Simple Counter-terrorism Decision

Similar documents
Adversarial Risk Analysis for Counterterrorism Modeling

Game Theory. Wolfgang Frimmel. Perfect Bayesian Equilibrium

Defending Multiple Terrorist Targets

Decision theory. 1 We may also consider randomized decision rules, where δ maps observed data D to a probability distribution over

MS&E 246: Lecture 12 Static games of incomplete information. Ramesh Johari

Introduction to Systems Analysis and Decision Making Prepared by: Jakub Tomczak

Basic Game Theory. Kate Larson. January 7, University of Waterloo. Kate Larson. What is Game Theory? Normal Form Games. Computing Equilibria

1 The General Definition

Basic Probabilistic Reasoning SEG

Bayesian Machine Learning

Discussion of "Persuasion in Global Games with an Application to Stress Testing" by Nicolas Inostroza and Alessandro Pavan

Cyber Security Games with Asymmetric Information

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2014

Recap Social Choice Fun Game Voting Paradoxes Properties. Social Choice. Lecture 11. Social Choice Lecture 11, Slide 1

Quantitative Information Flow. Lecture 7

Computer Science CPSC 322. Lecture 23 Planning Under Uncertainty and Decision Networks

Extensive games (with perfect information)

Final. Introduction to Artificial Intelligence. CS 188 Spring You have approximately 2 hours and 50 minutes.

Mechanism Design: Implementation. Game Theory Course: Jackson, Leyton-Brown & Shoham

Introduction to Bayesian Inference

Cyber-Awareness and Games of Incomplete Information

Bayesian Networks: Construction, Inference, Learning and Causal Interpretation. Volker Tresp Summer 2016

MODULE -4 BAYEIAN LEARNING

Uncertainty. Logic and Uncertainty. Russell & Norvig. Readings: Chapter 13. One problem with logical-agent approaches: C:145 Artificial

ECE521 Tutorial 11. Topic Review. ECE521 Winter Credits to Alireza Makhzani, Alex Schwing, Rich Zemel and TAs for slides. ECE521 Tutorial 11 / 4

A BAYESIAN SOLUTION TO INCOMPLETENESS

Discrete Bayes. Robert M. Haralick. Computer Science, Graduate Center City University of New York

Dynamic Games with Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition

Change-point models and performance measures for sequential change detection

: Cryptography and Game Theory Ran Canetti and Alon Rosen. Lecture 8

Computational Biology Lecture #3: Probability and Statistics. Bud Mishra Professor of Computer Science, Mathematics, & Cell Biology Sept

Probabilistic Reasoning

Perfect Bayesian Equilibrium

Bargaining, Contracts, and Theories of the Firm. Dr. Margaret Meyer Nuffield College

4: Dynamic games. Concordia February 6, 2017

Game Theory: Spring 2017

Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach

CSC321 Lecture 18: Learning Probabilistic Models

PHASES OF STATISTICAL ANALYSIS 1. Initial Data Manipulation Assembling data Checks of data quality - graphical and numeric

Bayesian Inference. p(y)

Homework 2. P(A 1 A 2 B) = P((A 1 A 2 ) B) P(B) From the distributive property of unions and intersections we have

EC319 Economic Theory and Its Applications, Part II: Lecture 7

Bayesian Methods. David S. Rosenberg. New York University. March 20, 2018

An Introduction to Bayesian Machine Learning

The Interdependence Between Homeland Security Efforts of a State and a Terrorist's Choice of Attack

Lecture : Probabilistic Machine Learning

Extensive Form Games with Perfect Information

Review: Statistical Model

Preliminary Statistics Lecture 2: Probability Theory (Outline) prelimsoas.webs.com

Artificial Intelligence & Sequential Decision Problems

Decomposition Algorithms in Stochastic Integer Programming: Applications and Computations.

SF2972 Game Theory Exam with Solutions March 15, 2013

Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Bayesian Learning. Tobias Scheffer, Niels Landwehr

the tree till a class assignment is reached

David Giles Bayesian Econometrics

Quantifying Uncertainty & Probabilistic Reasoning. Abdulla AlKhenji Khaled AlEmadi Mohammed AlAnsari

Decision Theory. What is it? Alexei A. Borissov February 1, 2007

Introduction into Bayesian statistics

Economics 3012 Strategic Behavior Andy McLennan October 20, 2006

Parametric Techniques Lecture 3

Grundlagen der Künstlichen Intelligenz

Where are we in CS 440?

