Maritime threat detection using plan recognition

B. Auslander, K. Gupta, D. Aha
{"title":"Maritime threat detection using plan recognition","authors":"B. Auslander, K. Gupta, D. Aha","doi":"10.1109/THS.2012.6459857","DOIUrl":null,"url":null,"abstract":"Existing algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and/or rule-based. Unfortunately, they can be limited in their ability to model the subtlety and complexity of multiple vessel types and their spatio-temporal events, yet their representation is needed to accurately detect anomalies in maritime scenarios. To address these limitations, we apply plan recognition algorithms for maritime anomaly detection. In particular, we examine hierarchical task network (HTN) and case-based algorithms for plan recognition, which detect anomalies by generating expected behaviors for use as a basis for threat detection. We compare their performance with a behavior recognition algorithm on simulated riverine maritime traffic. On a set of simulated maritime scenarios, these plan recognition algorithms outperformed the behavior recognition algorithm, except for one reactive behavior task in which the inverse occurred. Furthermore, our case-based plan recognizer outperformed our HTN algorithm. On the short-term reactive planning scenarios, the plan recognition algorithms outperformed the behavior recognition algorithm on routine plan following. However, they are significantly outperformed on the anomalous scenarios.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"62 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Conference on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2012.6459857","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Existing algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and/or rule-based. Unfortunately, they can be limited in their ability to model the subtlety and complexity of multiple vessel types and their spatio-temporal events, yet their representation is needed to accurately detect anomalies in maritime scenarios. To address these limitations, we apply plan recognition algorithms for maritime anomaly detection. In particular, we examine hierarchical task network (HTN) and case-based algorithms for plan recognition, which detect anomalies by generating expected behaviors for use as a basis for threat detection. We compare their performance with a behavior recognition algorithm on simulated riverine maritime traffic. On a set of simulated maritime scenarios, these plan recognition algorithms outperformed the behavior recognition algorithm, except for one reactive behavior task in which the inverse occurred. Furthermore, our case-based plan recognizer outperformed our HTN algorithm. On the short-term reactive planning scenarios, the plan recognition algorithms outperformed the behavior recognition algorithm on routine plan following. However, they are significantly outperformed on the anomalous scenarios.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于计划识别的海上威胁检测
现有的海上威胁检测算法采用了各种概率和/或基于规则的正态模型。不幸的是,它们在模拟多种船舶类型及其时空事件的微妙性和复杂性方面的能力可能受到限制,然而,需要它们的表示来准确检测海事场景中的异常。为了解决这些限制,我们将计划识别算法应用于海事异常检测。特别是,我们研究了分层任务网络(HTN)和基于案例的计划识别算法,这些算法通过生成预期行为来检测异常,以作为威胁检测的基础。我们将它们的性能与模拟河流海上交通的行为识别算法进行了比较。在一组模拟海事场景中,除了一个反应性行为任务出现相反情况外,这些计划识别算法的表现优于行为识别算法。此外,我们的基于案例的计划识别器优于我们的HTN算法。在短期反应性规划场景下,计划识别算法优于常规计划跟随行为识别算法。然而,它们在异常情况下的表现明显优于它们。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Information sharing requirements and framework needed for community cyber incident detection and response Return-oriented vulnerabilities in ARM executables Providing communication capabilities during disaster response: Airborne remote communication (ARC) platform A system-aware cyber security method for shipboard control systems with a method described to evaluate cyber security solutions A method for analyzing terrorist attacks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1