Skip to main content

Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles

  • Conference paper
  • First Online:
Data Mining and Big Data (DMBD 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1454))

Included in the following conference series:

  • 985 Accesses

Abstract

With the rapid development of artificial intelligence, opponents can use AI technology to influence the path planning algorithm of unmanned vehicles, making unmanned vehicles face severe safety issues. Aiming at the opponent’s intelligent attack in the scenario of unmanned vehicle path planning, this paper studies the opponent’s intelligent attack behavior portrait technique and proposes an attack behavior portrait scheme based on the knowledge graph. First, according to the simulation experiment of unmanned vehicle path planning based on reinforcement learning, we use Toeplitz Inverse Covariance-based Clustering (TICC) time-series segmentation clustering technology to extract the steps of an opponent’s attack behavior. Then, the attack strategy rules are stored in the knowledge graph to form a portrait of attack behavior for unmanned vehicle path planning. We verified the proposed scheme on the Neo4j platform. The results proved that the method could describe the steps of intelligent attacks on unmanned vehicles well and provide a basis for unmanned vehicle attack detection and establishing an unmanned vehicle defense system. Furthermore, it has good generalizability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ny, J.L.: Performance optimization for unmanned vehicle systems. Massachusetts Institute of Technology (2009)

    Google Scholar 

  2. Wang, X., Kuang, X., Li, J., Chen, X., Liu, Z.: Oblivious transfer for privacy-preserving in VANET’s feature matching. IEEE Trans. Intell. Transp. Syst. (2020). https://doi.org/10.1109/TITS.2020.2973738

    Article  Google Scholar 

  3. Yao, Y., Li, H., Zheng, H., et al.: Regula sub-rosa: latent backdoor attacks on deep neural networks (2019)

    Google Scholar 

  4. Guikema, S.D., Aven, T.: Assessing risk from intelligent attacks: a perspective on approaches. Reliab. Eng. System Safety, 95(5), pp. 478–483 (2010). ISSN 0951-8320

    Google Scholar 

  5. Wang, C., Wang, D., Tu, Y., Xu, G., Wang, H.: Understanding node capture attacks in user authentication schemes for wireless sensor networks. In: IEEE Transactions on Dependable and Secure Computing (2020). https://doi.org/10.1109/TDSC.2020.2974220.

  6. Rule reduction after knowledge graph mining for cyber situational awareness analysis. Proc. Comput. Sci. 176, 22–30 (2020)

    Google Scholar 

  7. Yuan, Y., Adhatarao, S.S., Li, M., Yuan, Y., Liu, Z., Fu, X.: ADA: Adaptive Deep Log Anomaly Detector. INFOCOM (2020)

    Google Scholar 

  8. Dittrich, M.A., Fohlmeister, S.: Cooperative multi-agent system for production control using reinforcement learning. CIRP Ann. Manuf. Technol., 69(1) (2020)

    Google Scholar 

  9. Zamora, I., Lopez, N.G., Vilches, V.M., et al.: Extending the OpenAI gym for robotics: a toolkit for reinforcement learning using ROS and Gazebo (2016)

    Google Scholar 

  10. Wang, L., Islam, T., Tao, L., et al.: An attack graph-based probabilistic security metric. In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13–16, 2008, Proceedings. DBLP (2008)

    Google Scholar 

  11. Tidwell, T., Larson, R., Fitch, K., et al.: Modeling internet attacks (2001)

    Google Scholar 

  12. Kiran, B.R., et al.: Deep reinforcement learning for autonomous driving: a survey. In: IEEE Transactions on Intelligent Transportation Systems (2021)

    Google Scholar 

  13. Chi, C., Ji, K., Song, P., et al.: Cooperatively improving data center energy efficiency based on multi-agent deep reinforcement learning. Energies 14(8), 2071 (2021)

    Article  Google Scholar 

  14. Hallac, D., Vare, S., Boyd, S., et al.: Toeplitz inverse covariance-based clustering of multivariate time series data. In: The 23rd ACM SIGKDD International Conference. ACM (2017)

    Google Scholar 

  15. Guo, C., Huang, D., Zhang, J., Jing, X., Bai, G., Dong, N.: Early prediction for mode anomaly in generative adversarial network training: an empirical study. Inf. Sci. 534, 117–138 (2020)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (no. 61876019).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quanxin Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Z., Ma, Y., Zhang, Z., Yu, X., Zhang, Q., Li, Y. (2021). Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles. In: Tan, Y., Shi, Y., Zomaya, A., Yan, H., Cai, J. (eds) Data Mining and Big Data. DMBD 2021. Communications in Computer and Information Science, vol 1454. Springer, Singapore. https://doi.org/10.1007/978-981-16-7502-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-7502-7_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-7501-0

  • Online ISBN: 978-981-16-7502-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics