Towards stealthy behaviors
نویسندگان
چکیده
This paper describes a behavior-based approach to stealth. The specific problem we consider is that of making stealthy traverses, i.e., transiting from one point to another while remaining hidden from an observer. Since we assume that the robot has no a priori model of the environment, our stealthy traverse behavior makes opportunistic use of terrain features to hide from the observer. This behavior has been evaluated in both real and simulated experiments, comparing it against a regular goal-seeking/obstacle-avoidance behavior. These experiments show a clear improvement in the stealthiness of the robot.
منابع مشابه
Malware Message Analysis through Binary Traces
Many malware trigger their malicious behaviors only if they detect some particular conditions from the environment. Under normal conditions these behaviors are hidden deeply under obfuscated codes, but they may be activated at any time by a Command and Control (C and C) server. However, connections to the C and C are not completely stealthy. We propose to analyse the way messages are operated b...
متن کاملInherent structures for soft long-range interactions in two-dimensional many-particle systems.
We generate inherent structures, local potential-energy minima, of the "k-space overlap potential" in two-dimensional many-particle systems using a cooling and quenching simulation technique. The ground states associated with the k-space overlap potential are stealthy (i.e., completely suppress single scattering of radiation for a range of wavelengths) and hyperuniform (i.e., infinite wavelengt...
متن کاملOptimum Stealthy Aircraft Detection Using a Multistatic Radar Hassan
Radar systems, based on Multistatic radar concept attracted a substantial attention in the recent years. The paper proposes system geometry for S-band Multistatic radar. This technique is used for detecting and tracking the small cross section area and stealthy aircrafts. The proposed geometrical structures are studied with different radars spacing to extend the detection coverage over the Mono...
متن کاملProbabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud
Cloud computing, with the paradigm of computing as a utility, has the potential to significantly tranform the IT industry. Attracted by the high efficiency, low cost, and great flexibility of cloud, enterprises began to migrate large parts of their networks into cloud. The cloud becomes a public space where multiple “tenants” reside. Except for some public services, the enterprise networks in c...
متن کاملTowards Stealthy Malware Detection1
Malcode can be easily hidden in document files and go undetected by standard technology. We demonstrate this opportunity of stealthy malcode insertion in several experiments using a standard COTS Anti-Virus (AV) scanner. Furthermore, in the case of zero-day malicious exploit code, signature-based AV scanners would fail to detect such malcode even if the scanner knew where to look. We propose th...
متن کامل