Clustering-based attack detection for adversarial reinforcement learning

被引:0
|
作者
Majadas, Ruben [1 ]
Garcia, Javier [2 ]
Fernandez, Fernando [1 ]
机构
[1] Univ Carlos III Madrid, Dept Informat, Ave Univ 30, Madrid 28911, Spain
[2] Univ Santiago De Compostela, Rua Lope Gomez De Marzoa S-N, Santiago De Compostela 15782, Spain
关键词
Adversarial reinforcement learning; Adversarial attacks; Change-point detection; Clustering applications; MODEL;
D O I
10.1007/s10489-024-05275-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting malicious attacks presents a major challenge in the field of reinforcement learning (RL), as such attacks can force the victim to perform abnormal actions, with potentially severe consequences. To mitigate these risks, current research focuses on the enhancement of RL algorithms with efficient detection mechanisms, especially for real-world applications. Adversarial attacks have the potential to alter the environmental dynamics of a Markov Decision Process (MDP) perceived by an RL agent. Leveraging these changes in dynamics, we propose a novel approach to detect attacks. Our contribution can be summarized in two main aspects. Firstly, we propose a novel formalization of the attack detection problem that entails analyzing modifications made by attacks to the transition and reward dynamics within the environment. This problem can be framed as a context change detection problem, where the goal is to identify the transition from a "free-of-attack" situation to an "under-attack" scenario. To solve this problem, we propose a groundbreaking "model-free" clustering-based countermeasure. This approach consists of two essential steps: first, partitioning the transition space into clusters, and then using this partitioning to identify changes in environmental dynamics caused by adversarial attacks. To assess the efficiency of our detection method, we performed experiments on four established RL domains (grid-world, mountain car, carpole, and acrobot) and subjected them to four advanced attack types. Uniform, Strategically-timed, Q-value, and Multi-objective. Our study proves that our technique has a high potential for perturbation detection, even in scenarios where attackers employ more sophisticated strategies.
引用
收藏
页码:2631 / 2647
页数:17
相关论文
共 50 条
  • [1] Clustering-based attack detection for adversarial reinforcement learning
    Rubén Majadas
    Javier García
    Fernando Fernández
    Applied Intelligence, 2024, 54 : 2631 - 2647
  • [2] An Improved Clustering-based Approach for Wormhole Attack Detection in MANET
    Anju, J.
    Sminesh, C. N.
    2014 3RD INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS 2014), 2014, : 149 - 154
  • [3] Adversarial Attack for Deep Reinforcement Learning Based Demand Response
    Wan, Zhiqiang
    Li, Hepeng
    Shuai, Hang
    Sun, Yan
    He, Haibo
    2021 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2021,
  • [4] A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network
    Jan, Mian Ahmad
    Nanda, Priyadarsi
    He, Xiangjian
    Liu, Ren Ping
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 318 - 325
  • [5] Fault detection method based on adversarial reinforcement learning
    Li, Junhuai
    Wu, Yunwen
    Wang, Huaijun
    Xu, Jiang
    FRONTIERS IN COMPUTER SCIENCE, 2023, 4
  • [6] A Clustering-Based Graph Laplacian Framework for Value Function Approximation in Reinforcement Learning
    Xu, Xin
    Huang, Zhenhua
    Graves, Daniel
    Pedrycz, Witold
    IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (12) : 2613 - 2625
  • [7] Exploring Clustering-Based Reinforcement Learning for Personalized Book Recommendation in Digital Library
    Wang, Xinhua
    Wang, Yuchen
    Guo, Lei
    Xu, Liancheng
    Gao, Baozhong
    Liu, Fangai
    Li, Wei
    INFORMATION, 2021, 12 (05)
  • [8] Reinforcement Learning Based Approach for Flip Attack Detection
    Liu, Hanxiao
    Li, Yuchao
    Martensson, Jonas
    Xie, Lihua
    Johansson, Karl Henrik
    2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 3212 - 3217
  • [9] Tactics of Adversarial Attack on Deep Reinforcement Learning Agents
    Lin, Yen-Chen
    Hong, Zhang-Wei
    Liao, Yuan-Hong
    Shih, Meng-Li
    Liu, Ming-Yu
    Sun, Min
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3756 - 3762
  • [10] A New Black Box Attack Generating Adversarial Examples Based on Reinforcement Learning
    Xiao, Wenli
    Jiang, Hao
    Xia, Song
    2020 INFORMATION COMMUNICATION TECHNOLOGIES CONFERENCE (ICTC), 2020, : 141 - 146