首页 > 最新文献

2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications最新文献

英文 中文
An optimisation model for airlift load planning: Galahad and the quest for the ‘holy grail’ 空运负荷规划的优化模型:加拉哈德和对“圣杯”的追求
Bohdan L. Kaluzny, R. H. A. D. Shaw, A. Ghanmi, Beomjoon Kim
This paper presents an aircraft load allocation optimisation model, which uses a hybrid of simulated annealing and genetic algorithm methods to solve a multi-objective optimisation problem associated with allocating a set of cargo items across a heterogeneous fleet of available airlift assets. It represents candidate solutions using macrochromosomes comprised of an ordered list of available transport assets followed by an ordered list of cargo items. A bin packing heuristic is used to map each individual to a point in asset-utilization space where a novel convex hull based fitness function is used to evaluate the relative quality of each individual and drive an elitist application of genetic operators on the population-including a novel extinction operation that infrequently culls solutions comprising of aircraft chalks that cannot be load balanced. Proof of concept computational results are presented.
本文提出了一种飞机负载分配优化模型,该模型使用模拟退火和遗传算法的混合方法来解决与在可用空运资产的异构机队中分配一组货物相关的多目标优化问题。它使用macrochromosome表示候选解决方案,macrochromosome由可用运输资产的有序列表和货物项的有序列表组成。装箱启发式用于将每个个体映射到资产利用空间中的一个点,其中使用基于新凸壳的适应度函数来评估每个个体的相对质量,并驱动种群上遗传算子的精英应用-包括一种新的灭绝操作,该操作很少剔除由无法负载平衡的飞机粉笔组成的解决方案。给出了概念验证的计算结果。
{"title":"An optimisation model for airlift load planning: Galahad and the quest for the ‘holy grail’","authors":"Bohdan L. Kaluzny, R. H. A. D. Shaw, A. Ghanmi, Beomjoon Kim","doi":"10.1109/CISDA.2009.5356562","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356562","url":null,"abstract":"This paper presents an aircraft load allocation optimisation model, which uses a hybrid of simulated annealing and genetic algorithm methods to solve a multi-objective optimisation problem associated with allocating a set of cargo items across a heterogeneous fleet of available airlift assets. It represents candidate solutions using macrochromosomes comprised of an ordered list of available transport assets followed by an ordered list of cargo items. A bin packing heuristic is used to map each individual to a point in asset-utilization space where a novel convex hull based fitness function is used to evaluate the relative quality of each individual and drive an elitist application of genetic operators on the population-including a novel extinction operation that infrequently culls solutions comprising of aircraft chalks that cannot be load balanced. Proof of concept computational results are presented.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"46 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79117895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior 使用基于粒子群的合作行为学习测试港口巡逻和拦截策略
T. Flanagan, C. Thornton, J. Denzinger
We present a general scheme for testing multiagent systems, respectively policies used by them, for unwanted emergent behavior using learning of cooperative behavior via particle swarm systems. By using particle swarm systems in this setting, we are able to create agents interacting/attacking the tested agents that can use parameterised high-level actions. We also can evaluate the quality of an attack using several measures that can be prioritised and used in a multi-objective manner in the search. This solves some general problems of other testing approaches using learning. We instantiate this general scheme to test harbour patrol and interception policies for two Canadian harbours, showing that our approach is able to find problems in these policies.