Lecture 9: PGM Learning

SEQUENCING RELIABILITY GROWTH TASKS USING MULTIATTRIBUTE UTILITY FUNCTIONS

Probabilistic Graphical Models for Image Analysis - Lecture 1

Basic Probability and Decisions

Value of Information Analysis with Structural Reliability Methods

Parametric Techniques

Economics 201A Economic Theory (Fall 2009) Extensive Games with Perfect and Imperfect Information

Persuading Skeptics and Reaffirming Believers

Regulatory Considerations in the Licensing of a Mobile Backscatter X-ray Device used in Security Screening

Bayesian Inference. Definitions from Probability: Naive Bayes Classifiers: Advantages and Disadvantages of Naive Bayes Classifiers:

Game-Theoretic Probability: Theory and Applications Glenn Shafer

Codes and Cryptography. Jorge L. Villar. MAMME, Fall 2015 PART XI

Economics 703 Advanced Microeconomics. Professor Peter Cramton Fall 2017

Lecture 9: Bayesian Learning

Using Bayesian Analysis to Study Tokamak Plasma Equilibrium

Probabilistic Reasoning. (Mostly using Bayesian Networks)

Bayesian RL Seminar. Chris Mansley September 9, 2008

2534 Lecture 4: Sequential Decisions and Markov Decision Processes

Density Estimation. Seungjin Choi

Solving Extensive Form Games

Introduction to Machine Learning

ECE 541 Project Report: Modeling the Game of RISK Using Markov Chains

Refinements - change set of equilibria to find "better" set of equilibria by eliminating some that are less plausible

Balancing Terrorism and Natural Disasters Defensive Strategy with Endogenous Attacker Effort

Equilibrium Refinements

Epistemic Conditions for the Failure of Nash Equilibrium

Introduction to Machine Learning

Two-Stage-Partitional Representation and Dynamic Consistency 1

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games

Bayesian Model Specification: Toward a Theory of Applied Statistics

Notes on Machine Learning for and

Estimation Theory Fredrik Rusek. Chapter 11

Balancing Terrorism and Natural Disasters Defensive Strategy with Endogenous Attacker Effort

Artificial Intelligence Uncertainty

Parametric Models. Dr. Shuang LIANG. School of Software Engineering TongJi University Fall, 2012

Structural Uncertainty in Health Economic Decision Models

Introduction to Mobile Robotics Probabilistic Robotics

Bayesian Networks. Marcello Cirillo PhD Student 11 th of May, 2007

Transcription:

A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management Greg Parnell US Military Academy Jason R. W. Merrick Virginia Commonwealth University Simple Counter-terrorism Decision Defender has n alternatives D = { d1, d2,..., d n } Attacker has m alternatives A = { a1, a2,..., a m } States of information 0 Common ε D Defender ε A Attacker ε Consequences cda (, ), for d Da, A

PDS ( ε ) PAS ( ε ) Simple Counter-terrorism Decision Usual framework is threat, vulnerability, and consequence Vulnerability is represented by two events Success or failure of any defenses the defender decides to implement Attacker s success in carrying out the attack if the defender fails Threat is also represented by two events Attacker gains the capability to perform a PACε ( ) given attack A = { a Attacker decides to use a given attack 1,..., a m } capability Container Security 4

Nuclear materials and devices 5 Example 1 We use container screening for radiological material as a rich and representative example of homeland security decisions Each year 20.4 million containers enter the US (Bonner 2005) Bakir (2008) estimates the probability that terrorists will use a container to smuggle radiological material into the US in the next 10 years to be 0.1. This estimate includes A probability of 0.4 that terrorists will acquire the capability for a RDD A probability of 0.25 that they will attempt to smuggle their device into the US inside a container The probability that the smuggling attempt is thwarted by screening is 0.8 Bakir (2008) assumes a 0.5 chance that the attack either is stopped inside the country or is not successfully carried out The consequence distribution for attack 1 to be $10 billion with probability 0.3 $40 billion with probability 0.4 $100 billion with probability 0.3 For attack 2, we assume the consequences to be half these estimates.

Defender Event Tree ( = j = 1 = j = 1 1 j ) 2 D D D D D P( AC ε ) P( A a ε ) P( DS D d, A a, ε ) P( AS D d, ε ) E[ c( d, a ) ε ]. j= 1 Defender Bayesian Network Attacker Capability 40.0 60.0 Attacker Decision Attack1 Attack2 25.0 75.0 Defender Success 8.00 92.0 Attacker Success 16.0 84.0 Defender Consequences High1 0.30 Medium1 0.40 Low1 0.30 High2 4.50 Medium2 6.00 Low2 4.50 ne 84.0 4.16 ± 13

