Evaluating the Role of Machine Learning in Defense Applications and Industry
Abstract
:1. Introduction
- Improved efficiency: ML techniques can automate repetitive and time-consuming tasks, such as data entry and analysis, freeing up employees’ time to focus on more complex and creative tasks [1].
- Increased accuracy: ML algorithms can analyze large datasets quickly and accurately, providing insights that would be difficult for humans to identify [2]. This can help businesses make more informed decisions, improve product quality, and reduce errors.
- Cost savings: By automating tasks and improving accuracy, ML can help businesses save money on labor and reduce waste [3].
- Predictive maintenance: ML can analyze data from sensors and other sources to identify when equipment is likely to fail, allowing businesses to perform maintenance before a breakdown occurs [4].
- Fraud detection: ML algorithms can detect patterns in data that may indicate fraudulent activity, such as credit card fraud or insurance fraud [5].
- Improved supply-chain management: ML algorithms can analyze data from across the supply chain to identify areas for improvement, such as reducing inventory levels or improving delivery times [6].
Our Contribution
- An assessment of the implications of using ML algorithms and integrating them into defense systems from an ethical and legal perspective.
- A presentation of the requirements of a framework for carrying out ML–defense integration from an ethical and legal point of view.
- The challenges, advantages, and disadvantages of including ML in defense systems are analyzed, including an example of a project that has implemented ML.
2. Method
- Data Collection: The authors collected data through a combination of structured technical research and real projects. They engaged with fellow military personnel, defense technologists, and ML experts to gather insights and anecdotes related to the challenges faced during the deployment of ML systems. The projects are not described in their entirety for confidentiality reasons given the military environment.
- Case-study selection: The authors selected a case study involving various ML applications within the defense sector. This case study was the SALAs project (Section 6) and included examples from a survey regarding opinions on the use of lethal autonomous weapon systems.
- Problem identification: The collected data were systematically analyzed to identify recurring challenges across our own experiences. The authors categorized the challenges into technical, ethical, operational, and strategic dimensions to provide a holistic view.
- Comparative analysis: The authors performed a comparative analysis of the identified challenges in order to create a framework. Although the challenges could be interpreted as applying to artificial intelligence in general, they focused on the military perspective.
3. ML and Defense Sector
4. Defense Systems for Integrating ML
- Autonomous systems: These include unmanned aerial vehicles (UAVs) or ground vehicles, which leverage ML algorithms to enable them to navigate and complete missions without direct human control. For example, Ref. [20] proposed an autonomous network using multi-agent reinforcement learning for early threat detection, which is an increasingly important part of the cybersecurity landscape given the growing scale and scope of cyberattacks.
- Predictive maintenance: ML algorithms are used to analyze data from sensors and other sources to predict when equipment may fail, allowing maintenance to be performed before a breakdown occurs. The SOPRENE project [21] proposed the use of ML for predictive maintenance.
- Cybersecurity: ML can analyze network traffic to detect anomalies and potential threats, enabling faster response times and reducing the risk of cyber attacks [22].
- Situational awareness: ML algorithms can analyze data from a variety of sources, including sensors, cameras, and social media, to provide real-time situational awareness to military personnel [23]. The automated detection of refugee dwellings from satellite imagery using multi-class graph-cut segmentation and shadow information was presented in [24].
- Logistics and supply-chain management: ML algorithms can optimize logistics and supply-chain management by analyzing data on inventory levels, shipping times, and other factors to improve efficiency and reduce costs [25].
- Threat detection: ML algorithms can be used to detect potential threats, such as explosives or weapons, at security checkpoints or during cargo inspections [20].
5. Legal Framework
- Human action and oversight.
- Technical soundness and security.
- Privacy and data management.
- Transparency.
- Diversity, non-discrimination, and fairness.
- Social and environmental well-being.
- Accountability.
6. Ethical Framework
7. Example of ML Application in Defense: ATLAS
- Data collection regarding possible types of military targets and the pre-training of the ML algorithm used.
- Image processing, where we should highlight the capacity for the detection, classification, recognition, identification, and tracking of targets that can be achieved by applying ML techniques for this purpose.
- Trigger control—in this area, advanced targeting algorithms, the automation of the firing process, and the recommendation of the weapon to be used according to the identified target are very important.
- The technical support integrated into the combat vehicle, since a high-voltage power supply system (600 Vdc) and the integration of sensors and electronics are necessary.
