Clustering-based attack detection for adversarial reinforcement learning

被引:1
作者
Majadas, Ruben [1 ]
Garcia, Javier [2 ]
Fernandez, Fernando [1 ]
机构
[1] Univ Carlos III Madrid, Dept Informat, Ave Univ 30, Madrid 28911, Spain
[2] Univ Santiago De Compostela, Rua Lope Gomez De Marzoa S-N, Santiago De Compostela 15782, Spain
关键词
Adversarial reinforcement learning; Adversarial attacks; Change-point detection; Clustering applications; MODEL;
D O I
10.1007/s10489-024-05275-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting malicious attacks presents a major challenge in the field of reinforcement learning (RL), as such attacks can force the victim to perform abnormal actions, with potentially severe consequences. To mitigate these risks, current research focuses on the enhancement of RL algorithms with efficient detection mechanisms, especially for real-world applications. Adversarial attacks have the potential to alter the environmental dynamics of a Markov Decision Process (MDP) perceived by an RL agent. Leveraging these changes in dynamics, we propose a novel approach to detect attacks. Our contribution can be summarized in two main aspects. Firstly, we propose a novel formalization of the attack detection problem that entails analyzing modifications made by attacks to the transition and reward dynamics within the environment. This problem can be framed as a context change detection problem, where the goal is to identify the transition from a "free-of-attack" situation to an "under-attack" scenario. To solve this problem, we propose a groundbreaking "model-free" clustering-based countermeasure. This approach consists of two essential steps: first, partitioning the transition space into clusters, and then using this partitioning to identify changes in environmental dynamics caused by adversarial attacks. To assess the efficiency of our detection method, we performed experiments on four established RL domains (grid-world, mountain car, carpole, and acrobot) and subjected them to four advanced attack types. Uniform, Strategically-timed, Q-value, and Multi-objective. Our study proves that our technique has a high potential for perturbation detection, even in scenarios where attackers employ more sophisticated strategies.
引用
收藏
页码:2631 / 2647
页数:17
相关论文
共 31 条
[11]  
Goldblum M, 2020, AAAI CONF ARTIF INTE, V34, P3996
[12]   Adversarial and Clean Data Are Not Twins [J].
Gong, Zhitao ;
Wang, Wenlu .
PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON EXPLOITING ARTIFICIAL INTELLIGENCE TECHNIQUES FOR DATA MANAGEMENT, AIDM 2023, 2023,
[13]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[14]  
Grosse Kathrin, 2017, ARXIV
[15]  
Huang S., 2017, P ICLR
[16]   Generalization of change-point detection in time series data based on direct density ratio estimation [J].
Hushchyn, Mikhail ;
Ustyuzhanin, Andrey .
JOURNAL OF COMPUTATIONAL SCIENCE, 2021, 53
[17]   A K-Means clustering and SVM based hybrid concept drift detection technique for network anomaly detection [J].
Jain, Meenal ;
Kaur, Gagandeep ;
Saxena, Vikas .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 193
[18]   Statistical Drift Detection Ensemble for batch processing of data streams [J].
Komorniczak, Joanna ;
Zyblewski, Pawel ;
Ksieniewicz, Pawel .
KNOWLEDGE-BASED SYSTEMS, 2022, 252
[19]  
Kos J., 2017, Delving into adversarial attacks on deep policies, P1
[20]  
Kurakin A., 2017, Workshop Track Proceedings