Attacker Event Tree Attack 2 Attack 1 ( = i = j = i i j ) 2 D D D D P( AC ε ) P( DS D d, A a, ε ) P( AS D d, ε ) E[ c( d, a ) ε ] i= 1 Attacker Bayesian Network Attacker Capability 40.0 60.0 Attack1 Attack2 Attacker Decision 0 100. Defender Success 0 100 Attacker Success 20.0 80.0 Defender Consequences High1 0 Medium1 0 Low1 0 High2 6.00 Medium2 8.00 Low2 6.00 ne 80.0 4.9 ± 13 Attack 2 Attacker Capability 40.0 60.0 Attack1 Attack2 Attacker Decision 100. 0 Defender Success 32.0 68.0 Attacker Success 4.00 96.0 Defender Consequences High1 Medium1 Low1 High2 Medium2 Low2 ne 1.20 1.60 1.20 0 0 0 96.0 1.96 ± 12 Attack 1

Defender Decision Tree 2 = argmin ( ) ( ( = a j ) ( =, = a j, ) ( =, ) [ (, j) ]). * D D D D D d PACε PA ε PDS D da ε PAS D dε Ecda ε d D j= 1 Attacker Decision Tree D D D D { ε 1 ε 1 ε 1 j ε } * a = P AC P DS D= d A= P AS D= d E c d a a A argmin ( ) (, a, ) (, ) [ (, ) ]

Simultaneous Games Attacker Decision Attack 1 Attack 2 Defender Decision 1.96 9.8 4.9 4.9 d = arg min { c( d, a )} a * = arg min { c( d *, a) } * * d D a A Sequential Games * * = { } d = arg min { c( d, a )} a * ( d) argmin c( d, a) a A d D

Intelligent Adversary Risk Analysis D D D { ε ε ε } a * ( d) = argmin P( DS D= d, A= a, ) P( AS D= d, ) E[ c( d, a) ] a A D D D D { ε ε ε ε } * * * d = argmin P( AC ) P( DS D= d, A= a, ) P( AS D= d, ) E[ c( d,a ) ] d D Joint Attacker and Defender Decision Trees

Adversarial Risk Analysis Attacker sub-model for D=d 1 P(θ=10) = 0.5 P(θ=5) = 0.5 { } a * ( d, θ ) = argmin P( DS D= d, A= a, θ) P( AS D= d, θ) E[ c( d, a) θ] a A D D * D p ( ad ( ) ) = Ia ( ( d, ) = ad ( )) ( ) d ε θ π θ θ Adversarial Risk Analysis Attacker sub-model for D=d 2 P(θ=10) = 0.5 P(θ=5) = 0.5 { } a * ( d, θ ) = argmin P( DS D= d, A= a, θ) P( AS D= d, θ) E[ c( d, a) θ] a A D D * D p ( ad ( ) ) = Ia ( ( d, ) = ad ( )) ( ) d ε θ π θ θ

Adversarial Risk Analysis Attacker submodel for D=d 1 Attacker submodel for D=d 2 = arg min ( ) ( ( ( ) ) ( =, = ( ), ) ( =, ) [ (, ( )) ]). * D D D D D D d P AC ε p a d ε P DS D d A a d ε P AS D d ε E c d a d ε d D ad ( ) A Summary of Methods Method Uncertainties Defender Decisions Attacker Decisions Defender Event trees Attacker Event Tree Bayesian Network Defender Decision Tree Attacker Decision Tree Influence Diagrams Attacker decision, Attacker capability, Defense success, Attack success given defense failure, Defender consequences Attacker capability, Defender success, Attack success, Attacker consequences Any of the above Attacker decision, Attacker capability, Defense success, Attack success given defense failure, Defender consequences Attacker capability, Screening success, Attack success, Attacker consequences Any of the above Known a priori Known a priori Solved by backwards induction (minimizing expected defender consequences) Known a priori ne Known a priori ne Solved by backwards induction (maximizing expected attacker consequences) State of Information probabilities and probabilities and probabilities and probabilities and probabilities and probabilities and

Summary of Methods Method Uncertainties Defender Decisions Attacker Decisions State of Information Simultaneous Games ne Solved by finding Nash equilibrium Sequential Games ne Solved by backwards induction (maximizing attacker consequences and minimizing defender consequences) Intelligent Adversary Risk Analysis Attacker capability, Defense success, Attack success given defense failure, Defender consequences Solved by backwards induction (maximizing expected attacker consequences and minimizing expected defender consequences) probabilities and Adversarial Risk Analysis Attacker capability, Defense success, Attack success given defense failure, Defender consequences Solved by backwards induction (maximizing expected attacker consequences and minimizing expected defender consequences) probabilities and in defender tree and defender s beliefs of attacker s state of information. Results Comparison Method Expected Defender Decision Attacker Decisions Consequences Defender Event trees 4.165 Assumed NA Attacker Event Tree 1.96 for Attack 1 Assumed NA 4.90 for Attack 2 Bayes Nets Equivalent to Event Trees Defender Decision Tree 4.165 Probabilities elicited Attacker Decision Tree 4.9 Assumed Attack 2 Influence Diagrams Equivalent to Decision Trees Simultaneous Games 4.9 Attack 2 Sequential Games 4.9 Attack 2 Intelligent Adversary 4.9 Attack 2 Risk Analysis Adversarial Risk 4.9 Attack 2 Analysis Adversarial Risk Analysis with Uncertainty 3.43 Probabilities derived from attacker sub-models