我们提出了一种测试多智能体系统的通用方案,分别使用它们使用的策略,通过粒子群系统学习合作行为来测试不必要的紧急行为。通过在此设置中使用粒子群系统,我们能够创建交互/攻击可以使用参数化高级操作的被测试代理的代理。我们还可以使用几种方法来评估攻击的质量,这些方法可以在搜索中以多目标的方式进行优先排序和使用。这解决了使用学习的其他测试方法的一些一般问题。我们实例化了这个通用方案来测试两个加拿大港口的港口巡逻和拦截政策,表明我们的方法能够发现这些政策中的问题。
{"title":"Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior","authors":"T. Flanagan, C. Thornton, J. Denzinger","doi":"10.1109/CISDA.2009.5356561","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356561","url":null,"abstract":"We present a general scheme for testing multiagent systems, respectively policies used by them, for unwanted emergent behavior using learning of cooperative behavior via particle swarm systems. By using particle swarm systems in this setting, we are able to create agents interacting/attacking the tested agents that can use parameterised high-level actions. We also can evaluate the quality of an attack using several measures that can be prioritised and used in a multi-objective manner in the search. This solves some general problems of other testing approaches using learning. We instantiate this general scheme to test harbour patrol and interception policies for two Canadian harbours, showing that our approach is able to find problems in these policies.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"74 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88955616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Information assurances and threat identification in networked organizations 网络组织中的信息保障与威胁识别
Terrill L. Frantz, Kathleen M. Carley
We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved cellular social-networks with four types of data error: missing links, missing actors, extra links, and extra actors. We provide statistical results for top threat identification from the perspective of four traditional measures of network centrality: degree, betweenness, closeness and eigenvector. The results from our experiment provide a statistical estimate of the accuracy of the top-1 and top-3 actors as indicated by the observed data. Using these statistics a quantitative indication of reliability can be provided along with defence intelligence estimates of covert-organization leadership derived from relational network data. We provide lookup tables for the specific situations created for this experiment, from which other conditions may be loosely estimated. This work has highly practical implications for operational analysts and consumers of such analyses, particularly in the terrorist network and drug-trafficking domains. This work also lays the groundwork for developing more intricate estimates of reliability for other network-related, analytic tasks of analysts — from more extensive key-actor identification tasks to assessing the statistical reliability of the centrality measures in and of themselves.
我们提出了一份关于控制实验的简要报告,该实验为参与威胁识别的面向网络的防御分析师提供了有价值的统计数据。这些统计数据估计了顶级中心参与者发现的准确性,这些发现来自通常在现实世界数据集中发现的关系数据,例如在分布式、隐蔽组织中收集的数据。我们的实验涉及有四种类型数据错误的蜂窝社交网络:缺失链接、缺失参与者、额外链接和额外参与者。我们从网络中心性的四个传统度量(度、中间度、接近度和特征向量)的角度提供了顶级威胁识别的统计结果。我们的实验结果提供了观测数据所表明的top-1和top-3行动者的准确性的统计估计。利用这些统计数据,可以提供可靠性的定量指示,以及从关系网络数据中得出的秘密组织领导的国防情报估计。我们提供了为本实验创建的特定情况的查找表,从中可以粗略地估计其他条件。这项工作对业务分析人员和此类分析的消费者具有高度的实际意义,特别是在恐怖主义网络和毒品贩运领域。这项工作也为开发其他网络相关的更复杂的可靠性估计奠定了基础,分析人员的分析任务-从更广泛的关键角色识别任务到评估中心性度量本身的统计可靠性。
{"title":"Information assurances and threat identification in networked organizations","authors":"Terrill L. Frantz, Kathleen M. Carley","doi":"10.1109/CISDA.2009.5356532","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356532","url":null,"abstract":"We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved cellular social-networks with four types of data error: missing links, missing actors, extra links, and extra actors. We provide statistical results for top threat identification from the perspective of four traditional measures of network centrality: degree, betweenness, closeness and eigenvector. The results from our experiment provide a statistical estimate of the accuracy of the top-1 and top-3 actors as indicated by the observed data. Using these statistics a quantitative indication of reliability can be provided along with defence intelligence estimates of covert-organization leadership derived from relational network data. We provide lookup tables for the specific situations created for this experiment, from which other conditions may be loosely estimated. This work has highly practical implications for operational analysts and consumers of such analyses, particularly in the terrorist network and drug-trafficking domains. This work also lays the groundwork for developing more intricate estimates of reliability for other network-related, analytic tasks of analysts — from more extensive key-actor identification tasks to assessing the statistical reliability of the centrality measures in and of themselves.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"24 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77827768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
mTRACK - Monitoring time-varying relations in approximately categorised knowledge 监测近似分类知识的时变关系
T. Martin, Yun Shen
Recent initiatives in defence related information systems have emphasised the need to bring together information from multiple sources and fuse it into a form suitable for decision makers. This paper outlines a four stage system for fusing unstructured and semi-structured text and numerical data by extraction of entities and relations, identification of duplicate entities, organisation into the most appropriate hierarchical categories and determination of relations between fuzzy categories. The novel contribution of this paper is in the final stage of the process, where we determine associations between fuzzy categories and identify strong and/or unusual levels of association as well as changes over time. A demonstrator application shows how information on terrorist incidents from multiple sources can be integrated and monitored.
