首页 > 最新文献

2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications最新文献

英文 中文
New search algorithm for randomly located objects: A non-cooperative agent based approach 随机定位对象的新搜索算法:一种基于非合作智能体的方法
D. Calitoiu
In this paper we address the general question of what is the best strategy to search efficiently for randomly located objects (target sites). We propose a new agent based algorithm for searching in an unpredictable environment. The originality of our work consists in applying a non-cooperative strategy, namely the distributed Goore Game model, as opposed to applying the classical collaborative and competitive strategies, or individual strategies. This paper covers only the non-destructive search that occurs when the agent visits the same target many times. The nondestructive search can be performed in either of the two cases: if the target becomes temporarily inactive or if it leaves the area. The proposed algorithm has two versions: one when the agent can move with a step equal to unity and the other when the step of the agent follows a Levy flight distribution. The latter version is inspired by the work of A.M. Reynolds, motivated by biological examples.
在本文中,我们解决了一个普遍的问题,即什么是有效搜索随机定位对象(目标站点)的最佳策略。我们提出了一种新的基于智能体的在不可预测环境下的搜索算法。我们工作的独创性在于应用非合作策略,即分布式Goore博弈模型,而不是应用经典的合作和竞争策略或个人策略。本文只讨论agent多次访问同一目标时发生的非破坏性搜索。非破坏性搜索可以在两种情况下进行:如果目标暂时不活动,或者如果目标离开该区域。提出的算法有两种版本,一种是智能体以等于1的步长移动,另一种是智能体的步长服从Levy飞行分布。后一个版本的灵感来自A.M.的作品雷诺兹,受到生物学例子的启发。
{"title":"New search algorithm for randomly located objects: A non-cooperative agent based approach","authors":"D. Calitoiu","doi":"10.1109/CISDA.2009.5356564","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356564","url":null,"abstract":"In this paper we address the general question of what is the best strategy to search efficiently for randomly located objects (target sites). We propose a new agent based algorithm for searching in an unpredictable environment. The originality of our work consists in applying a non-cooperative strategy, namely the distributed Goore Game model, as opposed to applying the classical collaborative and competitive strategies, or individual strategies. This paper covers only the non-destructive search that occurs when the agent visits the same target many times. The nondestructive search can be performed in either of the two cases: if the target becomes temporarily inactive or if it leaves the area. The proposed algorithm has two versions: one when the agent can move with a step equal to unity and the other when the step of the agent follows a Levy flight distribution. The latter version is inspired by the work of A.M. Reynolds, motivated by biological examples.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"389 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76449655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multiple UAV teams for multiple tasks 多个无人机小组执行多个任务
P. Sujit, J. Sousa, F. Pereira
In a search and prosecute mission, multiple heterogeneous unmanned aerial vehicles UAVs that carry different resources need to perform the classify, prosecute and battle damage assessment (BDA) tasks on targets sequentially. Depending on the target resource requirement, it may be necessary to deploy a coalition of UAVs to perform the action. In this paper, we propose coalition formation algorithms that have low computational overhead to determine coalitions for the prosecute and the BDA tasks. We also develop a simultaneous strike mechanism based on Dubins curves for the UAVs to prosecute the target simultaneously. Monte-Carlo simulation results are presented to show how the algorithms work and the effect of increasing the number of BDA tasks on the mission performance.