Example 2 The attacker may not obtain attack capability for both attacks. We specify a 0.4 chance that they will get the capability for attack 1 0.1 chance they will get the capability for attack 2. Thus, there is a 0.04 probability they will get both capabilities 0.36 probability they will get just attack 1 capability 0.06 probability they will get just attack 2 capability 0.54 probability they will get neither capability Defender Decision Tree

Attacker Decision Tree Game Theory Attacker Decision Attack 1 Attack 2 Defender Decision 1.96 9.8 1.225 1.225

Intelligent Adversary Risk Analysis Results Comparison Method Expected Defender Attacker Decisions Consequences Decisions Defender Event trees 2.915 Assumed NA Attacker Event Tree 2.695 (Attack 1 if capable) 2.989 (Attack 2 if capable) Assumed NA Bayes Nets Equivalent to Event Trees Defender Decision Tree 2.915 Uncertain Attacker Decision Tree 2.989 Assumed Attack 2 if capable Influence Diagrams Equivalent to Decision Trees Simultaneous Games 1.96 Attack 1 Sequential Games 1.96 Attack 1 Intelligent Adversary Risk 2.989 Attack 2 if capable Analysis Adversarial Risk Analysis 2.989 Attack 2 if capable Adversarial Risk Analysis with Uncertainty 2.842 Probabilities derived from attacker sub-models

Risk Assessment Defender event trees and decision trees that represent attacker decisions as probabilities estimate lower expected consequences than equivalent attacker event trees and decisions trees. Each successive attacker decision modeled as a probability node reduces the expected consequences accordingly. Intelligent adversary risk analysis and adversarial risk analysis estimate expected consequences equal to those of attacker models. Simultaneous and sequential game theory approaches that use simple expected consequence measures do not provide the flexibility to model the order of decisions and uncertainties, and thus arrive at different expected consequences than other approaches in the second example. Intelligent adversary risk analysis and adversarial risk analysis estimate the same expected consequences if the same probabilities and consequences are used in the attacker sub-models. Risk Assessment When the defender expresses uncertainty about the attacker s beliefs and preferences in adversarial risk analysis, the result is a distribution over the attacker s decision, the same as specified in the defender decision tree. Ezell et al. (2010) assert that the decision maker must treat the attacker s decision as an uncertainty and specify a probability distribution over the alternatives. However, the adversarial risk analysis approach can be considered a decomposition of this complex distribution, making each elicitation task easier. Suitably decomposed probability elicitations have been found to be better calibrated than those obtained without decomposition (Ravinder et al. 1988, Howard 1989, Mihajlovits and Merrick 2010).

Risk Communication Event trees, influence diagrams with just probability nodes, and Bayesian networks with only probability nodes are all equivalent as they are following the laws of probability even though they use different solution algorithms. However, they communicate different aspects of the joint probability distribution. Influence diagrams show just the probabilistic dependencies with arrows but do not show probabilities. Event trees show prior distributions, conditional probabilities and the expected consequences at each node in the tree. Probabilistic dependencies must be deduced by examining the probabilities in the conditional probability distributions. The marginal probability distributions do not appear in the tree and must be calculated separately. Risk Communication Bayesian networks show probabilistic dependencies (with arrows), the prior distributions and marginal probabilities. They are much more effective for communication since the show all of the prior and marginal probability distributions of the risk results and are easier update as new information becomes available. For a risk communications perspective, Bayesian networks seem to be the most useful technique.

Risk Management Event trees are less useful for assessing the risk posted by intelligent, adaptive adversaries. Event trees and decisions trees that specify fixed probabilities of attacker decisions will underestimate the potential defender risks. In addition, they do not show the shift in risk given the potential defender decisions. This can also be thought of as the adaptation of the attacker to defender decisions. Intelligent adversary risk analysis and adversarial risk analysis explicitly show such adaptation and the shift in risk based on defender decisions. Are the Attackers Rational? We are using these methods prescriptively to improve the defender s decision making Rational decision axioms Use subjective expected utility Terrorists are surprisingly quantitative, but they are making unaided decisions Boundedly rational Descriptive decision models