اكتشاف التهديدات البحرية باستخدام التعرف على الخطة
اكتشاف التهديدات البحرية باستخدام التعرف على الخطة
Abstract. Existing algorithms for maritime threat detection recognition algorithms are better suited for explaining threats
employ a variety of normalcy models that are probabilistic than are opaque and non-intuitive statistical models.
and/or rule-based. Unfortunately, they can be limited in their Plan recognition algorithms have been used for a variety of
ability to model the subtlety and complexity of multiple vessel tasks, such as detection of anomalous situation in an assisted
types and their spatio-temporal events, yet their representation is
care facility [4] and detection of terrorist threats [5]. However,
needed to accurately detect anomalies in maritime scenarios. To
address these limitations, we apply plan recognition algorithms they have rarely been applied to maritime threat recognition,
for maritime anomaly detection. In particular, we examine and not empirically compared with conventional behavior
hierarchical task network (HTN) and case-based algorithms for recognition algorithms for threat detection.
plan recognition, which detect anomalies by generating expected We address these issues as follows. We apply two plan
behaviors for use as a basis for threat detection. We compare recognition algorithms; the first uses hierarchical task
their performance with a behavior recognition algorithm on networks (HTNs), while the other uses case-based planning.
simulated riverine maritime traffic. On a set of simulated These algorithms apply consistency-based plan recognition
maritime scenarios, these plan recognition algorithms techniques [6]. We apply them to four simulated maritime
outperformed the behavior recognition algorithm, except for one
scenarios and compare their performance versus a Markov
reactive behavior task in which the inverse occurred.
Furthermore, our case-based plan recognizer outperformed our logic network (MLN) algorithm, a probabilistic behavior
HTN algorithm. On the short-term reactive planning scenarios, recognizer that performed well in our prior studies on
the plan recognition algorithms outperformed the behavior maritime threat detection [3]. Our results show that the plan
recognition algorithm on routine plan following. However, they recognition algorithms outperform this probabilistic behavior
are significantly outperformed on the anomalous scenarios. recognizer for scenarios involving longer-term plans.
However, the results on scenarios with reactive plans
involving anomaly situations are mixed.
I. INTRODUCTION
We structure the remainder of this paper as follows. We
Early detection and neutralization of threats from small boats provide an overview of plan recognition approaches followed
is a critical requirement for the US Navy. Detection of small by a detailed description of HTN and case-based approaches.
boat threats is particularly challenging in busy ports, harbors We then describe our empirical evaluation and results. Finally,
and riverine areas because they operate in close proximity to we conclude with a discussion and issues for future research.
large but much less maneuverable vessels. Various approaches
for automated threat and anomaly detection have been II. PLAN RECOGNITION OVERVIEW
developed to address this problem. For example, perimeter Plan recognition is the task of inferring plan(s) of an
breach detection algorithms (e.g., [1][2]) trigger an alarm intelligent agent by observing the agent’s actions or the effects
when a distance threshold is crossed. However, these can lead of those actions. It involves mapping a temporal sequence of
to numerous false alarms and unacceptable operating observed actions to some plan representation that identifies
requirements in narrow traffic lanes. To address this problem, the plan’s goal and the relation of actions among the plan’s
we recently showed that some behavior-based threat detection components [7]. Plan recognition algorithms can be
algorithms, based on probabilistic graphical models, can categorized into consistency-based and probabilistic
outperform perimeter breach algorithms [3]. However, approaches [8]. The former include hypothesize and revise
perimeter and behavior-based approaches rely on learning algorithms, version space techniques, and other closed-world
normalcy models that predominately focus on low level reasoning algorithms, while probabilistic algorithms include
activities, but cannot detect anomalies that require knowledge those that use stochastic grammars and probabilistic relational
of planned routes and schedules. models. The maritime environment is a continuous, non-
In this paper, we apply plan recognition algorithms to deterministic domain, making it challenging to apply any plan
continuously monitor activities and identify the plans of recognition approach. As a first attempt, we consider only
maritime vessels in advance of any threat occurrence. We consistency-based approaches.
assume that, given a plan, we can identify its unique goal, and
conjecture that identifying goals could help to detect III. MARITIME PLAN RECOGNITION
threatening and anomalous situations earlier and more We develop consistency-based plan recognition algorithms for
accurately. Also, the alerts that are generated by plan the maritime domain as follows (see Figure 1). We assume
Form Approved
Report Documentation Page OMB No. 0704-0188
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington
VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it
does not display a currently valid OMB control number.
16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF
ABSTRACT OF PAGES RESPONSIBLE PERSON
a. REPORT b. ABSTRACT c. THIS PAGE Same as 6
unclassified unclassified unclassified Report (SAR)
Standard Form 298 (Rev. 8-98)
Prescribed by ANSI Std Z39-18
that an agent controlling a small boat or ferrry can sense the In a dynamic maritime environ nment, it is necessary to
environment, maintain beliefs about the w world state, and account for plan deviations in the face of unexpected
derive a plan (i.e., a series of actions, such as turn, cruise, and situations. For example, a vessel may m temporarily change its
ram) to accomplish a given goal (e.g., destroyy a Navy vessel). course to avoid a collision with ano other oncoming vessel. To
We assume the recognizer has access to a library of plans account for such local variations, when the observed and
(e.g., create a terrorist event, catch fish, or ferrry passengers). It expected activities deviate, the Recognizer
R replans in an
observes the world state and the actions of thee agent to predict attempt to explain the deviation. First, it updates the active
the next or some future activity. The recognizzer compares the plan based on the current state and evaluates
e it for consistency.
observations resulting from those actiions with the If the consistency check fails, it reaattempts to find a consistent
observations expected from executing its preddicted activity. If plan using a preset number of histo orical states. If the updated
these observations are consistent with one or m more of the plans plan remains inconsistent, it is i removed from future
from the library, it repeats its inference proceess. Otherwise, it consistency evaluations. Thereforee, at the start of a plan
flags the vessel as a potential threat or anom maly and presents recognition process, the Recognizzer experiences its largest
the information to a decision-maker along withh an explanation. computational load as all the plaans must be evaluated for
In the following subsections we describe pplan recognition consistency. Its search load reducees as inconsistent plans are
algorithms that use hierarchical task networkss (HTN) or case- discarded. By default, if no plan remains
r consistent then the
based reasoning (CBR) methods to implementt these steps. situation is deemed anomalous.