在搜索起诉任务中,携带不同资源的多架异构无人机需要依次对目标执行分类、起诉和战损评估(BDA)任务。根据目标资源需求,可能需要部署一个无人机联盟来执行行动。在本文中,我们提出了具有低计算开销的联盟形成算法来确定起诉和BDA任务的联盟。我们还开发了一种基于杜宾曲线的无人机同步打击机制,以实现无人机对目标的同步打击。给出了蒙特卡罗仿真结果,展示了算法的工作原理以及增加BDA任务数量对任务性能的影响。
{"title":"Multiple UAV teams for multiple tasks","authors":"P. Sujit, J. Sousa, F. Pereira","doi":"10.1109/CISDA.2009.5356535","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356535","url":null,"abstract":"In a search and prosecute mission, multiple heterogeneous unmanned aerial vehicles UAVs that carry different resources need to perform the classify, prosecute and battle damage assessment (BDA) tasks on targets sequentially. Depending on the target resource requirement, it may be necessary to deploy a coalition of UAVs to perform the action. In this paper, we propose coalition formation algorithms that have low computational overhead to determine coalitions for the prosecute and the BDA tasks. We also develop a simultaneous strike mechanism based on Dubins curves for the UAVs to prosecute the target simultaneously. Monte-Carlo simulation results are presented to show how the algorithms work and the effect of increasing the number of BDA tasks on the mission performance.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"6 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83539669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information assurances and threat identification in networked organizations 网络组织中的信息保障与威胁识别
Terrill L. Frantz, Kathleen M. Carley
We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved cellular social-networks with four types of data error: missing links, missing actors, extra links, and extra actors. We provide statistical results for top threat identification from the perspective of four traditional measures of network centrality: degree, betweenness, closeness and eigenvector. The results from our experiment provide a statistical estimate of the accuracy of the top-1 and top-3 actors as indicated by the observed data. Using these statistics a quantitative indication of reliability can be provided along with defence intelligence estimates of covert-organization leadership derived from relational network data. We provide lookup tables for the specific situations created for this experiment, from which other conditions may be loosely estimated. This work has highly practical implications for operational analysts and consumers of such analyses, particularly in the terrorist network and drug-trafficking domains. This work also lays the groundwork for developing more intricate estimates of reliability for other network-related, analytic tasks of analysts — from more extensive key-actor identification tasks to assessing the statistical reliability of the centrality measures in and of themselves.
我们提出了一份关于控制实验的简要报告,该实验为参与威胁识别的面向网络的防御分析师提供了有价值的统计数据。这些统计数据估计了顶级中心参与者发现的准确性,这些发现来自通常在现实世界数据集中发现的关系数据,例如在分布式、隐蔽组织中收集的数据。我们的实验涉及有四种类型数据错误的蜂窝社交网络:缺失链接、缺失参与者、额外链接和额外参与者。我们从网络中心性的四个传统度量(度、中间度、接近度和特征向量)的角度提供了顶级威胁识别的统计结果。我们的实验结果提供了观测数据所表明的top-1和top-3行动者的准确性的统计估计。利用这些统计数据,可以提供可靠性的定量指示,以及从关系网络数据中得出的秘密组织领导的国防情报估计。我们提供了为本实验创建的特定情况的查找表,从中可以粗略地估计其他条件。这项工作对业务分析人员和此类分析的消费者具有高度的实际意义,特别是在恐怖主义网络和毒品贩运领域。这项工作也为开发其他网络相关的更复杂的可靠性估计奠定了基础,分析人员的分析任务-从更广泛的关键角色识别任务到评估中心性度量本身的统计可靠性。
{"title":"Information assurances and threat identification in networked organizations","authors":"Terrill L. Frantz, Kathleen M. Carley","doi":"10.1109/CISDA.2009.5356532","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356532","url":null,"abstract":"We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved cellular social-networks with four types of data error: missing links, missing actors, extra links, and extra actors. We provide statistical results for top threat identification from the perspective of four traditional measures of network centrality: degree, betweenness, closeness and eigenvector. The results from our experiment provide a statistical estimate of the accuracy of the top-1 and top-3 actors as indicated by the observed data. Using these statistics a quantitative indication of reliability can be provided along with defence intelligence estimates of covert-organization leadership derived from relational network data. We provide lookup tables for the specific situations created for this experiment, from which other conditions may be loosely estimated. This work has highly practical implications for operational analysts and consumers of such analyses, particularly in the terrorist network and drug-trafficking domains. This work also lays the groundwork for developing more intricate estimates of reliability for other network-related, analytic tasks of analysts — from more extensive key-actor identification tasks to assessing the statistical reliability of the centrality measures in and of themselves.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"24 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77827768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
mTRACK - Monitoring time-varying relations in approximately categorised knowledge 监测近似分类知识的时变关系
T. Martin, Yun Shen
Recent initiatives in defence related information systems have emphasised the need to bring together information from multiple sources and fuse it into a form suitable for decision makers. This paper outlines a four stage system for fusing unstructured and semi-structured text and numerical data by extraction of entities and relations, identification of duplicate entities, organisation into the most appropriate hierarchical categories and determination of relations between fuzzy categories. The novel contribution of this paper is in the final stage of the process, where we determine associations between fuzzy categories and identify strong and/or unusual levels of association as well as changes over time. A demonstrator application shows how information on terrorist incidents from multiple sources can be integrated and monitored.
