Deep-attack over the deep reinforcement learning

被引:9
|
作者
Li, Yang [1 ]
Pan, Quan [1 ]
Cambria, Erik [2 ]
机构
[1] Northwestern Polytech Univ, Xian, Peoples R China
[2] Nanyang Technol Univ, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Adversarial attack; Deep reinforcement learning; Adversarial training;
D O I
10.1016/j.knosys.2022.108965
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent adversarial attack developments have made reinforcement learning more vulnerable, and different approaches exist to deploy attacks against it, where the key is how to choose the right timing of the attack. Some work tries to design an attack evaluation function to select critical points that will be attacked if the value is greater than a certain threshold. This approach makes it difficult to find the right place to deploy an attack without considering the long-term impact. In addition, there is a lack of appropriate indicators of assessment during attacks. To make the attacks more intelligent as well as to remedy the existing problems, we propose the reinforcement learning-based attacking framework by considering the effectiveness and stealthy spontaneously, while we also propose a new metric to evaluate the performance of the attack model in these two aspects. Experimental results show the effectiveness of our proposed model and the goodness of our proposed evaluation metric. Furthermore, we validate the transferability of the model, and also its robustness under the adversarial training. (C) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
    Oh, Sang Ho
    Kim, Jeongyoon
    Nah, Jae Hoon
    Park, Jongyoul
    ELECTRONICS, 2024, 13 (03)
  • [22] SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning
    Hou, Charlie
    Zhou, Mingxun
    Ji, Yan
    Daian, Phil
    Tramer, Florian
    Fanti, Giulia
    Juels, Ari
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [23] Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning
    Zhang, Rui
    Xia, Hui
    Liu, Chao
    Jiang, Ruo-bing
    Cheng, Xiang-guo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [24] Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning
    Sultana, Rukhsar
    Grover, Jyoti
    Tripathi, Meenakshi
    PERVASIVE AND MOBILE COMPUTING, 2024, 103
  • [25] From Reinforcement Learning to Deep Reinforcement Learning: An Overview
    Agostinelli, Forest
    Hocquet, Guillaume
    Singh, Sameer
    Baldi, Pierre
    BRAVERMAN READINGS IN MACHINE LEARNING: KEY IDEAS FROM INCEPTION TO CURRENT STATE, 2018, 11100 : 298 - 328
  • [26] Transfer Learning in Deep Reinforcement Learning
    Islam, Tariqul
    Abid, Dm. Mehedi Hasan
    Rahman, Tanvir
    Zaman, Zahura
    Mia, Kausar
    Hossain, Ramim
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2022, VOL 1, 2023, 447 : 145 - 153
  • [27] Learning to Drive with Deep Reinforcement Learning
    Chukamphaeng, Nut
    Pasupa, Kitsuchart
    Antenreiter, Martin
    Auer, Peter
    2021 13TH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SMART TECHNOLOGY (KST-2021), 2021, : 147 - 152
  • [28] Explainability in deep reinforcement learning
    Heuillet, Alexandre
    Couthouis, Fabien
    Diaz-Rodriguez, Natalia
    KNOWLEDGE-BASED SYSTEMS, 2021, 214 (214)
  • [29] Deep Reinforcement Learning with Adjustments
    Khorasgani, Hamed
    Wang, Haiyan
    Gupta, Chetan
    Serita, Susumu
    2021 IEEE 19TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2021,
  • [30] Deep Reinforcement Learning: An Overview
    Mousavi, Seyed Sajad
    Schukat, Michael
    Howley, Enda
    PROCEEDINGS OF SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS) 2016, VOL 2, 2018, 16 : 426 - 440