
NSF Org: |
CMMI Division of Civil, Mechanical, and Manufacturing Innovation |
Recipient: |
|
Initial Amendment Date: | July 29, 2019 |
Latest Amendment Date: | July 29, 2019 |
Award Number: | 1901721 |
Award Instrument: | Standard Grant |
Program Manager: |
Daan Liang
dliang@nsf.gov (703)292-2441 CMMI Division of Civil, Mechanical, and Manufacturing Innovation ENG Directorate for Engineering |
Start Date: | August 1, 2019 |
End Date: | July 31, 2023 (Estimated) |
Total Intended Award Amount: | $325,000.00 |
Total Awarded Amount to Date: | $325,000.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
3 RUTGERS PLZ NEW BRUNSWICK NJ US 08901-8559 (848)932-0150 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
NJ US 08854-8018 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | HDBE-Humans, Disasters, and th |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.041 |
ABSTRACT
This project examines terrorist attacks by individuals who are outside of an organized terrorist group (lone actor attackers) that target public spaces like train stations (soft targets). Such attacks have increased 134 percent in the last 20 years, yet lone actor attack-defend models have not kept up with the trend. The project will develop new models based on game-theory to understand attack and defense strategies combined with immersive simulations that can validate the theoretical models. The project team has expertise in the fields of operations research, industrial and systems engineering, psychology, and electrical and computer engineering. Implementation of this work will contribute to the national priority to reduce risk to critical infrastructures and their users. Furthermore, it will provide advanced training in game-theoretic models for undergraduate and graduate students. This scientific research contribution thus supports NSF's mission to promote the progress of science and to advance our national welfare. In this case, the benefits will be insights to improve man-made emergency management, which can save lives in future events.
This project addresses the gaps in current understanding of lone actor attacks to guide the development of new innovative defense strategies. Specific research objectives are: 1) to develop and analyze game-theoretic models of attack and defense strategies, and protection algorithms, to be used by the defenders against lone actor attackers; 2) to design immersive simulations to provide descriptive agents' behavior and to validate the game-theoretic models using risk metrics such as expected damage, and the fraction of unsuccessful attacks. The intellectual merit of this research is the broadening of the knowledge base of game theory with incomplete information, multi-agent (attacker and defender) learning, and stochastic games of partially observable systems. This is transformational research since it brings a fresh vision into the risk management, immersive simulations, statistical learning and normative behavior studies for infrastructure security. The anticipated results of this research are both analytical and practical for emergency management agencies, transportation safety officers, and the police.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
Project Outcomes Report
The primary aim of this project was to address the gaps in current understanding of lone actor attacks to guide the development of new innovative defensive policies. In this award, we analyzed interactions between attackers and defenders across different scenarios and uncertainties, and suggested defense strategies through game-theoretic framework and empirical data. The outcomes are categorized under the following sections:
1. Real-world data collection and behavior analysis:
We gathered and collected lone-actor terrorism data and made it available through a publicly available site. Our preliminary analysis of data revealed that while pre-9/11 lone actors mostly radicalized in their own environment, post-9/11 lone actors are more diverse. Moreover, our analysis also made the scarcity of incident scene data more evident.
We contrasted, as a proxy, the 2D-game data generated at the Game Research for Infrastructure SecuriTy (GRIST) Lab and real world lone-actor terrorism data and identified five main types of attackers regarding their target selection and attack preparation schemes, out of which ``maximum damagers'' are the most critical. In addition, we used Association Rule Mining that demonstrated the implications among radicalization and attack preparation behaviors. These implications produced temporal behavioral chains on the pathway to violence. The study also points out the unavailability of the incident-scene data.
2. Serious game development and data collection for incident-scene behavior:
In response to the incident-scene data scarcity, serious games serve as a suitable surrogate for data generation. To this end, we designed the "Paint Fever" game (http://grist-lab-ise.rutgers.edu/games.html) to provide a platform for analyzing attacker behavior. The game simulates a critical infrastructure environment featuring individuals and a disguised attacker, with defenders patrolling and locating the attacker. This game provided valuable publicly available data to analyze and understand attackers' incident-scene behavior.
Data from interactive games revealed that the attackers' micro-trajectories significantly expose them during incident scenes. Attackers' behaviors at the incident scene include instinctively reverting upon an encounter with a defender or attempting to blend seamlessly with the surrounding crowd. However, these micro-trajectories are mostly instinctive and as such can be detectable.
3. Developing defense policies against various attack scenarios:
We considered various security problems, for example, search games, and defensive resource allocation scenarios. In these situations, the ultimate goal of the defender(s) is to promptly locate the attacker and the attack weapon in order to prevent any harm to the public. We used game-theoretic and optimization arguments to find the defender's optimum strategy for these problems. For specific cases, whenever it is possible, we proved that the defender's optimum strategy is unique and can be simply formulated. In the general cases, we provided algorithms to computationally solve for the optimum strategy. We showed that these algorithms possess properties that demonstrate their operational effectiveness and efficiency.
A more extensive defense policy includes overarching protection. An unrealistic assumption is that only one type of protection protects all targets. Overarching protection necessitates a cost-effective combination and allocation of various measures against multiple attacks or disasters. In this award, we showed that a country-wide problem can be decomposed into smaller city-level subproblems and solved optimally at each scale, including both static and dynamic protection resources.
4. Extension to cyber-security attacks:
The attackers do not always aim to maximize the damage to the public; in some cases, they prefer to gather intelligence, or to disrupt the communication between defenders in order to create chaos. If the attacker's type is unknown, we showed that the best defense strategy involves an optimal mix of the strategies against each type of attackers separately.
We considered the problem of increasing the communication secrecy throughout a network by applying jamming to eavesdropping attackers. The results of this award indicated that the optimum policy maintains an effective balance between the jamming strength and clear communication among viable users. The conservative approach in such problems assumes an ominous eavesdropper attacking all communication channels simultaneously. However, We showed that strategic attacks distribute the risk to different channels. Against such attacks, we proved that the optimal policy is unique and follows a water-filling scheme.
5. Publications and Dissertations:
The National Science Foundation funding provided support for six doctoral students, and one undergraduate student, with four doctoral students receiving partial funding as part of their participation and three having completed their dissertations. The results of this research had been disseminated as four journal articles and five refereed conference proceedings, and eight conference presentations.
Last Modified: 11/02/2023
Modified by: Melike Baykal-Gursoy
Please report errors in award information by writing to: awardsearch@nsf.gov.