最近有关国防信息系统的倡议强调需要汇集来自多种来源的信息,并将其融合成适合决策者的形式。本文概述了一个四阶段系统,通过提取实体和关系、识别重复实体、组织成最合适的层次类别和确定模糊类别之间的关系来融合非结构化和半结构化文本和数字数据。本文的新贡献是在过程的最后阶段,在那里我们确定模糊类别之间的关联,并确定强和/或不寻常的关联水平以及随时间的变化。演示应用程序展示了如何集成和监视来自多个来源的关于恐怖事件的信息。
{"title":"mTRACK - Monitoring time-varying relations in approximately categorised knowledge","authors":"T. Martin, Yun Shen","doi":"10.1109/CISDA.2009.5356563","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356563","url":null,"abstract":"Recent initiatives in defence related information systems have emphasised the need to bring together information from multiple sources and fuse it into a form suitable for decision makers. This paper outlines a four stage system for fusing unstructured and semi-structured text and numerical data by extraction of entities and relations, identification of duplicate entities, organisation into the most appropriate hierarchical categories and determination of relations between fuzzy categories. The novel contribution of this paper is in the final stage of the process, where we determine associations between fuzzy categories and identify strong and/or unusual levels of association as well as changes over time. A demonstrator application shows how information on terrorist incidents from multiple sources can be integrated and monitored.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"3 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89045655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multisensor-multitarget tracking testbed 多传感器-多目标跟踪试验台
D. Akselrod, R. Tharmarasa, T. Kirubarajan, Z. Ding, T. Ponsford
In this paper we present a multisensor-multitarget tracking testbed for large-scale distributed scenarios. The objective is to develop a testbed capable of handling multiple, heterogeneous sensors in a hierarchical architecture for maritime surveillance. The testbed consists of a scenario generator that can generate simulated data from multiple sensors including radar, sonar, IR and ESM as well as a tracker framework into which different tracking algorithms can be integrated. In the current stage of the project, the IMM/Assignment tracker, and the Particle Filter (PF) tracker are implemented in a distributed architecture and some preliminary results are obtained. Other trackers like the Multiple Hypothesis Tracker (MHT) are also planned for the future.
本文提出了一种适用于大规模分布式场景的多传感器多目标跟踪试验台。目标是开发一个能够在分层结构中处理多个异构传感器的测试平台,用于海上监视。该测试平台包括一个场景生成器,可以从多个传感器(包括雷达、声纳、红外和ESM)生成模拟数据,以及一个跟踪框架,其中可以集成不同的跟踪算法。在项目的当前阶段,在分布式架构中实现了IMM/Assignment跟踪器和Particle Filter (PF)跟踪器,并获得了一些初步的结果。其他跟踪器,如多重假设跟踪器(MHT)也计划在未来使用。
{"title":"Multisensor-multitarget tracking testbed","authors":"D. Akselrod, R. Tharmarasa, T. Kirubarajan, Z. Ding, T. Ponsford","doi":"10.1109/CISDA.2009.5356526","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356526","url":null,"abstract":"In this paper we present a multisensor-multitarget tracking testbed for large-scale distributed scenarios. The objective is to develop a testbed capable of handling multiple, heterogeneous sensors in a hierarchical architecture for maritime surveillance. The testbed consists of a scenario generator that can generate simulated data from multiple sensors including radar, sonar, IR and ESM as well as a tracker framework into which different tracking algorithms can be integrated. In the current stage of the project, the IMM/Assignment tracker, and the Particle Filter (PF) tracker are implemented in a distributed architecture and some preliminary results are obtained. Other trackers like the Multiple Hypothesis Tracker (MHT) are also planned for the future.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86589504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Passive multitarget tracking using transmitters of opportunity 利用机会发射器进行被动多目标跟踪
R. Tharmarasa, T. Kirubarajan, M. McDonald
Passive Coherent Location (PCL), which uses commercial signals (e.g., FM broadcast, digital TV) as illuminators of opportunity, is an emerging technology in air defense systems. The advantages of PCL are low cost, low vulnerability to electronic counter measures, early detection of stealthy targets and low-altitude detection. However, limitations of PCL include lack of control over illuminators, limited observability and poor detection due to low Signal-to-Noise Ratio (SNR). This leads to high clutter with low probability of detection of target of interest. In this paper, multiple target tracking algorithms for PCL systems are analyzed to handle low probability of detection and high nonlinearity in the measurement model due to high measurement error. The converted measurement Kalman filter, unscented Kalman filter and particle filter based PHD filter are implemented and compared for PCL radar systems. The feasibility of using transmitters of opportunity for tracking airborne targets is shown on simulated and real data sets.