最近有关国防信息系统的倡议强调需要汇集来自多种来源的信息,并将其融合成适合决策者的形式。本文概述了一个四阶段系统,通过提取实体和关系、识别重复实体、组织成最合适的层次类别和确定模糊类别之间的关系来融合非结构化和半结构化文本和数字数据。本文的新贡献是在过程的最后阶段,在那里我们确定模糊类别之间的关联,并确定强和/或不寻常的关联水平以及随时间的变化。演示应用程序展示了如何集成和监视来自多个来源的关于恐怖事件的信息。
{"title":"mTRACK - Monitoring time-varying relations in approximately categorised knowledge","authors":"T. Martin, Yun Shen","doi":"10.1109/CISDA.2009.5356563","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356563","url":null,"abstract":"Recent initiatives in defence related information systems have emphasised the need to bring together information from multiple sources and fuse it into a form suitable for decision makers. This paper outlines a four stage system for fusing unstructured and semi-structured text and numerical data by extraction of entities and relations, identification of duplicate entities, organisation into the most appropriate hierarchical categories and determination of relations between fuzzy categories. The novel contribution of this paper is in the final stage of the process, where we determine associations between fuzzy categories and identify strong and/or unusual levels of association as well as changes over time. A demonstrator application shows how information on terrorist incidents from multiple sources can be integrated and monitored.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"3 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89045655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multisensor-multitarget tracking testbed 多传感器-多目标跟踪试验台
D. Akselrod, R. Tharmarasa, T. Kirubarajan, Z. Ding, T. Ponsford
In this paper we present a multisensor-multitarget tracking testbed for large-scale distributed scenarios. The objective is to develop a testbed capable of handling multiple, heterogeneous sensors in a hierarchical architecture for maritime surveillance. The testbed consists of a scenario generator that can generate simulated data from multiple sensors including radar, sonar, IR and ESM as well as a tracker framework into which different tracking algorithms can be integrated. In the current stage of the project, the IMM/Assignment tracker, and the Particle Filter (PF) tracker are implemented in a distributed architecture and some preliminary results are obtained. Other trackers like the Multiple Hypothesis Tracker (MHT) are also planned for the future.
本文提出了一种适用于大规模分布式场景的多传感器多目标跟踪试验台。目标是开发一个能够在分层结构中处理多个异构传感器的测试平台,用于海上监视。该测试平台包括一个场景生成器,可以从多个传感器(包括雷达、声纳、红外和ESM)生成模拟数据,以及一个跟踪框架,其中可以集成不同的跟踪算法。在项目的当前阶段,在分布式架构中实现了IMM/Assignment跟踪器和Particle Filter (PF)跟踪器,并获得了一些初步的结果。其他跟踪器,如多重假设跟踪器(MHT)也计划在未来使用。
{"title":"Multisensor-multitarget tracking testbed","authors":"D. Akselrod, R. Tharmarasa, T. Kirubarajan, Z. Ding, T. Ponsford","doi":"10.1109/CISDA.2009.5356526","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356526","url":null,"abstract":"In this paper we present a multisensor-multitarget tracking testbed for large-scale distributed scenarios. The objective is to develop a testbed capable of handling multiple, heterogeneous sensors in a hierarchical architecture for maritime surveillance. The testbed consists of a scenario generator that can generate simulated data from multiple sensors including radar, sonar, IR and ESM as well as a tracker framework into which different tracking algorithms can be integrated. In the current stage of the project, the IMM/Assignment tracker, and the Particle Filter (PF) tracker are implemented in a distributed architecture and some preliminary results are obtained. Other trackers like the Multiple Hypothesis Tracker (MHT) are also planned for the future.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86589504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Passive multitarget tracking using transmitters of opportunity 利用机会发射器进行被动多目标跟踪
R. Tharmarasa, T. Kirubarajan, M. McDonald
Passive Coherent Location (PCL), which uses commercial signals (e.g., FM broadcast, digital TV) as illuminators of opportunity, is an emerging technology in air defense systems. The advantages of PCL are low cost, low vulnerability to electronic counter measures, early detection of stealthy targets and low-altitude detection. However, limitations of PCL include lack of control over illuminators, limited observability and poor detection due to low Signal-to-Noise Ratio (SNR). This leads to high clutter with low probability of detection of target of interest. In this paper, multiple target tracking algorithms for PCL systems are analyzed to handle low probability of detection and high nonlinearity in the measurement model due to high measurement error. The converted measurement Kalman filter, unscented Kalman filter and particle filter based PHD filter are implemented and compared for PCL radar systems. The feasibility of using transmitters of opportunity for tracking airborne targets is shown on simulated and real data sets.
