Adversarial Risk Analysis Models for



Similar documents
Adversarial Risk Analysis

An Adversarial Risk Analysis Approach to Fraud Detection

Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project. Alessandra Tedeschi, Deep Blue S.r.

Applications of GIS in Law Enforcement. John Beck Global Law Enforcement Manager Esri 12/10/2014

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview

Tutorials: Abstracts and Speakers Bio

LLB (Hons) Law with Criminology Module Information

LLB (Hons) International Law Module Information

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile

A Risk Assessment Methodology (RAM) for Physical Security

The effects of CCTV on Crime What Works Briefing

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

Enterprise Location Intelligence

Craig McWilliams Craig Burrell. Bringing Smarter, Safer Transport to NZ

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.

Cyber Security in the University of Oxford: Collaborating without Conforming?

Description of Criminal Justice

PERSPECTIVES ON IDENTITY THEFT

DATA ANALYTICS AND REAL TIME CRIME TOOLS INTELLIGENCE LED POLICING

Security in a System of Systems Context: Insights from Recent Initiatives. Panel: Security for Energy Infrastructures 28-AUG-2013

Relationship to National Response Plan Emergency Support Function (ESF)/Annex

Curriculum for the Bachelor Degree in Crime and Delinquency

Optimization: Continuous Portfolio Allocation

GNSS integrity monitoring for the detection and mitigation of interference

Simulation and Risk Analysis

BMC Training UK. Finance, Budgeting and Accounting

Enterprise Location Intelligence

ABA Section of Public Utility, Communications & Transportation Law Safety and Security in Transport

Part I: Decision Support Systems

The role of demand-responsive energy management systems for smart cities

Optimization Problems in Infrastructure Security

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

Veracity of data. New approaches are emerging to account for uncertainty in data at a giant scale IBM Corporation

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview

Full Course List (Summer 2015 Summer 2017)

Pablo Gómez Esteban. Intelligent Agents, Affective Computing, Multi-Agent Systems, Cognitive Architectures, Domestic and Social Robots.

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

FORTNIGHTLY. Reliability Standards. PLUS A Role for Coal Falling Demand New York s Distributed Future

2003 INNOVATIONS AWARDS PROGRAM Application Form

EMMANUEL BARTHE University of Nevada, Reno Criminal Justice (775)

IBM Algo Asset Liability Management

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Consulting Project Assignment Optimization Using Monte Carlo Simulation and Nonlinear Programming

Towards a compliance audit of SLAs for data replication in Cloud storage

Security Visualization Past, Present, Future

Go with the flow: Transportation information management solutions from IBM.

Bubble, Bubble...minimum toil...big trouble: The threat of Boiler Room Fraud Investigation Challenges

Designing Resilient Electrical Distribution Grids R&D Challenges

LAW ENFORCEMENT AND GEOGRAPHIC INFORMATION SYSTEMS

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Effective Implementation of Regional Transport Strategy: traffic incident management case study

International Serious and Organised Crime Conference

Ensembling Data, Process and Text Analytics to build clever Industrial Analytics Solutions

Executive Protection Facility Security Convoy Escort

Steps to Becoming a Riverside Police Officer

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon

Thatcham Research The Insurers Automotive Research Centre

1 Fundamentals of Crime Analysis

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

Smart traffic for Guadalajara City: crowdsourcing, analytics and forecasting for commuting time optimization

Business Continuity for Cyber Threat

Renewable Energy Management System (REMS): Using optimisation to plan renewable energy infrastructure investment in the Pacific

Dr. Wayne Steve Thompson Jr., PhD EDUCATION

COMP 590: Artificial Intelligence

The FBI and the Internet

Oracle Smart City Platform Managing Mobility

Developments in cybercrime and cybersecurity

Programme Specification

Egmont Group Plenary St Petersburg July 2012 Anti money laundering in new payment technologies

Anti corruption and Anti money laundering A critical nexus

Adult Criminal Justice Case Processing in Washington, DC

International cooperation between law enforcement authorities

MSc Finance and Economics detailed module information

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture

How Many Times Will the Fed Raise Interest Rates in 2016?

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared?

PMP -Project Management Professional Course Agenda

First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range

NATIONWIDE CREDIT CARD FRAUD PREVENTION. Hendi Yogi Prabowo *

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

Setting the Standard for Safe City Projects in the United States

Addressing Human Behavior in Cyber Security

Workshop 18 th of March, Berlin Mass Transportation

Data Fusion Centers. Transforming Public Safety Information into Actionable Knowledge

Adaptive Business Intelligence

Outcome performance measures

Multi-Agent Technology & Scheduling Solutions

Statistical Challenges with Big Data in Management Science

Insurance Shopping: Understand how auto insurance rates are set

Theoretical Perspective

New criminal offences. England and Wales 1 st June st May 2012 Statistics Bulletin

Obstacles for Security Cooperation in North America. Roberto Domínguez Jean Monnet/GGP Fellow

Purpose of the Governor s strategy. Guiding Principles

Introduction to the 2015 Horizon 2020 Energy Call for Proposals. 14 July 2014

Transcription:

Adversarial Risk Analysis Models for Urban Security Resource Allocation David Ríos Insua, Royal Academy Cesar Gil, U. Rey Juan Carlos Jesús Ríos, IBM Research YH COST Smart Cities Wshop Paris, September 2011

ARA for Urban Security Resource Allocation Security Urban security and modelling Adversarial Risk Analysis ARA for Urban Security Resource Allocation Discussion

Security One of The World s Biggest Problems (Lomborg, 2008) Arms proliferation Conflicts Corruption Terrorism Drugs Money laundering One of the FP7 topics!!!