无源相干定位(PCL),利用商业信号(例如,调频广播,数字电视)作为照明机会,是防空系统中的一项新兴技术。PCL的优点是成本低,对电子对抗的脆弱性低,对隐身目标的早期发现和低空探测。然而,PCL的局限性包括缺乏对光源的控制,有限的可观测性以及由于低信噪比(SNR)而导致的较差的检测。这导致高杂波和低概率检测目标感兴趣。本文分析了PCL系统的多目标跟踪算法,以解决低检测概率和测量模型因测量误差大而产生的高非线性问题。在PCL雷达系统中实现了转换测量卡尔曼滤波器、无气味卡尔曼滤波器和基于粒子滤波的PHD滤波器,并进行了比较。仿真数据和实际数据表明了利用机会变送器跟踪机载目标的可行性。
{"title":"Passive multitarget tracking using transmitters of opportunity","authors":"R. Tharmarasa, T. Kirubarajan, M. McDonald","doi":"10.1109/CISDA.2009.5356536","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356536","url":null,"abstract":"Passive Coherent Location (PCL), which uses commercial signals (e.g., FM broadcast, digital TV) as illuminators of opportunity, is an emerging technology in air defense systems. The advantages of PCL are low cost, low vulnerability to electronic counter measures, early detection of stealthy targets and low-altitude detection. However, limitations of PCL include lack of control over illuminators, limited observability and poor detection due to low Signal-to-Noise Ratio (SNR). This leads to high clutter with low probability of detection of target of interest. In this paper, multiple target tracking algorithms for PCL systems are analyzed to handle low probability of detection and high nonlinearity in the measurement model due to high measurement error. The converted measurement Kalman filter, unscented Kalman filter and particle filter based PHD filter are implemented and compared for PCL radar systems. The feasibility of using transmitters of opportunity for tracking airborne targets is shown on simulated and real data sets.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"91 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74207011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Bio-inspired computing for launch vehicle design and trajectory optimization 运载火箭设计与轨迹优化的仿生计算
S. Sundaram, Hai-Jun Rong, N. Sundararajan
This paper presents an optimization tool for launch vehicle design and trajectory optimization using bio-inspired computing algorithms and nonlinear programming. The objective is to size a launch vehicle such that the payload to lift-of-weight ratio is maximized (i.e the lift off weight is a minimum). Here, the staging problem is solved using Particle Swarm Optimization (PSO) method. With the above vehicle, an optimal trajectory is arrived at using a Real-Coded Genetic Algorithm (RCGA) and solving a nonlinear programming (NLP) by the direct shooting method. The solutions from PSO and RCGA are used for initialization of NLP variables. A case study is carried out that establishes the advantage of the proposed approach.
