DocumentCode :
3308854
Title :
Maritime threat detection using plan recognition
Author :
Auslander, B. ; Gupta, K.M. ; Aha, D.W.
Author_Institution :
Knexus Res. Corp., National Harbor, MD, USA
fYear :
2012
fDate :
13-15 Nov. 2012
Firstpage :
249
Lastpage :
254
Abstract :
Existing algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and/or rule-based. Unfortunately, they can be limited in their ability to model the subtlety and complexity of multiple vessel types and their spatio-temporal events, yet their representation is needed to accurately detect anomalies in maritime scenarios. To address these limitations, we apply plan recognition algorithms for maritime anomaly detection. In particular, we examine hierarchical task network (HTN) and case-based algorithms for plan recognition, which detect anomalies by generating expected behaviors for use as a basis for threat detection. We compare their performance with a behavior recognition algorithm on simulated riverine maritime traffic. On a set of simulated maritime scenarios, these plan recognition algorithms outperformed the behavior recognition algorithm, except for one reactive behavior task in which the inverse occurred. Furthermore, our case-based plan recognizer outperformed our HTN algorithm. On the short-term reactive planning scenarios, the plan recognition algorithms outperformed the behavior recognition algorithm on routine plan following. However, they are significantly outperformed on the anomalous scenarios.
Keywords :
case-based reasoning; marine systems; national security; naval engineering; planning; HTN algorithm; behavior recognition algorithm; case-based algorithms; case-based plan recognizer; hierarchical task network; maritime anomaly detection; maritime threat detection; multiple vessel types; normalcy models; plan recognition algorithms; reactive behavior task; routine plan; short-term reactive planning scenarios; simulated maritime scenarios; simulated riverine maritime traffic; spatio-temporal events; Accuracy; Collision avoidance; Hidden Markov models; Labeling; Planning; Prediction algorithms; Probabilistic logic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Homeland Security (HST), 2012 IEEE Conference on Technologies for
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4673-2708-4
Type :
conf
DOI :
10.1109/THS.2012.6459857
Filename :
6459857
Link To Document :
بازگشت