 and the Complex Engineering Systems Institute, ISCI (CONICYT: FB0816). The research of third author has been supported by the Interuniversity Attraction Poles Programme P7/36 “COMEX: combinatorial optimization metaheuristics & exact methods” of the Belgian Science Policy Office.

References (21)

  • D. Bertsimas et al.

    Introduction to linear optimization

    (1997)
  • M. Breton et al.

    Sequential Stackelberg equilibria in two-person games

    Journal of Optimization Theory and Applications

    (1988)
  • Casorrán-Amilburu, C., Fortz, B., Labbé, M., & Ordóñez, F. (2017). A study of general and security Stackelberg game...
  • Conitzer, V., & Sandholm, T. (2006). Computing the optimal strategy to commit to. In: Proc. of the 7th ACM conference...
  • D.S. Hochbaum et al.

    Security routing games with multivehicle chinese postman problem

    Networks

    (2014)
  • Jain, M., Kardes, E., Kiekintveld, C., Ordóñez, F., & Tambe, M. (2010). Security games with arbitrary schedules: A...
  • Jain, M., Kiekintveld, C., & Tambe, M. (2011). Quality-bounded solutions for finite bayesian Stackelberg games: Scaling...
  • Jain, M., Korzhyk, D., Vanek, O., Pechoucek, M., Conitzer, V., & Tambe, M. (2011). A double oracle algorithm for...
  • M. Jain et al.

    Software assistants for randomized patrol planning for the LAX airport police and the federal air marshal service

    Interfaces

    (2010)
  • Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Tambe, M., & Ordóñez, F. (2009). Computing optimal randomized resource...
There are more references available in the full text version of this article.

Cited by (7)

  • A Survey on Mixed-Integer Programming Techniques in Bilevel Optimization

    2021, EURO Journal on Computational Optimization
    Citation Excerpt :

    On the other hand, decomposition methods scale better when the problem involves many resources and/or follower types. In this perspective, Paruchuri et al. (2008) propose a solution approach involving Benders decomposition and Jain et al. (2010) and Lagos et al. (2017) use column generation. Stackelberg bimatrix games have been shown to be useful for many real-world applications in security domains.

  • The maximum clique interdiction problem

    2019, European Journal of Operational Research
    Citation Excerpt :

    Other interesting problem extensions concern the introduction of multiple leaders (that could act in a collaborative or competitive way), multiple followers, or both (see, e.g., Sinha, Malo, Frantsev, & Deb, 2014). Similarly, a multi-period setting could be worthy of investigation, as well as allowing incomplete information (like, e.g., in Stackelberg security games, Guo et al., 2016; Lagos, Ordóñez, & Labbé, 2017). Finally, it would be interesting to combine other centrality measures with the clique number for measuring the cohesiveness of a network.

  • Socially optimal deployment strategy and incentive policy for solar photovoltaic community microgrid: A case of China

    2018, Energy Policy
    Citation Excerpt :

    So the development of SPCM exists impressive environmental benefits and economic benefits. Stackelberg game can model the strategic interaction between two players (Breton et al., 1988), where one player (the leader) is able to commit to a strategy first, knowing that the other player (the followers) will take this strategy into account and react in an optimal manner (Lagos et al., 2017). On the issue of SPCM promotion, the government and resident are just like two Stackelberg game players.

  • Border patrol using multiple unmanned aerial vehicles based on Stackelberg security game

    2023, Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice
View all citing articles on Scopus
View full text