Inductive Classification of Multi-Spectral Threat Data for Autonomous Situation Awareness

자율적인 상황인식을 위한 다중센서 위협데이타의 귀납적 분류

  • 정용웅 (가톨릭대학교 컴퓨터정보공학부) ;
  • 노상욱 (가톨릭대학교 컴퓨터정보공학부) ;
  • 고은경 (국방과학연구소 2 기술본부 통신/전자전 개발시험장) ;
  • 정운섭 (국방과학연구소 2 기술본부 통신/전자전 개발시험장)
  • Published : 2008.03.15

Abstract

To build autonomous agents who can make a decision on behalf of humans in time-critical complex environments, the formulation of operational knowledge base could be essential. This paper proposes the methodology of how to formulate the knowledge base and evaluates it in a practical application domain. We analyze threat data received from the multiple sensors of Aircraft Survivability Equipment(ASE) for Korean helicopters, and integrate the threat data into the inductive model through compilation technique which extracts features of the threat data and relations among them. The compiled protocols of state-action rules can be implemented as the brain of the ASE. They can reduce the amounts of reasoning, and endow the autonomous agents with reactivity and flexibility. We report experimental results that demonstrate the distinctive and predictive patterns of threats in simulated battlefield settings, and show the potential of compilation methods for the successful detection of threat systems.

본 논문은 복잡한 실시간 환경에서 인간의 의사결정을 대체하는 자율적인 에이전트의 구축을 위하여 필수적인 지식베이스의 형성과정을 제안하며, 지식베이스의 형성과정에 대한 방법론을 실질적인 응용 도메인에서 검증한다. 한국형 헬기의 두뇌역할을 수행하는 생존체계장비가 실시간 전장 환경에서 여러 개의 센서로부터 수신하는 위협 데이타를 분석하고, 위협 데이타의 특성과 위협간의 상호 연관성을 컴파일 과정을 통하여 귀납적 모델로 정형화한다. 규범화된 상황-행동 규칙은 헬기가 복잡한 전장 환경에서 실시간 추론 시간을 줄이며, 자율적으로 위협에 대처할 수 있는 능력을 갖추도록 할 것이다. 제안한 방법론의 검증을 위하여 한국형 헬기의 위협을 실험적으로 분류하였으며, 컴파일 과정이 위협을 성공적으로 탐지할 수 있음을 보여주었다.

Keywords

References

  1. D. J. Bryant, F. M. J. Lichacz, J. G. Hollands, and J. V. Baranski, "Modeling situation awareness in an organizational context Military command and control," In S. Banbury and S. Tremblay (Eds), A cognitive approach to situation awareness: theory and application. Chapter 6, Burlington, VT: Ashgate Publishing Company, 2004
  2. J. Patrick and N. James, "A Task-Oriented Perspective of Situation Awareness," In S. Banbury and S. Tremblay (Eds), A cognitive approach to situation awareness: theory and application. Chapter 4, Burlington, VT: Ashgate Publishing Company, 2004
  3. D. Moshou, I. Hostens, G. Papaioannou, and H. Ramon, "Dynamic muscle fatigue detection using self-organizing maps," Applied Soft Computing, Vol.5, pp. 391-398, 2005 https://doi.org/10.1016/j.asoc.2004.09.001
  4. S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning," Lecture Notes in Computer Science 2690, New York: Springer-Verlag, pp. 286-295, 2003
  5. N. Kasabov, "Adaptation and interaction in dynamical systems: Modelling and rule discovery through evolving connectionist systems," Applied Soft Computing, Vol.6, pp. 307-322, 2006 https://doi.org/10.1016/j.asoc.2005.01.006
  6. A. S. Rao and M. P. Georgeff, "BDI agents: from theory to practice," in Proceedings of 1st International Conference of Multi-agent Systems, pp.312- 319, July 1995
  7. H. Zhongwen and W. Zongxiao, Sources and Techniques of Obtaining National Defense Science and Technology Intelligence, Kexue Jishu Wenxuan Publishing Co., Beijing, 1991. Available: http://www. fas.org/irp/world/china/docs/
  8. Aircraft survivability equipment (ASE): Ensuring lethality and dominance of Army aviation over tomorrow's battlefield, Association of the United States Army, July 2002
  9. J. Heikell, Electronic warfare self-protection of battlefield helicopters: A holistic view, Helsinki University of Technology, doctoral dissertation, 2005
  10. Electronic systems - Defensive systems division, Northrop Grumman. Available: http://www.dsd.es. northropgrumman.com
  11. Advanced EW protection for maximum survivability, Northrop Grumman, AN/APR-39B(V)2 Suite of integrated sensors and countermeasures (SISCM)
  12. L. D. Kennedy, C. R. Patterson, and D. C. Munshower, "F/A-18 electronic warfare suite cost and operational effectiveness analysis methodology : Phase rad- io-frequency countermeasures," John Hopkins APL Technical Digest, Vol.18, No.1, pp59-68, 1997. Available: http://techdigest.jhuapl.edu/ td1801/kennedy.pdf
  13. L. B. Thompson, "Army force protection : Helicopters can't wait," news article, April 21, 2006. Available: http://lexingtoninstitute.org/782.shtml
  14. Use of helicopters in land operations, STANAG 2999 HIS (NATO ATP-49(A)), 1992
  15. R. Hanson, J. Stutz, and P. Cheeseman, "Bayesian Classification Theory," Technical Report FIA-90- 12-7-01, NASA Ames Research Center, AI Branch, 1991
  16. J. R. Quinlan, C4.5: Programs for Machine Learning. San Francisco: Morgan Kaufmann Publishers, 1993
  17. P. Clark and T. Niblett, "The CN2 Induction Algorithm," Machine Learning Journal, Vol.3, No.4, pp. 261-283, 1989
  18. L. A. Zadeh, "Fuzzy Logic, Neural Networks and Soft Computing," Comm- unications of the ACM, Vol.37, No.3, pp. 77-84, 1994 https://doi.org/10.1145/175247.175255
  19. I. H. Witten and E. Frank, Data Mining: Practical machine learning tools and techniques. 2nd Edition, San Francisco: Morgan Kaufmann Publishers, 2005