- Sensors—in order to carry out this automation and to provide the ML algorithm with real-time working data, the tanks are equipped with image sensors in the visible, NIR (near-infrared), SWIR (short-wave infrared), MWIR (medium-wave infrared), and LWIR (long-wave infrared) wavebands; gyro mechanisms that make possible the continuous 360º rotation of the sensors and rangefinder; and LADAR (laser detection and ranging)/LIDAR (light detection and ranging)-type lasers.
8. Challenges in the Defense Sector
- Possible friendly fire: There is a possibility of fire between units of the same side due to the misidentification of assets, confusion between allies and hostile units, errors in communicating the nature of identified assets, or insufficient contextualization during objective development. The automation of tasks is associated with a lack of tactical patience or even pre-action meditation, which can result in unassessed collateral damage.
- Adversarial attacks against ML models: With the passage of time and the widespread use of this technology, the emergence of methods for attacking or interfering with these systems (adversarial evasion attacks) has led to the need to study the reliability, privacy, and security of these algorithms. For example, in imaging systems, noise imperceptible to the human eye could be inserted in such a way as to induce a reliable classification error during jamming. Of note are “white-box” attacks, which occur when the enemy knows how the algorithm (of the deep neural network) works, and “black-box” attacks, which occur when the adversary knows only the type of input and output of the system. Researchers at Stony Brook University (New York) and IBM developed the ARES evaluative framework [36] based on reinforcement learning for adversarial ML, allowing researchers to explore system-level attack/defense strategies and re-examine target defense strategies as a whole.
- Transparency: As in safety-critical systems, these types of applications require high transparency, high security, and building user trust. Regarding transparency, the challenges are to improve user confidence in the recommendations given by the system; identify previously unknown causal relationships that can be tested with other methods; determine the limits of system performance; ensure fairness to avoid systematic biases that may result in unequal treatment for some cases; and improve model interoperability, so that users can predict the system recommendations, understand the model parameters, and understand the training algorithm.
- Ethics in decisions made by machines: There is a degradation of “humanization” in the decisions made. A machine does not consider the death of civilians as collateral damage or take into account the morality of annihilating the life of an enemy combatant, even when they have indicated their surrender. Thus, it is a major challenge for a machine to learn and contemplate this criterion in its decision algorithm.
- The scarcity of data and the lack of values: The performance of an ML algorithm depends mainly on the quality of the samples, the availability of large amounts of samples or data, and whether the data are optimal or meaningful for the exercise. For example, in the case of the US Army, which is a great power with a great deal of combat experience and a very large amount of recorded data, it may be considered that the number of samples is insufficient for the application of ML in a real, substantial, and imminent confrontation. On the one hand, there is a large amount of unknown data on the adversary, and on the other hand, obtaining data in real-time during combat is difficult due to the impossibility of computing and processing the extracted information. If the existing database originates from exercises, it will definitely be limited to certain levels of security and costs and will therefore be substantially different from a real battle. As a solution, it has been proposed to fill this data gap through very arduous fieldwork, taking all possible real values and then identifying them, labeling them, and creating a database with labels according to the needs of the ML algorithm. Another option would be to sample using real-time strategy games, where the commander can play various roles in different scenarios and thus accumulate experience in the form of data.
- Failures in the evaluation criteria: The ultimate goal in developing ML algorithms is creating a system that aids decision making based on accumulated experience and experience gained in new scenarios. However, the main challenge is to determine the extent to which the algorithm is valid and reliable for decision making and to make it extensible to other scenarios. Therefore, the decision-making process of the created system requires a large number of experiments and simulations to test its effectiveness.
- The complexity of modeling a tactical environment: A large amount of information is relevant concerning a battlefield, among which the state of the combat units and weapons present is of relative importance. The situation is complex due to the difficulty of controlling the behavior of the units, modeling the battlefield environment, intuiting the mechanisms of action, and identifying the evaluation criteria. To all this, we must add the determination of factors such as the efficiency and cost of the war; the damage produced and the need to sustain the resources deployed; and the need to take over air, land, or sea space.
- Limited and uncertain information: During a battle, the information received may be incomplete, and the source may not be certain. Therefore, making decisions with these obstacles may not guarantee profit.Because of this, it is imperative to consider how to discretize time and action, create temporary windows of advantage, and seize the initiative in order to attain military or strategic objectives. Command staff who make decisions according to routines or prescribed protocols will be at a tactical disadvantage. Ideally, they should pay attention to contingencies and innovate their tactics as needed.However, the transfer of historical knowledge by military experts in the form of facts and rules is an indisputable premise to begin the development of an ML algorithm to be applied in tactical environments. As a basis, the system must know what is meant by the military domain; the performance of the weapons used; the models of warfare (asymmetric, symmetric, hybrid, destructive, nuclear, etc.), the relevant decision models (political, economic, securing civilians, the conquest of territory, etc.); the rules in armed conflicts; and the rules of operation between combatants or between allies.