无源相干定位(PCL),利用商业信号(例如,调频广播,数字电视)作为照明机会,是防空系统中的一项新兴技术。PCL的优点是成本低,对电子对抗的脆弱性低,对隐身目标的早期发现和低空探测。然而,PCL的局限性包括缺乏对光源的控制,有限的可观测性以及由于低信噪比(SNR)而导致的较差的检测。这导致高杂波和低概率检测目标感兴趣。本文分析了PCL系统的多目标跟踪算法,以解决低检测概率和测量模型因测量误差大而产生的高非线性问题。在PCL雷达系统中实现了转换测量卡尔曼滤波器、无气味卡尔曼滤波器和基于粒子滤波的PHD滤波器,并进行了比较。仿真数据和实际数据表明了利用机会变送器跟踪机载目标的可行性。
{"title":"Passive multitarget tracking using transmitters of opportunity","authors":"R. Tharmarasa, T. Kirubarajan, M. McDonald","doi":"10.1109/CISDA.2009.5356536","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356536","url":null,"abstract":"Passive Coherent Location (PCL), which uses commercial signals (e.g., FM broadcast, digital TV) as illuminators of opportunity, is an emerging technology in air defense systems. The advantages of PCL are low cost, low vulnerability to electronic counter measures, early detection of stealthy targets and low-altitude detection. However, limitations of PCL include lack of control over illuminators, limited observability and poor detection due to low Signal-to-Noise Ratio (SNR). This leads to high clutter with low probability of detection of target of interest. In this paper, multiple target tracking algorithms for PCL systems are analyzed to handle low probability of detection and high nonlinearity in the measurement model due to high measurement error. The converted measurement Kalman filter, unscented Kalman filter and particle filter based PHD filter are implemented and compared for PCL radar systems. The feasibility of using transmitters of opportunity for tracking airborne targets is shown on simulated and real data sets.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"91 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74207011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Bio-inspired computing for launch vehicle design and trajectory optimization 运载火箭设计与轨迹优化的仿生计算
S. Sundaram, Hai-Jun Rong, N. Sundararajan
This paper presents an optimization tool for launch vehicle design and trajectory optimization using bio-inspired computing algorithms and nonlinear programming. The objective is to size a launch vehicle such that the payload to lift-of-weight ratio is maximized (i.e the lift off weight is a minimum). Here, the staging problem is solved using Particle Swarm Optimization (PSO) method. With the above vehicle, an optimal trajectory is arrived at using a Real-Coded Genetic Algorithm (RCGA) and solving a nonlinear programming (NLP) by the direct shooting method. The solutions from PSO and RCGA are used for initialization of NLP variables. A case study is carried out that establishes the advantage of the proposed approach.