本文提出了一种基于仿生计算算法和非线性规划的运载火箭设计和轨迹优化工具。目标是确定运载火箭的尺寸,使有效载荷与升力重量比最大化(即发射重量最小)。在此,采用粒子群优化(PSO)方法求解分期问题。利用实数编码遗传算法(RCGA)和直接射击法求解非线性规划(NLP),得到了该飞行器的最优轨迹。利用PSO和RCGA的解对NLP变量进行初始化。通过一个案例研究,证明了该方法的优越性。
{"title":"Bio-inspired computing for launch vehicle design and trajectory optimization","authors":"S. Sundaram, Hai-Jun Rong, N. Sundararajan","doi":"10.1109/CISDA.2009.5356548","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356548","url":null,"abstract":"This paper presents an optimization tool for launch vehicle design and trajectory optimization using bio-inspired computing algorithms and nonlinear programming. The objective is to size a launch vehicle such that the payload to lift-of-weight ratio is maximized (i.e the lift off weight is a minimum). Here, the staging problem is solved using Particle Swarm Optimization (PSO) method. With the above vehicle, an optimal trajectory is arrived at using a Real-Coded Genetic Algorithm (RCGA) and solving a nonlinear programming (NLP) by the direct shooting method. The solutions from PSO and RCGA are used for initialization of NLP variables. A case study is carried out that establishes the advantage of the proposed approach.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"30 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85645536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection 异常检测中HMM参数在线增量学习技术的比较
Wael Khreich, Eric Granger, A. Miri, R. Sabourin
Hidden Markov Models (HMMs) have been shown to provide a high level performance for detecting anomalies in intrusion detection systems. Since incomplete training data is always employed in practice, and environments being monitored are susceptible to changes, a system for anomaly detection should update its HMM parameters in response to new training data from the environment. Several techniques have been proposed in literature for on-line learning of HMM parameters. However, the theoretical convergence of these algorithms is based on an infinite stream of data for optimal performances. When learning sequences with a finite length, on-line incremental versions of these algorithms can improve discrimination by allowing for convergence over several training iterations. In this paper, the performance of these techniques is compared for learning new sequences of training data in host-based intrusion detection. The discrimination of HMMs trained with different techniques is assessed from data corresponding to sequences of system calls to the operating system kernel. In addition, the resource requirements are assessed through an analysis of time and memory complexity. Results suggest that the techniques for online incremental learning of HMM parameters can provide a higher level of discrimination than those for on-line learning, yet require significantly fewer resources than with batch training. On-line incremental learning techniques may provide a promising solution for adaptive intrusion detection systems.
隐马尔可夫模型(hmm)在入侵检测系统中的异常检测方面具有很高的性能。由于在实践中总是使用不完整的训练数据,并且被监测的环境容易发生变化,因此异常检测系统应该根据来自环境的新训练数据更新其HMM参数。文献中提出了几种在线学习HMM参数的技术。然而,这些算法的理论收敛是基于无限数据流的最优性能。当学习有限长度的序列时,这些算法的在线增量版本可以通过允许几个训练迭代的收敛来提高识别能力。在本文中,比较了这些技术在基于主机的入侵检测中学习新训练数据序列的性能。通过对操作系统内核的系统调用序列对应的数据,评估了用不同技术训练的hmm的识别能力。此外,通过对时间和内存复杂性的分析来评估资源需求。结果表明,HMM参数的在线增量学习技术可以提供比在线学习技术更高的识别水平,但所需的资源明显少于批量训练技术。在线增量学习技术为自适应入侵检测系统提供了一种很有前途的解决方案。
{"title":"A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection","authors":"Wael Khreich, Eric Granger, A. Miri, R. Sabourin","doi":"10.1109/CISDA.2009.5356542","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356542","url":null,"abstract":"Hidden Markov Models (HMMs) have been shown to provide a high level performance for detecting anomalies in intrusion detection systems. Since incomplete training data is always employed in practice, and environments being monitored are susceptible to changes, a system for anomaly detection should update its HMM parameters in response to new training data from the environment. Several techniques have been proposed in literature for on-line learning of HMM parameters. However, the theoretical convergence of these algorithms is based on an infinite stream of data for optimal performances. When learning sequences with a finite length, on-line incremental versions of these algorithms can improve discrimination by allowing for convergence over several training iterations. In this paper, the performance of these techniques is compared for learning new sequences of training data in host-based intrusion detection. The discrimination of HMMs trained with different techniques is assessed from data corresponding to sequences of system calls to the operating system kernel. In addition, the resource requirements are assessed through an analysis of time and memory complexity. Results suggest that the techniques for online incremental learning of HMM parameters can provide a higher level of discrimination than those for on-line learning, yet require significantly fewer resources than with batch training. On-line incremental learning techniques may provide a promising solution for adaptive intrusion detection systems.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79547493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Joint path planning and sensor subset selection for multistatic sensor networks 多静态传感器网络的联合路径规划与传感器子集选择
R. Tharmarasa, T. Kirubarajan, T. Lang
Since inexpensive passive sensors have become available, it is possible to deploy a large number of them for tracking purposes in Anti-Submarine Warfare (ASW). However, modern submarines are quiet and difficult to track with passive sensors alone. Multistatic sensor networks, which have few transmitters (e.g., dipping sonars) in addition to passive receivers (e.g., sonobouys), have the potential to improve the tracking performance. The performance can be improved further by moving the transmitters according to existing target states and any possible new target states. Even though a large number of passive sensors are available, due to frequency, processing power and other physical limitations, only a few of them can be used at any one time. Then the problems are to decide the path of the transmitters and select a subset from the available passive sensors in order to optimize the tracking performance. In this paper, the Posterior Crame´r-Rao Lower Bound (PCRLB), which gives a lower bound on estimation uncertainty, is used as the performance measure. An algorithm is presented to decide jointly the optimal path of the movable transmitters, by considering transmitters' operational constraints, and the optimal subset of passive sensors that should be used at each time steps for tracking multiple, possibly time-varying, number of targets. The effect of sensor location uncertainties, due to deployment error and possible sensor drifting, on the tracking performance is addressed in the sensor management algorithm. Simulation results illustrating the performance of the proposed algorithm are presented.
