XAI for intrusion detection system: comparing explanations based on global and local scope

被引:24
|
作者
Hariharan, Swetha [1 ]
Robinson, R. R. Rejimol [2 ]
Prasad, Rendhir R. [3 ]
Thomas, Ciza [4 ]
Balakrishnan, N. [1 ]
机构
[1] Indian Inst Sci, Supercomp Educ & Res Ctr, Bangalore, Karnataka, India
[2] SCT Coll Engn, Thiruvananthapuram, Kerala, India
[3] Govt Engn Coll, Barton Hill, Thiruvananthapuram, Kerala, India
[4] Govt Kerala, Directorate Tech Educ, Thiruvananthapuram, Kerala, India
关键词
Intrusion detection system; RF; XGBoost; LightGBM; XAI; SHAP; LIME; Permutation importance; Contextual importance and utility;
D O I
10.1007/s11416-022-00441-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System is a device or software in the field of cybersecurity that has become an essential tool in computer networks to provide a secured network environment. Machine Learning based IDS offers a self-learning solution and provides better performance when compared to traditional IDS. As the predictive performance of IDS is based on conflicting criteria, the underlying algorithms are becoming more complex and hence, less transparent. Explainable Artificial Intelligence is a set of frameworks that help to develop interpretable and inclusive machine learning models. In this paper, we use Permutation Importance, SHapley Additive exPlanation, Local Interpretable Model-Agnostic Explanation algorithms, Contextual Importance and Utility algorithms, covering both global and local scope of explanation to IDSs on Random Forest, eXtreme Gradient Boosting and Light Gradient Boosting machine learning models along with a comparison of explanations in terms of accuracy, consistency and stability. This comparison can help cyber security personnel to have a better understanding of the predictions of cyber-attacks in the network traffic. A case study focusing on DoS attack variants shows some useful insights on the impact of features in prediction performance.
引用
收藏
页码:217 / 239
页数:23
相关论文
共 50 条
  • [21] IoT Intrusion Detection System Based on Machine Learning
    Xu, Bayi
    Sun, Lei
    Mao, Xiuqing
    Ding, Ruiyang
    Liu, Chengwei
    ELECTRONICS, 2023, 12 (20)
  • [22] An Intrusion Detection System Model Based on Bidirectional LSTM
    Alsyaibani, Omar Muhammad Altoumi
    Utami, Ema
    Hartanto, Anggit Dwi
    3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 13 - 18
  • [23] Watchdog and Pathrater based Intrusion Detection System for MANET
    Saifuddin, Khaled Mohammed
    Bin Ali, Abu Jobayer
    Ahmed, Abu Shakil
    Alam, Sk. Shariful
    Ahmad, Abu Saleh
    2018 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT), 2018, : 168 - 173
  • [24] A comprehensive review of AI based intrusion detection system
    Sowmya T.
    Mary Anita E.A.
    Measurement: Sensors, 2023, 28
  • [25] Research in Intrusion Detection System Based on Mobile Agent
    Hou, Zhisong
    Yu, Zhou
    Zheng, Wei
    Zuo, Xiangang
    INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 233 - 240
  • [26] Clustering-Based Network Intrusion Detection System
    Fan, Chun-I
    Lai, Yen-Lin
    Shie, Cheng-Han
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [27] Smart Fluid Agent Based Intrusion Detection System
    Saha, Ankita
    Setua, S. K.
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 1070 - 1073
  • [28] An explainable intrusion detection system based on feature importance
    Liao, Peixin
    Huang, Xvxin
    Huang, Qiangbo
    Liang, Yanming
    Wang, Zhongxiao
    Zhang, Denghui
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 389 - 397
  • [29] Network Intrusion Detection System based on Direct LDA
    Saad, Alaoui-Adib
    Khalid, Chougdali
    Mohamed, Jedra
    PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [30] The development of intrusion detection system based on wavelet network
    Ji, Guang-Xian
    Advances in Information Sciences and Service Sciences, 2012, 4 (09): : 261 - 268