Multi-Swarm Herding: Protecting against Adversarial Swarms

07/08/2020
by   Vishnu S. Chipade, et al.
0

This paper studies a defense approach against one or more swarms of adversarial agents. In our earlier work, we employ a closed formation (`StringNet') of defending agents (defenders) around a swarm of adversarial agents (attackers) to confine their motion within given bounds, and guide them to a safe area. The control design relies on the assumption that the adversarial agents remain close enough to each other, i.e., within a prescribed connectivity region. To handle situations when the attackers no longer stay within such a connectivity region, but rather split into smaller swarms (clusters) to maximize the chance or impact of attack, this paper proposes an approach to learn the attacking sub-swarms and reassign defenders towards the attackers. We use a `Density-based Spatial Clustering of Application with Noise (DBSCAN)' algorithm to identify the spatially distributed swarms of the attackers. Then, the defenders are assigned to each identified swarm of attackers by solving a constrained generalized assignment problem. Simulations are provided to demonstrate the effectiveness of the approach.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/08/2020

Herding an Adversarial Swarm in Three-dimensional Spaces

This paper presents a defense approach to safeguard a protected area aga...
research
09/04/2017

Maintaining Ad-Hoc Communication Network in Area Protection Scenarios with Adversarial Agents

We address a problem of area protection in graph-based scenarios with mu...
research
12/22/2021

IDCAIS: Inter-Defender Collision-Aware Interception Strategy against Multiple Attackers

This paper presents an Inter-Defender Collision-Aware Interception Strat...
research
08/09/2015

Security Games with Ambiguous Beliefs of Agents

Currently the Dempster-Shafer based algorithm and Uniform Random Probabi...
research
03/20/2021

Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors

In this work, we address the problem of synthesis of covert attackers in...
research
05/02/2023

Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots

Honeypots are a well-known and widely used technology in the cybersecuri...

Please sign up or login with your details

Forgot password? Click here to reset