B. Case-Based Planning
Case-based reasoning (CBR) is a prrocess for solving problems
by retrieving and reusing solution ns from problems that are
similar to the problem at hand [10].. A CBR system relies on a
memory of problem-solution pairs called cases. These cases
can be automatically learned fro om observations or hand-
engineered, depending on the appllication. The CBR process
includes an algorithm for case retrrieval, which involves case
similarity assessment.
We adopt CBR for consistency--based plan recognition as
Figure 1. Consistency based approach to maritimee plan recognition
follows. We manually engineered two case bases that cover
A. HTN Plan Recognition selected scenarios of interest. The first case base, called the
HTN planners operate by recursively decompposing high-level Primary Case Base (PCB), covers the entire travel path of an
tasks into lower level components. Thiss decomposition agent. The second case base, calledd the Secondary Case Base
process results in a series of low-level actions or primitive (SCB), only covers the local variattions (e.g., path deviations)
tasks, constituting a plan [9]. We adapted an HTN planner for to account for collision avoidancee among two vessels. The
consistency-based plan recognition. reason for using two case bases is that, unlike the HTN
We begin by providing the HTN Recognizer with access to algorithm, which uses a single rep presentation for plans, the
all the routine goals or intents that an agent ccould follow. For CBR algorithm cannot effectively account
a for unforeseen local
each intention, the Recognizer generates a pllan comprising a deviations from the plan using a sin
ngle case representation.
set of activities that the agent would perform if it tried to TABLE 2. PRIMARY CASE REPRESENTATION
R
pursue it. Each plan is a travel path compprising a list of Feature Description
waypoints (i.e., locations the vessel wouldd travel through) Vessel-Type Type of veessel performing an activity
together with its expected behavior on the travel segments Travel-Path Travel pathh comprising waypoints.
(i.e., the path between two consecutive waypoints). We <[location, <Map Each traveel segment points to a
characterize an agent’s behavior on a travell segment by its [speed, activity]>]> hashmap ofo speed to activity label
speed and the activity label (e.g., cruising, debbarking, docking, TABLE 3. SECONDARY CASE
E REPRESENTATION
or ramming). As shown in Figure 1, the Recognizer Feature Description
continuously observes the agent vessel’s actioons and compares Vessels-(Ref, The refeerence and approaching
them with the expected actions in all the acctive (still valid) Approaching) vessel tyypes
plans for consistency (see Table 1 for criteria)). It retains all the Relative-bearing Their reelative bearing
consistent plans and discards all inconsistent pplans. Primary-case-pointer Pointer to a primary case
Speed (Ref, Approaching) The speeds of the two vessels
TABLE 1. CONSISTENCY CHECK CRIT
TERIA
Avoidance-Actions Ordered d list of actions that the
Feature Value constrain nt referencce vessel will execute
Vessel-speed Within specifiedd threshold
Vessel-track Within specifiedd boundary Tables 2 and 3 display case repressentations for the PCB and
Bearing-to-waypoint Within specifiedd threshold SCB. The vessel type and its traveel path features, as defined
Bearing-changes Within specifiedd threshold above for our HTN plan recognizerr, are used to represent the
Distance-to-Waypoint Select next wayppoint PCB cases. In addition to the vesssel’s speed and its activity
label, the case-based algorithm also uses a Boolean feature because the former leverage add
ditional domain knowledge
(not shown in Table 2) to indicate whether thhe travel segment (i.e., expected paths).
is the last one of the entire path. 2. Compare the lead-time to recogn
nize a change in activity of
The SCB cases are represented by the two vvessel types, their the three algorithms. We conjecture
c that the plan
relative bearing, a pointer to the primary casse, the speeds of recognizers will outperform the behavior recognizer
the reference and the approaching vessels, annd the avoidance because they can detect morre subtle anomalies (e.g.,
actions that the reference vessel executes. Thee relative bearing moving to an unexpected dock).
feature measures how the two vessels’ bearinngs relate, and is
calculated as follows: B. Test Scenarios
rbx,y=rbx+rby We developed four simulated test scenarios
s that take place on
where rbx is the angle between the velocity vvector of vessel x a model of the Potomac River in Washington,
W DC. Besides the
and the vector pointing from vessel x to vesseel y. The value of real docks of National Harbor (NH H) and Old Town (OT), we
rbx,y ranges from 0 to 360. A value of 0 impliees the vessels are introduce a fictitious dock called Reeagan Airport Dock (RAD)
moving directly at each other and a value of 360 implies they to evaluate the impact of long-term m goals and intentions. We
are moving directly away from each other. developed the first two scenarios too examine the performance
on long-term intent following, wh hile the others allow us to
explore performance on short-teerm reactive events. The
descriptions of these scenarios (see Figure 3) are as follows:
1: NH
2: OT
O
3: RAD