Know Your Adversary: Insights for a Better Adversarial Behavioral Model
نویسندگان
چکیده
Given the global challenges of security, both in physical and cyber worlds, security agencies must optimize the use of their limited resources. To that end, many security agencies have begun to use "security game" algorithms, which optimally plan defender allocations, using models of adversary behavior that have originated in behavioral game theory. To advance our understanding of adversary behavior, this paper presents results from a study involving an opportunistic crime security game (OSG), where human participants play as opportunistic adversaries against an algorithm that optimizes defender allocations. In contrast with previous work which often assumes homogeneous adversarial behavior, our work demonstrates that participants are naturally grouped into multiple distinct categories that share similar behaviors. We capture the observed adversarial behaviors in a set of diverse models from different research traditions, behavioral game theory, and Cognitive Science, illustrating the need for heterogeneity in adversarial models.
منابع مشابه
Adversarial Neural Machine Translation
In this paper, we study a new learning paradigm for Neural Machine Translation (NMT). Instead of maximizing the likelihood of the human translation as in previous works, we minimize the distinction between human translation and the translation given by a NMT model. To achieve this goal, inspired by the recent success of generative adversarial networks (GANs), we employ an adversarial training a...
متن کاملTowards Analyzing Adversarial Behavior in Clandestine Networks
Adversarial behavioral has been observed in many different contexts. In this paper we address the problem of adversarial behavior in the context of clandestine networks. We use data from a massively multiplayer online role playing game to illustrate the behavioral and structural signatures of deviant players change over time as a response to "policing" activities of the game administrators. Pre...
متن کاملMaster Thesis : “ Energy - Efficient Jamming and Countermeasures ”
Since wireless networks use a shared medium they are exposed to jamming attacks. Such attacks are carried out by an adversary emitting radio frequency signals. They can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming attacks. However, unless the adversary has unlimited capacities, it cannot jam all communicati...
متن کاملC-RNN-GAN: Continuous recurrent neural networks with adversarial training
Generative adversarial networks have been proposed as a way of efficiently training deep generative neural networks. We propose a generative adversarial model that works on continuous sequential data, and apply it by training it on a collection of classical music. We conclude that it generates music that sounds better and better as the model is trained, report statistics on generated music, and...
متن کاملA Generative Game-Theoretic Framework for Adversarial Plan Recognition
Adversarial reasoning is of the first importance for defence and security applications since it allows to (1) better anticipate future threats, and (2) be proactive in deploying effective responses. In this paper, we address the two subtasks of adversarial reasoning, namely adversarial plan recognition and strategy formulation, from a generative, game-theoretic perspective. First, a set of poss...
متن کامل