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Loubiri, O.; Maag, S. Automated Web Testing using Machine Learning and Containerization. In Proceedings of the 2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC), Crete, Greece, 19–22 July 2022; pp. 113–121. [Google Scholar] [CrossRef]
- Dhakal, A.; Kulkarni, S.G.; Ramakrishnan, K.K. ECML: Improving Efficiency of Machine Learning in Edge Clouds. In Proceedings of the 2020 IEEE 9th International Conference on Cloud Networking (CloudNet), Piscataway, NJ, USA, 9–11 November 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Dhirawani, P.; Parekh, R.; Kandoi, T.; Srivastava, K. Cost Savings Estimation for Solar Energy Consumption Using Machine Learning. In Proceedings of the 2022 11th International Conference on Renewable Energy Research and Application (ICRERA), Istanbul, Turkey, 18–21 September 2022; pp. 42–49. [Google Scholar] [CrossRef]
- Liulys, K. Machine Learning Application in Predictive Maintenance. In Proceedings of the 2019 Open Conference of Electrical, Electronic and Information Sciences (eStream), Vilnius, Lithuania, 25 April 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Wei, Y.; Qi, Y.; Ma, Q.; Liu, Z.; Shen, C.; Fang, C. Fraud Detection by Machine Learning. In Proceedings of the 2020 2nd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI), Taiyuan, China, 23–25 October 2020; pp. 101–115. [Google Scholar] [CrossRef]
- Rao, U.A.; Nalinipriya, G.; Jangirala, S.; Poonguzhali, I.; Azahad, S.; Samatha, B. Improved Food Supply Chain Forecasting Management Using IoT and Machine Learning. In Proceedings of the 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), Mysuru, India, 16–17 October 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Sudharsan, B.; Kumar, S.P.; Dhakshinamurthy, R. AI Vision: Smart speaker design and implementation with object detection custom skill and advanced voice interaction capability. In Proceedings of the 2019 11th International Conference on Advanced Computing (ICoAC), Chennai, India, 18–20 December 2019; pp. 97–102. [Google Scholar] [CrossRef]
- Ramadhan, G.; Setiawan, E.B. Collaborative Filtering Recommender System Based on Memory Based in Twitter Using Decision Tree Learning Classification (Case Study: Movie on Netflix). In Proceedings of the 2022 International Conference on Advanced Creative Networks and Intelligent Systems (ICACNIS), Bandung, Indonesia, 23–24 November 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Monzon Baeza, V.; Concha Salor, L. New horizons in tactical communications: An overview of emerging technologies possibilities. IEEE Potentials 2023, 42, 1–8. [Google Scholar] [CrossRef]
- Concha Salor, L.; Monzon Baeza, V. Harnessing the Potential of Emerging Technologies to Break down Barriers in Tactical Communications. Telecom 2023, 4, 709–731. [Google Scholar] [CrossRef]
- Villar Miguelez, C.; Monzon Baeza, V.; Parada, R.; Monzo, C. Guidelines for Renewal and Securitization of a Critical Infrastructure Based on IoT Networks. Smart Cities 2023, 6, 728–743. [Google Scholar] [CrossRef]
- Parada, R.; Monzon Baeza, V.; Barraca-Ibort, D.N.; Monzo, C. LoRa-Based Low-Cost Nanosatellite for Emerging Communication Networks in Complex Scenarios. Aerospace 2023, 10, 754. [Google Scholar] [CrossRef]
- Petrov, V.; Lema, M.A.; Gapeyenko, M.; Antonakoglou, K.; Moltchanov, D.; Sardis, F.; Samuylov, A.; Andreev, S.; Koucheryavy, Y.; Dohler, M. Achieving End-to-End Reliability of Mission-Critical Traffic in Softwarized 5G Networks. IEEE J. Sel. Areas Commun. 2018, 36, 485–501. [Google Scholar] [CrossRef]
- Spantideas, S.; Giannopoulos, A.; Cambeiro, M.A.; Trullols-Cruces, O.; Atxutegi, E.; Trakadas, P. Intelligent Mission Critical Services over Beyond 5G Networks: Control Loop and Proactive Overload Detection. In Proceedings of the 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), Istanbul, Turkey, 25–27 July 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Skarin, P.; Tärneberg, W.; Årzen, K.E.; Kihl, M. Towards Mission-Critical Control at the Edge and Over 5G. In Proceedings of the 2018 IEEE International Conference on Edge Computing (EDGE), Washington, DC, USA, 1–3 May 2018; pp. 50–57. [Google Scholar] [CrossRef]
- Bongirwar, V.; Mishra, S.S.; Bisen, A.; Mundhada, S.; Singh, U. Disaster Information Verification and Validation Application Using Machine Learning. Int. J. Next-Gener. Comput. 2022, 13. [Google Scholar] [CrossRef]
- Arinta, R.R.; Andi W.R., E. Natural Disaster Application on Big Data and Machine Learning: A Review. In Proceedings of the 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 20–21 November 2019; pp. 249–254. [Google Scholar] [CrossRef]
- Liu, Y.; Deng, Y.; Nallanathan, A.; Yuan, J. Machine Learning for 6G Enhanced Ultra-Reliable and Low-Latency Services. IEEE Wirel. Commun. 2023, 30, 48–54. [Google Scholar] [CrossRef]
- Alcántara Suárez, E.J. Análisis de la aplicación de machine learning en sistemas de defensa. Master’s Dissertation, Universitat Oberta de Catalunya, Barcelona, Spain, 2023. [Google Scholar]
- Campbell, R.G.; Eirinaki, M.; Park, Y. A Curriculum Framework for Autonomous Network Defense using Multi-agent Reinforcement Learning. In Proceedings of the 2023 Silicon Valley Cybersecurity Conference (SVCC), San Jose, CA, USA, 17–19 May 2023; pp. 1–8. [Google Scholar] [CrossRef]
- Fernández-Barrero, D.; Fontenla-Romero, O.; Lamas-López, F.; Novoa-Paradela, D.; R-Moreno, M.D.; Sanz, D. SOPRENE: Assessment of the Spanish Armada’s Predictive Maintenance Tool for Naval Assets. Appl. Sci. 2021, 11, 7322. [Google Scholar] [CrossRef]
- Kseniia, N.; Minbaleev, A. Legal Support of Cybersecurity in the Field of Application of Artificial Intelligence Technology. In Proceedings of the 2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), Yaroslavl, Russia, 7–11 September 2020; pp. 59–62. [Google Scholar] [CrossRef]
- Yongcui, Z. Situation Awareness and Target Recognition of Marine Big Data Battlefield based on Deep Learning. In Proceedings of the 2022 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, 24–26 June 2022; pp. 430–435. [Google Scholar] [CrossRef]
- Ergünay, Ů.S.K.; Kahraman, F.; Ates, H.F. Automated detection of refugee dwellings from satellite imagery using multi-class graph-cut segmentation and shadow information. In Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), Trabzon, Turkey, 23–25 April 2014; pp. 1591–1595. [Google Scholar] [CrossRef]
- Korecki, Z.; Smrž, V.; Pecháček, T. Support of the logistics chain by small aircraft in times of emergency. In Proceedings of the 2020 New Trends in Aviation Development (NTAD), Stary Smokovec, Slovakia, 17–18 September 2020; pp. 136–141. [Google Scholar] [CrossRef]
- European Commission White Paper: On Artificial Intelligence—A European Approach to Excellence and Trust. Brussels. 2020. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020DC0065 (accessed on 27 July 2023).
- European Commission Ethics Guidelines for Trustworthy AI. 2020. Available online: https://ec.europa.eu/futurium/en/ai-alliance-consultation.1.html#:~:text=The%20Ethics%20Guidelines%20for%20Trustworthy%20Artificial%20Intelligence%20%28AI%29,as%20part%20of%20the%C2%A0AI%20strategy%C2%A0announced%20earlier%20that%20year (accessed on 27 July 2023).
- Truby, J.; Brown, R.; Ibrahim, I.; Parellada, O. A Sandbox Approach to Regulating High-Risk Artificial Intelligence Applications. Eur. J. Risk Regul. 2022, 13, 270–294. [Google Scholar] [CrossRef]
- UNESCO. Artificial Intelligence: Examples of Ethical Dilemmas. 2023. Available online: https://www.unesco.org/en/artificial-intelligence/recommendation-ethics/cases (accessed on 27 July 2023).
- Tarazona Lizarraga, C. Análisis de las necesidades de una Smart City en el marco de un desarrollo sostenible. Master’s Dissertation, Universitat Oberta de Catalunya, Barcelona, Spain, 2020. [Google Scholar]
- Wakabayashi, D.; Shane, S. Google Will Not Renew Pentagon Contract That Upset Employees. The New York Times. June 2018. Available online: https://www.nytimes.com/2018/06/01/technology/google-pentagon-project-maven.html (accessed on 27 July 2023).
