Improving IoT Security With Explainable AI: Quantitative Evaluation of Explainability for IoT Botnet Detection

被引:9
作者
Kalakoti, Rajesh [1 ]
Bahsi, Hayretdin [1 ,2 ]
Nomm, Sven [1 ]
机构
[1] Tallinn Univ Technol, Dept Software Sci, EE-12616 Tallinn, Estonia
[2] No Arizona Univ, Sch Informat Comp & Cyber Syst, Flagstaff, AZ 86011 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 10期
关键词
Botnet; Internet of Things; Task analysis; Explainable AI; Feature extraction; Complexity theory; Artificial neural networks; complexity; consistency; explainable artificial intelligence (XAI); faithfulness; feature importance; Internet of Things (IoT); local interpretable model-agnostic explanations (LIME); posthoc XAI; robustness; Shapley additive explanation (SHAP); ARTIFICIAL-INTELLIGENCE; SELECTION; INTERNET; THINGS;
D O I
10.1109/JIOT.2024.3360626
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting botnets is an essential task to ensure the security of Internet of Things (IoT) systems. Machine learning (ML)-based approaches have been widely used for this purpose, but the lack of interpretability and transparency of the models often limits their effectiveness. In this research paper, our aim is to improve the transparency and interpretability of high-performance ML models for IoT botnet detection by selecting higher quality explanations using explainable artificial intelligence (XAI) techniques. We used three data sets to induce binary and multiclass classification models for IoT botnet detection, with sequential backward selection (SBS) employed as the feature selection technique. We then use two post hoc XAI techniques such as local interpretable model-agnostic explanations (LIME) and Shapley additive explanation (SHAP), to explain the behavior of the models. To evaluate the quality of explanations generated by XAI methods, we employed faithfulness, monotonicity, complexity, and sensitivity metrics. ML models employed in this work achieve very high detection rates with a limited number of features. Our findings demonstrate the effectiveness of XAI methods in improving the interpretability and transparency of ML-based IoT botnet detection models. Specifically, explanations generated by applying LIME and SHAP to the extreme gradient boosting model yield high faithfulness, high consistency, low complexity, and low sensitivity. Furthermore, SHAP outperforms LIME by achieving better results in these metrics.
引用
收藏
页码:18237 / 18254
页数:18
相关论文
共 70 条
  • [41] N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
    Meidan, Yair
    Bohadana, Michael
    Mathov, Yael
    Mirsky, Yisroel
    Shabtai, Asaf
    Breitenbacher, Dominik
    Elovici, Yuval
    [J]. IEEE PERVASIVE COMPUTING, 2018, 17 (03) : 12 - 22
  • [42] Miller T, 2018, Arxiv, DOI [arXiv:1706.07269, DOI 10.48550/ARXIV.1706.07269]
  • [43] Mirsky Y, 2018, Arxiv, DOI arXiv:1802.09089
  • [44] Moustafa N., 2019, P ERESEARCH AUSTRALA, P21
  • [45] Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions
    Moustafa, Nour
    Koroniotis, Nickolaos
    Keshk, Marwa
    Zomaya, Albert Y.
    Tari, Zahir
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (03): : 1775 - 1807
  • [46] Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
  • [47] A Systematic Review of Human-Computer Interaction and Explainable Artificial Intelligence in Healthcare With Artificial Intelligence Techniques
    Nazar, Mobeen
    Alam, Muhammad Mansoor
    Yafi, Eiad
    Su'ud, Mazliham Mohd
    [J]. IEEE ACCESS, 2021, 9 : 153316 - 153348
  • [48] Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities
    Neupane, Subash
    Ables, Jesse
    Anderson, William
    Mittal, Sudip
    Rahimi, Shahram
    Banicescu, Ioana
    Seale, Maria
    [J]. IEEE ACCESS, 2022, 10 : 112392 - 112415
  • [49] Encrypted and covert DNS queries for botnets: Challenges and countermeasures
    Patsakis, Constantinos
    Casino, Fran
    Katos, Vasilios
    [J]. COMPUTERS & SECURITY, 2020, 88
  • [50] Pawar U., 2020, P AICS, P169