Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach

被引:39
作者
Sharma, Bhawana [1 ]
Sharma, Lokesh [1 ]
Lal, Chhagan [2 ]
Roy, Satyabrata [1 ]
机构
[1] Manipal Univ Jaipur, Jaipur, Rajasthan, India
[2] Delft Univ Technol, Dept Intelligent Syst, Cybersecur Grp, Delft, Netherlands
关键词
Intrusion detection system; DL; Deep neural network; Convolution neural network; XAI; Local interpretable model-agnostic; explanations; Shapley additive explanations;
D O I
10.1016/j.eswa.2023.121751
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is currently seeing tremendous growth due to new technologies and big data. Research in the field of IoT security is an emerging topic. IoT networks are becoming more vulnerable to new assaults as a result of the growth in devices and the production of massive data. In order to recognize the attacks, an intrusion detection system is required. In this work, we suggested a Deep Learning (DL) model for intrusion detection to categorize various attacks in the dataset. We used a filter-based approach to pick out the most important aspects and limit the number of features, and we built two different deep-learning models for intrusion detection. For model training and testing, we used two publicly accessible datasets, NSL-KDD and UNSW-NB 15. First, we applied the dataset on the Deep neural network (DNN) model and then the same dataset on Convolution Neural Network (CNN) model. For both datasets, the DL model had a better accuracy rate. Because DL models are opaque and challenging to comprehend, we applied the idea of explainable Artificial Intelligence (AI) to provide a model explanation. To increase confidence in the DNN model, we applied the explainable AI (XAI) Local Interpretable Model-agnostic Explanations (LIME ) method, and for better understanding, we also applied Shapley Additive Explanations (SHAP).
引用
收藏
页数:16
相关论文
共 43 条
[1]   Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm [J].
Abd Elaziz, Mohamed ;
Al-qaness, Mohammed A. A. ;
Dahou, Abdelghani ;
Ibrahim, Rehab Ali ;
Abd El-Latif, Ahmed A. .
ADVANCES IN ENGINEERING SOFTWARE, 2023, 176
[2]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[3]  
Al Hwaitat AK, 2020, INT J ADV COMPUT SC, V11, P614
[4]  
Al Nafea Roaa, 2021, 2021 International Conference on Information Technology (ICIT), P779, DOI 10.1109/ICIT52682.2021.9491638
[5]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[6]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[7]   An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network [J].
Ali, Aitizaz ;
Almaiah, Mohammed Amin ;
Hajjej, Fahima ;
Pasha, Muhammad Fermi ;
Fang, Ong Huey ;
Khan, Rahim ;
Teo, Jason ;
Zakarya, Muhammad .
SENSORS, 2022, 22 (02)
[8]  
Almaiah A, 2020, J THEOR APPL INF TEC, V15, P98
[9]  
Almaiah MA, 2022, SENSORS-BASEL, V22, DOI 10.3390/s22041448
[10]   Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions [J].
Altulaihan, Esra ;
Almaiah, Mohammed Amin ;
Aljughaiman, Ahmed .
ELECTRONICS, 2022, 11 (20)