本文提出了一种基于仿生计算算法和非线性规划的运载火箭设计和轨迹优化工具。目标是确定运载火箭的尺寸,使有效载荷与升力重量比最大化(即发射重量最小)。在此,采用粒子群优化(PSO)方法求解分期问题。利用实数编码遗传算法(RCGA)和直接射击法求解非线性规划(NLP),得到了该飞行器的最优轨迹。利用PSO和RCGA的解对NLP变量进行初始化。通过一个案例研究,证明了该方法的优越性。
{"title":"Bio-inspired computing for launch vehicle design and trajectory optimization","authors":"S. Sundaram, Hai-Jun Rong, N. Sundararajan","doi":"10.1109/CISDA.2009.5356548","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356548","url":null,"abstract":"This paper presents an optimization tool for launch vehicle design and trajectory optimization using bio-inspired computing algorithms and nonlinear programming. The objective is to size a launch vehicle such that the payload to lift-of-weight ratio is maximized (i.e the lift off weight is a minimum). Here, the staging problem is solved using Particle Swarm Optimization (PSO) method. With the above vehicle, an optimal trajectory is arrived at using a Real-Coded Genetic Algorithm (RCGA) and solving a nonlinear programming (NLP) by the direct shooting method. The solutions from PSO and RCGA are used for initialization of NLP variables. A case study is carried out that establishes the advantage of the proposed approach.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"30 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85645536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection 异常检测中HMM参数在线增量学习技术的比较
Wael Khreich, Eric Granger, A. Miri, R. Sabourin
Hidden Markov Models (HMMs) have been shown to provide a high level performance for detecting anomalies in intrusion detection systems. Since incomplete training data is always employed in practice, and environments being monitored are susceptible to changes, a system for anomaly detection should update its HMM parameters in response to new training data from the environment. Several techniques have been proposed in literature for on-line learning of HMM parameters. However, the theoretical convergence of these algorithms is based on an infinite stream of data for optimal performances. When learning sequences with a finite length, on-line incremental versions of these algorithms can improve discrimination by allowing for convergence over several training iterations. In this paper, the performance of these techniques is compared for learning new sequences of training data in host-based intrusion detection. The discrimination of HMMs trained with different techniques is assessed from data corresponding to sequences of system calls to the operating system kernel. In addition, the resource requirements are assessed through an analysis of time and memory complexity. Results suggest that the techniques for online incremental learning of HMM parameters can provide a higher level of discrimination than those for on-line learning, yet require significantly fewer resources than with batch training. On-line incremental learning techniques may provide a promising solution for adaptive intrusion detection systems.
隐马尔可夫模型(hmm)在入侵检测系统中的异常检测方面具有很高的性能。由于在实践中总是使用不完整的训练数据,并且被监测的环境容易发生变化,因此异常检测系统应该根据来自环境的新训练数据更新其HMM参数。文献中提出了几种在线学习HMM参数的技术。然而,这些算法的理论收敛是基于无限数据流的最优性能。当学习有限长度的序列时,这些算法的在线增量版本可以通过允许几个训练迭代的收敛来提高识别能力。在本文中,比较了这些技术在基于主机的入侵检测中学习新训练数据序列的性能。通过对操作系统内核的系统调用序列对应的数据,评估了用不同技术训练的hmm的识别能力。此外,通过对时间和内存复杂性的分析来评估资源需求。结果表明,HMM参数的在线增量学习技术可以提供比在线学习技术更高的识别水平,但所需的资源明显少于批量训练技术。在线增量学习技术为自适应入侵检测系统提供了一种很有前途的解决方案。
{"title":"A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection","authors":"Wael Khreich, Eric Granger, A. Miri, R. Sabourin","doi":"10.1109/CISDA.2009.5356542","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356542","url":null,"abstract":"Hidden Markov Models (HMMs) have been shown to provide a high level performance for detecting anomalies in intrusion detection systems. Since incomplete training data is always employed in practice, and environments being monitored are susceptible to changes, a system for anomaly detection should update its HMM parameters in response to new training data from the environment. Several techniques have been proposed in literature for on-line learning of HMM parameters. However, the theoretical convergence of these algorithms is based on an infinite stream of data for optimal performances. When learning sequences with a finite length, on-line incremental versions of these algorithms can improve discrimination by allowing for convergence over several training iterations. In this paper, the performance of these techniques is compared for learning new sequences of training data in host-based intrusion detection. The discrimination of HMMs trained with different techniques is assessed from data corresponding to sequences of system calls to the operating system kernel. In addition, the resource requirements are assessed through an analysis of time and memory complexity. Results suggest that the techniques for online incremental learning of HMM parameters can provide a higher level of discrimination than those for on-line learning, yet require significantly fewer resources than with batch training. On-line incremental learning techniques may provide a promising solution for adaptive intrusion detection systems.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79547493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Joint path planning and sensor subset selection for multistatic sensor networks 多静态传感器网络的联合路径规划与传感器子集选择
R. Tharmarasa, T. Kirubarajan, T. Lang
Since inexpensive passive sensors have become available, it is possible to deploy a large number of them for tracking purposes in Anti-Submarine Warfare (ASW). However, modern submarines are quiet and difficult to track with passive sensors alone. Multistatic sensor networks, which have few transmitters (e.g., dipping sonars) in addition to passive receivers (e.g., sonobouys), have the potential to improve the tracking performance. The performance can be improved further by moving the transmitters according to existing target states and any possible new target states. Even though a large number of passive sensors are available, due to frequency, processing power and other physical limitations, only a few of them can be used at any one time. Then the problems are to decide the path of the transmitters and select a subset from the available passive sensors in order to optimize the tracking performance. In this paper, the Posterior Crame´r-Rao Lower Bound (PCRLB), which gives a lower bound on estimation uncertainty, is used as the performance measure. An algorithm is presented to decide jointly the optimal path of the movable transmitters, by considering transmitters' operational constraints, and the optimal subset of passive sensors that should be used at each time steps for tracking multiple, possibly time-varying, number of targets. The effect of sensor location uncertainties, due to deployment error and possible sensor drifting, on the tracking performance is addressed in the sensor management algorithm. Simulation results illustrating the performance of the proposed algorithm are presented.
