Approximation algorithm for security games with costly resources

  • Authors:
  • Sayan Bhattacharya;Vincent Conitzer;Kamesh Munagala

  • Affiliations:
  • Department of Computer Science, Duke University, Durham, NC;Department of Computer Science, Duke University, Durham, NC;Department of Computer Science, Duke University, Durham, NC

  • Venue:
  • WINE'11 Proceedings of the 7th international conference on Internet and Network Economics
  • Year:
  • 2011
  • Audit games

    IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence

Quantified Score

Hi-index 0.00

Visualization

Abstract

In recent years, algorithms for computing game-theoretic solutions have been developed for real-world security domains. These games are between a defender, who must allocate her resources to defend potential targets, and an attacker, who chooses a target to attack. Existing work has assumed the set of defender's resources to be fixed. This assumption precludes the effective use of approximation algorithms, since a slight change in the defender's allocation strategy can result in a massive change in her utility. In contrast, we consider a model where resources are obtained at a cost, initiating the study of the following optimization problem: Minimize the total cost of the purchased resources, given that every target has to be defended with at least a certain probability. We give an efficient logarithmic approximation algorithm for this problem.