An Explainable LSTM-Based Intrusion Detection System Optimized by Firefly Algorithm for IoT Networks

被引:0
作者
Ogunseyi, Taiwo Blessing [1 ]
Thiyagarajan, Gogulakrishan [2 ]
机构
[1] Yibin Univ, Sch Elect & Informat Engn, Yibin 644000, Peoples R China
[2] Cisco Syst Inc, Software Engn, Austin, TX 78759 USA
关键词
explainable artificial intelligence (XAI); intrusion detection system; LSTM-based model; firefly algorithm; LIME; SHAP; FEATURE-SELECTION; EXPLANATIONS; CHALLENGES;
D O I
10.3390/s25072288
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As more IoT devices become connected to the Internet, the attack surface for cybercrimes expands, leading to significant security concerns for these devices. Existing intrusion detection systems (IDSs) designed to address these concerns often suffer from high rates of false positives and missed threats due to the presence of redundant and irrelevant information for the IDSs. Furthermore, recent IDSs that utilize artificial intelligence are often presented as black boxes, offering no explanation of their internal operations. In this study, we develop a solution to the identified challenges by presenting a deep learning-based model that adapts to new attacks by selecting only the relevant information as inputs and providing transparent internal operations for easy understanding and adoption by cybersecurity personnel. Specifically, we employ a hybrid approach using statistical methods and a metaheuristic algorithm for feature selection to identify the most relevant features and limit the overall feature set while building an LSTM-based model for intrusion detection. To this end, we utilize two publicly available datasets, NF-BoT-IoT-v2 and IoTID20, for training and testing. The results demonstrate an accuracy of 98.42% and 89.54% for the NF-BoT-IoT-v2 and IoTID20 datasets, respectively. The performance of the proposed model is compared with that of other machine learning models and existing state-of-the-art models, demonstrating superior accuracy. To explain the proposed model's predictions and increase trust in its outcomes, we applied two explainable artificial intelligence (XAI) tools: Local Interpretable Model-agnostic Explanations (LIME) and Shapley Additive Explanations (SHAP), providing valuable insights into the model's behavior.
引用
收藏
页数:26
相关论文
共 45 条
[1]   An Optimized Hybrid Approach for Feature Selection Based on Chi-Square and Particle Swarm Optimization Algorithms [J].
Abdo, Amani ;
Mostafa, Rasha ;
Abdel-Hamid, Laila .
DATA, 2024, 9 (02)
[2]   An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning [J].
Abu Alghanam, Orieb ;
Almobaideen, Wesam ;
Saadeh, Maha ;
Adwan, Omar .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
[3]  
Ahmad R, 2023, ARTIF INTELL REV, V56, P10733, DOI [10.53762/alqamar.06.04.u01, 10.1007/s10462-023-10437-z]
[4]  
Ahmed S, 2025, IEEE ACCESS, V13, P37370, DOI [10.1109/access.2024.3422319, 10.1109/ACCESS.2024.3422319]
[5]   An Improved Mutual Information Feature Selection Technique for Intrusion Detection Systems in the Internet of Medical Things [J].
Alalhareth, Mousa ;
Hong, Sung-Chul .
SENSORS, 2023, 23 (10)
[6]   IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method [J].
Albulayhi, Khalid ;
Abu Al-Haija, Qasem ;
Alsuhibany, Suliman A. ;
Jillepalli, Ananth A. ;
Ashrafuzzaman, Mohammad ;
Sheldon, Frederick T. .
APPLIED SCIENCES-BASEL, 2022, 12 (10)
[7]   Explainable Artificial Intelligence Enabled Intrusion Detection in the Internet of Things [J].
Ali, Mohammad ;
Zhang, Jielun .
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON INTELLIGENT COMPUTING AND NETWORKING 2024, ISICN 2024, 2024, 1094 :403-414
[8]  
Althubiti SA, 2018, 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P293
[9]   Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms [J].
Altulaihan, Esra ;
Almaiah, Mohammed Amin ;
Aljughaiman, Ahmed .
SENSORS, 2024, 24 (02)
[10]   A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods [J].
Alzaabi, Fatima Rashed ;
Mehmood, Abid .
IEEE ACCESS, 2024, 12 :30907-30927