由于廉价的无源传感器已经可用,在反潜战(ASW)中有可能部署大量用于跟踪目的。然而,现代潜艇非常安静,仅靠被动传感器很难跟踪。多静态传感器网络除了无源接收器(如声呐系统)外,还具有很少的发射器(如浸入式声呐系统),具有改善跟踪性能的潜力。通过根据现有目标状态和任何可能的新目标状态移动发射机,可以进一步提高性能。尽管有大量的无源传感器可用,但由于频率、处理能力和其他物理限制,每次只能使用其中的少数。接下来的问题是确定发射器的路径,并从可用的无源传感器中选择一个子集,以优化跟踪性能。本文采用给出估计不确定性下界的后验Crame´r-Rao下界(PCRLB)作为性能度量。在考虑发射机运行约束的基础上,提出了一种联合确定移动发射机最优路径的算法,并在每个时间步长中确定用于跟踪多个时变目标的无源传感器的最优子集。在传感器管理算法中,解决了由于部署误差和可能的传感器漂移导致的传感器位置不确定性对跟踪性能的影响。仿真结果说明了该算法的性能。
{"title":"Joint path planning and sensor subset selection for multistatic sensor networks","authors":"R. Tharmarasa, T. Kirubarajan, T. Lang","doi":"10.1117/12.779217","DOIUrl":"https://doi.org/10.1117/12.779217","url":null,"abstract":"Since inexpensive passive sensors have become available, it is possible to deploy a large number of them for tracking purposes in Anti-Submarine Warfare (ASW). However, modern submarines are quiet and difficult to track with passive sensors alone. Multistatic sensor networks, which have few transmitters (e.g., dipping sonars) in addition to passive receivers (e.g., sonobouys), have the potential to improve the tracking performance. The performance can be improved further by moving the transmitters according to existing target states and any possible new target states. Even though a large number of passive sensors are available, due to frequency, processing power and other physical limitations, only a few of them can be used at any one time. Then the problems are to decide the path of the transmitters and select a subset from the available passive sensors in order to optimize the tracking performance. In this paper, the Posterior Crame´r-Rao Lower Bound (PCRLB), which gives a lower bound on estimation uncertainty, is used as the performance measure. An algorithm is presented to decide jointly the optimal path of the movable transmitters, by considering transmitters' operational constraints, and the optimal subset of passive sensors that should be used at each time steps for tracking multiple, possibly time-varying, number of targets. The effect of sensor location uncertainties, due to deployment error and possible sensor drifting, on the tracking performance is addressed in the sensor management algorithm. Simulation results illustrating the performance of the proposed algorithm are presented.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"3 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80859280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Template-based Method for Force Group Classification in Situation Assessment 态势评估中基于模板的部队群分类方法
Huimin Chai, Baoshu Wang
{"title":"A Template-based Method for Force Group Classification in Situation Assessment","authors":"Huimin Chai, Baoshu Wang","doi":"10.1109/CISDA.2007.368139","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368139","url":null,"abstract":"","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"61 1","pages":"85-91"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81123198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1