### Abstract

We consider the problem of allocating scarce security resources among heterogeneous targets to thwart a possible attack. It is well known that deterministic solutions to this problem being highly predictable are severely suboptimal. To mitigate this predictability, the game-theoretic security game model was proposed which randomizes over pure (deterministic) strategies, causing confusion in the adversary. Unfortunately, such mixed strategies typically randomize over a large number of strategies, requiring security personnel to be familiar with numerous protocols, making them hard to operationalize. Motivated by these practical considerations, we propose an easy to use approach for computing strategies that are easy to operationalize and that bridge the gap between the static solution and the optimal mixed strategy. These strategies only randomize over an optimally chosen subset of pure strategies whose cardinality is selected by the defender, enabling them to conveniently tune the trade-off between ease of operationalization and efficiency using a single design parameter. We show that the problem of computing such operationalizable strategies is NP-hard, formulate it as a mixed-integer optimization problem, provide an algorithm for computing ϵ-optimal equilibria, and an efficient heuristic. We evaluate the performance of our approach on the problem of screening for threats at airport checkpoints and show that the Price of Us-ability, i.e., the loss in optimality to obtain a strategy that is easier to operationalize, is typically not high.

Original language | English |
---|---|

Title of host publication | Proceedings of the 27th International Joint Conference on Artificial Intelligence, IJCAI 2018 |

Subtitle of host publication | IJCAI-18 |

Editors | Jérôme Lang |

Place of Publication | Stockholm |

Publisher | DBLP Computer Science Bibliography |

Pages | 454-460 |

Number of pages | 7 |

Volume | 2018-July |

ISBN (Electronic) | 9780999241127 |

ISBN (Print) | 978-0-9992411-2-7 |

DOIs | |

Publication status | Published - Jul 2018 |

## Fingerprint Dive into the research topics of 'The Price of Usability: Designing Operationalizable Strategies for Security Games'. Together they form a unique fingerprint.

## Cite this

McCarthy, S. M., Laan, C. M., Wang, K., Vayanos, P., Sinha, A., & Tambe, M. (2018). The Price of Usability: Designing Operationalizable Strategies for Security Games. In J. Lang (Ed.),

*Proceedings of the 27th International Joint Conference on Artificial Intelligence, IJCAI 2018: IJCAI-18*(Vol. 2018-July, pp. 454-460). Stockholm: DBLP Computer Science Bibliography. https://doi.org/10.24963/ijcai.2018/63