Clustering-based attack detection for adversarial reinforcement learning

被引:0
|
作者
Majadas, Ruben [1 ]
Garcia, Javier [2 ]
Fernandez, Fernando [1 ]
机构
[1] Univ Carlos III Madrid, Dept Informat, Ave Univ 30, Madrid 28911, Spain
[2] Univ Santiago De Compostela, Rua Lope Gomez De Marzoa S-N, Santiago De Compostela 15782, Spain
关键词
Adversarial reinforcement learning; Adversarial attacks; Change-point detection; Clustering applications; MODEL;
D O I
10.1007/s10489-024-05275-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting malicious attacks presents a major challenge in the field of reinforcement learning (RL), as such attacks can force the victim to perform abnormal actions, with potentially severe consequences. To mitigate these risks, current research focuses on the enhancement of RL algorithms with efficient detection mechanisms, especially for real-world applications. Adversarial attacks have the potential to alter the environmental dynamics of a Markov Decision Process (MDP) perceived by an RL agent. Leveraging these changes in dynamics, we propose a novel approach to detect attacks. Our contribution can be summarized in two main aspects. Firstly, we propose a novel formalization of the attack detection problem that entails analyzing modifications made by attacks to the transition and reward dynamics within the environment. This problem can be framed as a context change detection problem, where the goal is to identify the transition from a "free-of-attack" situation to an "under-attack" scenario. To solve this problem, we propose a groundbreaking "model-free" clustering-based countermeasure. This approach consists of two essential steps: first, partitioning the transition space into clusters, and then using this partitioning to identify changes in environmental dynamics caused by adversarial attacks. To assess the efficiency of our detection method, we performed experiments on four established RL domains (grid-world, mountain car, carpole, and acrobot) and subjected them to four advanced attack types. Uniform, Strategically-timed, Q-value, and Multi-objective. Our study proves that our technique has a high potential for perturbation detection, even in scenarios where attackers employ more sophisticated strategies.
引用
收藏
页码:2631 / 2647
页数:17
相关论文
共 50 条
  • [41] Multiuser Adversarial Attack on Deep Learning for OFDM Detection
    Ye, Youjie
    Chen, Yunfei
    Liu, Mingqian
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (12) : 2527 - 2531
  • [42] Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems
    Cao, Yuanjiang
    Chen, Xiaocong
    Yao, Lina
    Wang, Xianzhi
    Zhang, Wei Emma
    PROCEEDINGS OF THE 43RD INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '20), 2020, : 1669 - 1672
  • [43] Enhancing reinforcement learning based adversarial malware generation to evade static detection
    Zhan, Dazhi
    Zhang, Yanyan
    Zhu, Ling
    Chen, Jun
    Xia, Shiming
    Guo, Shize
    Pan, Zhisong
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 98 : 32 - 43
  • [44] Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection
    Randhawa, Rizwan Hamid
    Aslam, Nauman
    Alauthman, Mohammad
    Khalid, Muhammad
    Rafiq, Husnain
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 150 : 294 - 302
  • [45] Reinforcement-learning-based Adversarial Attacks Against Vulnerability Detection Models
    Chen, Si-Ran
    Wu, Jing-Zheng
    Ling, Xiang
    Luo, Tian-Yue
    Liu, Jia-Yu
    Wu, Yan-Jun
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (08): : 3647 - 3667
  • [46] A Clustering-Based Multi-Agent Reinforcement Learning Framework for Finer-Grained Taxi Dispatching
    Rajeh, Taha M.
    Luo, Zhipeng
    Javed, Muhammad Hafeez
    Alhaek, Fares
    Li, Tianrui
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, : 1 - 13
  • [47] Adaptive Working Condition Recognition With Clustering-Based Contrastive Learning for Unsupervised Anomaly Detection
    Xu, Qifa
    Xie, Tianming
    Jiang, Cuixia
    Cheng, Qiliang
    Wang, Xiangxiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, : 1 - 11
  • [48] AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection
    Ma, Xiangyu
    Shi, Wei
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 943 - 956
  • [49] Adversarial environment reinforcement learning algorithm for intrusion detection
    Caminero, Guillermo
    Lopez-Martin, Manuel
    Carro, Belen
    COMPUTER NETWORKS, 2019, 159 : 96 - 109
  • [50] Generative Adversarial Attack on Ensemble Clustering
    Kumar, Chetan
    Kumar, Deepak
    Shao, Ming
    2022 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2022), 2022, : 3839 - 3848