- Roldán Tudela, J.M. Artificial Intelligence Application in Defence. Spanish Institute of Technological Studies. June 2018, p. 166. Available online: https://www.ieee.es/Galerias/fichero/docs_trabajo/2019/DIEEET0-2018La_inteligencia_artificial.pdf (accessed on 27 July 2023).
- Breaking Defense. BD Checks Out Army’s Robotic Gun: ATLAS 2020. Breaking Defense, Land Warfare, Networks/Cyber. 2020. Available online: https://breakingdefense.com/2020/10/bd-checks-out-armys-robotic-gun-atlas/ (accessed on 27 July 2023).
- Strout, N. How the Army Plans to Revolutionize Tanks with Artificial Intelligence. C4ISRNET, Artificial Intelligence. October 2020. Available online: https://www.c4isrnet.com/artificial-intelligence/2020/10/29/how-the-army-plans-to-revolutionize-tanks-with-artificial-intelligence/ (accessed on 27 July 2023).
- Wang, W.; Liu, H.; Lin, W.; Chen, Y.; Yang, J.A. Investigation on Works and Military Applications of Artificial Intelligence. IEEE Access 2020, 8, 131614–131625. [Google Scholar] [CrossRef]
- Ahmed, F.; Vaishnavi, P.; Eykholt, K.; Rahmati, A. Ares: A System-Oriented Wargame Framework for Adversarial ML. In Proceedings of the 2022 IEEE Security and Privacy Workshops (SPW), Francisco, CA, USA, 22–26 May 2022; pp. 73–79. [Google Scholar] [CrossRef]
- Intizhami, N.S.; Husodo, A.Y.; Jatmiko, W. Warfare Simulation:Predicting Battleship Winner Using Random Forest. In Proceedings of the 2019 IEEE International Conference on Communication, Networks and Satellite (Comnetsat), Makassar, Indonesia, 1–3 August 2019; pp. 30–34. [Google Scholar] [CrossRef]
Response Rate | Comment |
---|---|
67% | All types of SALAs should be banned internationally. |
56% | The use and development of SALAs should be prohibited. |
85% | SALAs should not be used for offensive purposes. |
71% | Remotely operated weapon systems should be used instead of SALAs. |
60% | The respondent would prefer to be attacked by remotely operated systems rather than SALAs. |
Challenges | Warfare Simulation Predicting Battleship Winner Using Random Forest [37] |
---|---|
Possible friendly fire | In this case, this challenge did not apply, since the algorithm did not have to identify friendly or enemy units—it only predicted the winner. |
Adversarial attacks against ML models | The enemy could match the disposition of dummy weapons. One would have to check whether this could affect the training data and the final result. |
Transparency | In order for the command to completely trust the prediction of the algorithm, it should be aware of all sources and constraints. In this case, the information appeared transparent but was also very simple. |
Ethics in decisions made by machines | In this case, this challenge did not apply since the algorithm did not make decisions. It only predicted the winner. |
The scarcity of data and the lack of values | The reference used 9660 battleship datasets, but there were confidential data such as possible secret weapons or novel defense systems that were not covered. |
Failures in the evaluation criteria | Without battlefield data and with the limitation of training data, one would not be sure whether the algorithm was valid and reliable in a real scenario. |
The complexity of modeling the tactical environment | The study did not consider the scenario in which the battle would take place nor the initial state of the combat units. It only took into account the size, speed, capacity, number of crew, attack, additional attack, and defense of the ships. |
Limited and uncertain information | The study offered only one final winner. It was necessary to discretize the time and action in case there was, for example, a misfire or weapon limitation. This would change the situation. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alcántara Suárez, E.J.; Monzon Baeza, V. Evaluating the Role of Machine Learning in Defense Applications and Industry. Mach. Learn. Knowl. Extr. 2023, 5, 1557-1569. https://doi.org/10.3390/make5040078
Alcántara Suárez EJ, Monzon Baeza V. Evaluating the Role of Machine Learning in Defense Applications and Industry. Machine Learning and Knowledge Extraction. 2023; 5(4):1557-1569. https://doi.org/10.3390/make5040078
Chicago/Turabian StyleAlcántara Suárez, Evaldo Jorge, and Victor Monzon Baeza. 2023. "Evaluating the Role of Machine Learning in Defense Applications and Industry" Machine Learning and Knowledge Extraction 5, no. 4: 1557-1569. https://doi.org/10.3390/make5040078
APA StyleAlcántara Suárez, E. J., & Monzon Baeza, V. (2023). Evaluating the Role of Machine Learning in Defense Applications and Industry. Machine Learning and Knowledge Extraction, 5(4), 1557-1569. https://doi.org/10.3390/make5040078