Award Abstract # 1901721
Protecting Soft Targets against Lone Actor Attacks using Game Theory and Immersive Simulations

NSF Org: CMMI
Division of Civil, Mechanical, and Manufacturing Innovation
Recipient: RUTGERS, THE STATE UNIVERSITY
Initial Amendment Date: July 29, 2019
Latest Amendment Date: July 29, 2019
Award Number: 1901721
Award Instrument: Standard Grant
Program Manager: Daan Liang
dliang@nsf.gov
 (703)292-2441
CMMI
 Division of Civil, Mechanical, and Manufacturing Innovation
ENG
 Directorate for Engineering
Start Date: August 1, 2019
End Date: July 31, 2023 (Estimated)
Total Intended Award Amount: $325,000.00
Total Awarded Amount to Date: $325,000.00
Funds Obligated to Date: FY 2019 = $325,000.00
History of Investigator:
  • Melike Baykal-Gursoy (Principal Investigator)
    gursoy@rutgers.edu
  • Predrag Spasojevic (Co-Principal Investigator)
  • Pernille Hemmer (Co-Principal Investigator)
Recipient Sponsored Research Office: Rutgers University New Brunswick
3 RUTGERS PLZ
NEW BRUNSWICK
NJ  US  08901-8559
(848)932-0150
Sponsor Congressional District: 12
Primary Place of Performance: Rutgers University New Brunswick
NJ  US  08854-8018
Primary Place of Performance
Congressional District:
06
Unique Entity Identifier (UEI): M1LVPE5GLSD9
Parent UEI:
NSF Program(s): HDBE-Humans, Disasters, and th
Primary Program Source: 01001920DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 041E, 042E, 9102
Program Element Code(s): 163800
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.041

ABSTRACT

This project examines terrorist attacks by individuals who are outside of an organized terrorist group (lone actor attackers) that target public spaces like train stations (soft targets). Such attacks have increased 134 percent in the last 20 years, yet lone actor attack-defend models have not kept up with the trend. The project will develop new models based on game-theory to understand attack and defense strategies combined with immersive simulations that can validate the theoretical models. The project team has expertise in the fields of operations research, industrial and systems engineering, psychology, and electrical and computer engineering. Implementation of this work will contribute to the national priority to reduce risk to critical infrastructures and their users. Furthermore, it will provide advanced training in game-theoretic models for undergraduate and graduate students. This scientific research contribution thus supports NSF's mission to promote the progress of science and to advance our national welfare. In this case, the benefits will be insights to improve man-made emergency management, which can save lives in future events.

This project addresses the gaps in current understanding of lone actor attacks to guide the development of new innovative defense strategies. Specific research objectives are: 1) to develop and analyze game-theoretic models of attack and defense strategies, and protection algorithms, to be used by the defenders against lone actor attackers; 2) to design immersive simulations to provide descriptive agents' behavior and to validate the game-theoretic models using risk metrics such as expected damage, and the fraction of unsuccessful attacks. The intellectual merit of this research is the broadening of the knowledge base of game theory with incomplete information, multi-agent (attacker and defender) learning, and stochastic games of partially observable systems. This is transformational research since it brings a fresh vision into the risk management, immersive simulations, statistical learning and normative behavior studies for infrastructure security. The anticipated results of this research are both analytical and practical for emergency management agencies, transportation safety officers, and the police.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Altay, A and Baykal-Gursoy, M. and Hemmer, P. "Behavior Associations in Lone Actor Terrorists" Terrorism and Political Violence , 2020 https://doi.org/10.1080/09546553.2020 Citation Details
Altay, Ayca and Baykal-Gürsoy, Melike and Hemmer, Pernille "Behavior Associations in Lone-Actor Terrorists" Terrorism and Political Violence , v.34 , 2022 https://doi.org/10.1080/09546553.2020.1787384 Citation Details
Xu, Z. and Baykal-Gürsoy, M. "A Cooperative Jamming Game in Wireless Networks under Uncertainty" Security and Privacy in Communication Networks. SecureComm 2020. Lecture Notes , v.335 , 2020 https://doi.org/10.1007/978-3-030-63086-7_14 Citation Details
Xu, Z. and Baykal-Gürsoy, M. "A Friendly Interference Game in Wireless Secret Communication Networks" 10th International Conference on NETwork Games, COntrol and OPtimization (NetGCOOP) , 2021 https://doi.org/https://doi.org/10.1007/978-3-030-87473-5_4 Citation Details
Xu, Zhifan and Baykal-Gursoy, Melike "Cost-Efficient Network Protection Games Against Uncertain Types of Cyber-Attackers" 2022 IEEE International Symposium on Technologies for Homeland Security (HST) , 2022 https://doi.org/10.1109/HST56032.2022.10025437 Citation Details
Xu, Zhifan and Baykal-Gursoy, Melike "Efficient Network Protection Games Against Multiple Types Of Strategic Attackers" 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) , 2021 https://doi.org/10.1109/ICASSP39728.2021.9413758 Citation Details
Xu, Zhifan and Baykal-Gursoy, Melike "Power Allocation for Cooperative Jamming Against a Strategic Eavesdropper Over Parallel Channels" IEEE Transactions on Information Forensics and Security , v.18 , 2023 https://doi.org/10.1109/TIFS.2022.3228520 Citation Details
Xu, Zhifan and Baykal-Gursoy, Melike and Spasojevic, Predrag "A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels" 2021 IEEE Conference on Communications and Network Security (CNS) , 2021 https://doi.org/10.1109/CNS53000.2021.9705044 Citation Details
Yolmeh, Abdolmajid and Baykal-Gürsoy, Melike "Weighted network search games with multiple hidden objects and multiple search teams" European Journal of Operational Research , 2020 https://doi.org/10.1016/j.ejor.2020.06.046 Citation Details
Yolmeh, Abdolmajid and Baykal-Gürsoy, Melike and Bier, Vicki "A decomposable resource allocation model with generalized overarching protections" Annals of Operations Research , v.320 , 2023 https://doi.org/10.1007/s10479-022-05064-w Citation Details

