Abstract
With the rapid development of artificial intelligence, opponents can use AI technology to influence the path planning algorithm of unmanned vehicles, making unmanned vehicles face severe safety issues. Aiming at the opponent’s intelligent attack in the scenario of unmanned vehicle path planning, this paper studies the opponent’s intelligent attack behavior portrait technique and proposes an attack behavior portrait scheme based on the knowledge graph. First, according to the simulation experiment of unmanned vehicle path planning based on reinforcement learning, we use Toeplitz Inverse Covariance-based Clustering (TICC) time-series segmentation clustering technology to extract the steps of an opponent’s attack behavior. Then, the attack strategy rules are stored in the knowledge graph to form a portrait of attack behavior for unmanned vehicle path planning. We verified the proposed scheme on the Neo4j platform. The results proved that the method could describe the steps of intelligent attacks on unmanned vehicles well and provide a basis for unmanned vehicle attack detection and establishing an unmanned vehicle defense system. Furthermore, it has good generalizability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ny, J.L.: Performance optimization for unmanned vehicle systems. Massachusetts Institute of Technology (2009)
Wang, X., Kuang, X., Li, J., Chen, X., Liu, Z.: Oblivious transfer for privacy-preserving in VANET’s feature matching. IEEE Trans. Intell. Transp. Syst. (2020). https://doi.org/10.1109/TITS.2020.2973738
Yao, Y., Li, H., Zheng, H., et al.: Regula sub-rosa: latent backdoor attacks on deep neural networks (2019)
Guikema, S.D., Aven, T.: Assessing risk from intelligent attacks: a perspective on approaches. Reliab. Eng. System Safety, 95(5), pp. 478–483 (2010). ISSN 0951-8320
Wang, C., Wang, D., Tu, Y., Xu, G., Wang, H.: Understanding node capture attacks in user authentication schemes for wireless sensor networks. In: IEEE Transactions on Dependable and Secure Computing (2020). https://doi.org/10.1109/TDSC.2020.2974220.
Rule reduction after knowledge graph mining for cyber situational awareness analysis. Proc. Comput. Sci. 176, 22–30 (2020)
Yuan, Y., Adhatarao, S.S., Li, M., Yuan, Y., Liu, Z., Fu, X.: ADA: Adaptive Deep Log Anomaly Detector. INFOCOM (2020)
Dittrich, M.A., Fohlmeister, S.: Cooperative multi-agent system for production control using reinforcement learning. CIRP Ann. Manuf. Technol., 69(1) (2020)
Zamora, I., Lopez, N.G., Vilches, V.M., et al.: Extending the OpenAI gym for robotics: a toolkit for reinforcement learning using ROS and Gazebo (2016)
Wang, L., Islam, T., Tao, L., et al.: An attack graph-based probabilistic security metric. In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13–16, 2008, Proceedings. DBLP (2008)
Tidwell, T., Larson, R., Fitch, K., et al.: Modeling internet attacks (2001)
Kiran, B.R., et al.: Deep reinforcement learning for autonomous driving: a survey. In: IEEE Transactions on Intelligent Transportation Systems (2021)
Chi, C., Ji, K., Song, P., et al.: Cooperatively improving data center energy efficiency based on multi-agent deep reinforcement learning. Energies 14(8), 2071 (2021)
Hallac, D., Vare, S., Boyd, S., et al.: Toeplitz inverse covariance-based clustering of multivariate time series data. In: The 23rd ACM SIGKDD International Conference. ACM (2017)
Guo, C., Huang, D., Zhang, J., Jing, X., Bai, G., Dong, N.: Early prediction for mode anomaly in generative adversarial network training: an empirical study. Inf. Sci. 534, 117–138 (2020)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (no. 61876019).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, Z., Ma, Y., Zhang, Z., Yu, X., Zhang, Q., Li, Y. (2021). Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles. In: Tan, Y., Shi, Y., Zomaya, A., Yan, H., Cai, J. (eds) Data Mining and Big Data. DMBD 2021. Communications in Computer and Information Science, vol 1454. Springer, Singapore. https://doi.org/10.1007/978-981-16-7502-7_6
Download citation
DOI: https://doi.org/10.1007/978-981-16-7502-7_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7501-0
Online ISBN: 978-981-16-7502-7
eBook Packages: Computer ScienceComputer Science (R0)