由于廉价的无源传感器已经可用,在反潜战(ASW)中有可能部署大量用于跟踪目的。然而,现代潜艇非常安静,仅靠被动传感器很难跟踪。多静态传感器网络除了无源接收器(如声呐系统)外,还具有很少的发射器(如浸入式声呐系统),具有改善跟踪性能的潜力。通过根据现有目标状态和任何可能的新目标状态移动发射机,可以进一步提高性能。尽管有大量的无源传感器可用,但由于频率、处理能力和其他物理限制,每次只能使用其中的少数。接下来的问题是确定发射器的路径,并从可用的无源传感器中选择一个子集,以优化跟踪性能。本文采用给出估计不确定性下界的后验Crame´r-Rao下界(PCRLB)作为性能度量。在考虑发射机运行约束的基础上,提出了一种联合确定移动发射机最优路径的算法,并在每个时间步长中确定用于跟踪多个时变目标的无源传感器的最优子集。在传感器管理算法中,解决了由于部署误差和可能的传感器漂移导致的传感器位置不确定性对跟踪性能的影响。仿真结果说明了该算法的性能。
{"title":"Joint path planning and sensor subset selection for multistatic sensor networks","authors":"R. Tharmarasa, T. Kirubarajan, T. Lang","doi":"10.1117/12.779217","DOIUrl":"https://doi.org/10.1117/12.779217","url":null,"abstract":"Since inexpensive passive sensors have become available, it is possible to deploy a large number of them for tracking purposes in Anti-Submarine Warfare (ASW). However, modern submarines are quiet and difficult to track with passive sensors alone. Multistatic sensor networks, which have few transmitters (e.g., dipping sonars) in addition to passive receivers (e.g., sonobouys), have the potential to improve the tracking performance. The performance can be improved further by moving the transmitters according to existing target states and any possible new target states. Even though a large number of passive sensors are available, due to frequency, processing power and other physical limitations, only a few of them can be used at any one time. Then the problems are to decide the path of the transmitters and select a subset from the available passive sensors in order to optimize the tracking performance. In this paper, the Posterior Crame´r-Rao Lower Bound (PCRLB), which gives a lower bound on estimation uncertainty, is used as the performance measure. An algorithm is presented to decide jointly the optimal path of the movable transmitters, by considering transmitters' operational constraints, and the optimal subset of passive sensors that should be used at each time steps for tracking multiple, possibly time-varying, number of targets. The effect of sensor location uncertainties, due to deployment error and possible sensor drifting, on the tracking performance is addressed in the sensor management algorithm. Simulation results illustrating the performance of the proposed algorithm are presented.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"3 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80859280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Template-based Method for Force Group Classification in Situation Assessment 态势评估中基于模板的部队群分类方法
Huimin Chai, Baoshu Wang
{"title":"A Template-based Method for Force Group Classification in Situation Assessment","authors":"Huimin Chai, Baoshu Wang","doi":"10.1109/CISDA.2007.368139","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368139","url":null,"abstract":"","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"61 1","pages":"85-91"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81123198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1