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

 

Project Outcomes Report

The primary aim of this project was to address the gaps in current understanding of lone actor attacks to guide the development of new innovative defensive policies. In this award, we analyzed interactions between attackers and defenders across different scenarios and uncertainties, and suggested defense strategies through game-theoretic framework and empirical data. The outcomes are categorized under the following sections: 

1. Real-world data collection and behavior analysis:

We gathered and collected lone-actor terrorism data and made it available through a publicly available site. Our preliminary analysis of data revealed that while pre-9/11 lone actors mostly radicalized in their own environment, post-9/11 lone actors are more diverse.  Moreover, our analysis also made the scarcity of incident scene data more evident. 

We contrasted, as a proxy, the 2D-game data generated at the Game Research for Infrastructure SecuriTy (GRIST) Lab and real world lone-actor terrorism data and identified five main types of attackers regarding their target selection and attack preparation schemes, out of which ``maximum damagers'' are the most critical. In addition, we used Association Rule Mining that demonstrated the implications among radicalization and attack preparation behaviors. These implications produced temporal behavioral chains on the pathway to violence. The study also points out the unavailability of the incident-scene data. 

2. Serious game development and data collection for incident-scene behavior:

In response to the incident-scene data scarcity, serious games serve as a suitable surrogate for data generation. To this end, we designed the "Paint Fever" game (http://grist-lab-ise.rutgers.edu/games.html) to provide a platform for analyzing attacker behavior. The game simulates a critical infrastructure environment featuring individuals and a disguised attacker, with defenders patrolling and locating the attacker. This game provided valuable publicly available data to analyze and understand attackers' incident-scene behavior.

Data from interactive games revealed that the attackers' micro-trajectories significantly expose them during incident scenes. Attackers' behaviors at the incident scene include instinctively reverting upon an encounter with a defender or attempting to blend seamlessly with the surrounding crowd. However, these micro-trajectories are mostly instinctive and as such can be detectable. 

3. Developing defense policies against various attack scenarios:

We considered various security problems, for example, search games, and defensive resource allocation scenarios. In these situations, the ultimate goal of the defender(s) is to promptly locate the attacker and the attack weapon in order to prevent any harm to the public. We used game-theoretic and optimization arguments to find the defender's optimum strategy for these problems. For specific cases, whenever it is possible, we proved that the defender's optimum strategy is unique and can be simply formulated. In the general cases, we provided algorithms to computationally solve for the optimum strategy. We showed that these algorithms possess properties that demonstrate their operational effectiveness and efficiency.

A more extensive defense policy includes overarching protection. An unrealistic assumption is that only one type of protection protects all targets. Overarching protection necessitates a cost-effective combination and allocation of various measures against multiple attacks or disasters. In this award, we showed that a country-wide problem can be decomposed into smaller city-level subproblems and solved optimally at each scale, including both static and dynamic protection resources. 

4. Extension to cyber-security attacks:

The attackers do not always aim to maximize the damage to the public; in some cases, they prefer to gather intelligence, or to disrupt the communication between defenders in order to create chaos. If the attacker's type is unknown, we showed that the best defense strategy involves an optimal mix of the strategies against each type of attackers separately.

We considered the problem of increasing the communication secrecy throughout a network by applying jamming to eavesdropping attackers. The results of this award indicated that the optimum policy maintains an effective balance between the jamming strength and clear communication among viable users. The conservative approach in such problems assumes an ominous eavesdropper attacking all communication channels simultaneously. However, We showed that strategic attacks distribute the risk to different channels. Against such attacks, we proved that the optimal policy is unique and follows a water-filling scheme. 

5. Publications and Dissertations:

The National Science Foundation funding provided support for six doctoral students, and one undergraduate student, with four doctoral students receiving partial funding as part of their participation and three having completed their dissertations. The results of this research had been disseminated as four journal articles and five refereed conference proceedings, and eight conference presentations. 

 


Last Modified: 11/02/2023
Modified by: Melike Baykal-Gursoy

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page