Urban Security and Modelling Criminology Becker (1968) Economic theory of delict Clarke and Cornish (1986) Situational crime prevention. The reasoning criminal Rational Choice in criminology Routine activities theory Delictive pattern theory Problem-oriented policing Displacement theory Policing performance measures

Urban Security and Modelling COMPSTAT (1994) Crime Mapping Patrol Car Allocation Models (Tongo, 2010) Police Patrol Area Covering Models (Curtin et al, 2007) Police Patrol Routes Models (Chawathe, 2007) ARMOR (CREATE, 2007) The Numbers behind NUMB3RS (Devlin, Lorden, 2007)

Adversarial Risk Analysis S-11, M-11 led to large security investments globally, some of them criticised Many modelling efforts to efficiently allocate such resources Parnell et al (2008) NAS review of bioterr assessment Fault tree not accounting for intentionality Game theoretic approaches. Common knowledge assumption Decision analytic approaches. Forecasting the adversary action Merrick, Parnell (2011) review approaches commenting favourably on Adversarial Risk Analysis

Adversarial Risk Analysis A framework to manage risks from actions of intelligent adversaries (DRI, Rios, Banks, JASA 2009) One-sided prescriptive support Use a SEU model Treat the adversary s decision as uncertainties Method to predict adversary s actions We assume the adversary is a expected utility maximizer Model his decision problem Assess his probabilities and utilities Find his action of maximum expected utility But other descriptive models are possible Uncertainty in the Attacker s decision stems from our uncertainty about his probabilities and utilities but this leads to a hierarchy of nested decision problems (k level thinking) (noninformative, heuristic, mirroring argument) vs (common knowledge) 7

Adversarial Risk Analysis ARA applications to counterterrorism models (Rios, DRI, 2009, 2012) (ESF-COST ALGODEC) Sequential Defend-Attack Simultaneous Defend-Attack Sequential Defend-Attack-Defend Sequential Defend-Attack with private information General coupled influence diagrams?? Koller, Milsch Somali pirates case (Sevillano, Rios, DRI, 2012) Routing games (anti IED war) (Wang, Banks, 2011) Borel games (Banks, Petralia, Wang, 2011) Auctions (DRI, Rios, Banks, 2009; Rothkopf, 2007) 8

ARA for Urban Security. Basics City divided into cells Each cell has a value Agents 1. Defender, D, Police. Aims at maintaining value 2. Attacker, A, Mob. Aims at gaining value D allocates resources to prevent A performs attacks D allocates resources to recover

ARA for Urban Security. Basics The map and the values The resource allocations integer integer integer

ARA for Urban Security. Basics At each cell, a coupled influence diagram Cell decision making coordinated by constraints on resources

ARA for Urban Security. Police dynamics At each cell: Makes resource allocation Faces a level of delinquency, with impact Recovers as much as she can with resources with a level of success Gets a utility Aggregates utilities/aggregates consequences

ARA for Urban Security. Police dynamics The assessments required from the defender are ***************

ARA for Urban Security. Police dynamics The assessments required from the defender are??

ARA for Urban Security. Police dynamics The Police solves sequentially Augmented probability simulation (Bielza, Muller, DRI, ManSci1999)

ARA for Urban Security. Mob dynamics At each cell: Observes resource allocation Undertakes attack, with impact Observes recovery with resources with a level of success Gets a utility Aggregates utilities/aggregates consequences

ARA for Urban Security. Mob Dynamics The assessments for the Mob are We model our uncertainty about them through

ARA for Urban Security. Mob Dynamics Generate all feasible allocations, comp probabs, normalise, add some uncertainty

ARA for Urban Security. Mob dynamics We propagate such uncertainty through the scheme

ARA for Urban Security. Mob dynamics We can estimate it by Monte Carlo Sample from Solve for maximum expected utility attack (EU computed in one step+ augmented prob. Simulation)

Discussion SECONOMICS FP7 project (Feb 2012) UK energy grid Ankara airport Barcelona underground Forthcoming proposal on urban security

Discussion Multiple Defenders to be coordinated (risk sharing). Multiple Attackers possibly coordinated Various types of resources (people, cars, cameras, ) Various types of delinquency (terrorism, thefts, drugs, ) Multivalued cells. The perception of security (concern analysis) Multiperiod planning Time and space effects (Displacement of delicts) Insurance Private security Structural measures Sensor info to update dynamically allocations