Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data

被引:17
作者
Le, Thi-Thu-Huong [1 ,2 ]
Wardhani, Rini Wisnu [3 ]
Putranto, Dedy Septono Catur [1 ,2 ]
Jo, Uk [3 ,4 ]
Kim, Howon [3 ]
机构
[1] Pusan Natl Univ, Blockchain Platform Res Ctr, Busan 609735, South Korea
[2] Pusan Natl Univ, IoT Res Ctr, Busan 609735, South Korea
[3] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 609735, South Korea
[4] Software Secur Team, SmartM2M, Busan 48058, South Korea
关键词
Internet of Things; Security; Intrusion detection; Impurities; Computational modeling; Feature extraction; Ensemble learning; Counterfactual; ensemble blending model; IoT; IDS; LIME; XAI; ANOMALY DETECTION; INTERNET; THINGS;
D O I
10.1109/ACCESS.2023.3336678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing the Internet of Things (IoT) against cyber threats is a formidable challenge, and Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of transparent explanations for IDS decisions remains a significant concern. In response, we introduce a novel approach that leverages a blending model for attack classification and integrates counterfactual and Local Interpretable Model-Agnostic Explanations (LIME) techniques to enhance explanations. To assess the effectiveness of our approach, we conducted experiments using the recently introduced CICIoT2023 and IoTID20 datasets. These datasets are real-time and large-scale benchmark datasets for IoT environment attacks, offering a realistic and challenging scenario that captures the intricacies of intrusion detection in dynamic IoT environments. Our experimental results demonstrate significant improvements in attack detection accuracy compared to conventional IDS methods. Furthermore, our proposed approach provides clear and interpretable insights into the factors influencing classification decisions, empowering users to make informed security choices. Integrating blending model classification and explanation techniques enhances the security and reliability of IoT systems. Therefore, this work represents a significant advancement in IoT intrusion detection, offering a robust and transparent defense against large-scale cyber-attacks of IoT environment data.
引用
收藏
页码:131661 / 131676
页数:16
相关论文
共 50 条
[1]   A New Ensemble-Based Intrusion Detection System for Internet of Things [J].
Abbas, Adeel ;
Khan, Muazzam A. ;
Latif, Shahid ;
Ajaz, Maria ;
Shah, Awais Aziz ;
Ahmad, Jawad .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :1805-1819
[2]   Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms [J].
Alkahtani, Hasan ;
Aldhyani, Theyazn H. H. .
COMPLEXITY, 2021, 2021
[3]   Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things' Devices Security [J].
Alotaibi, Yazeed ;
Ilyas, Mohammad .
SENSORS, 2023, 23 (12)
[4]   An Ensemble Multi-View Federated Learning Intrusion Detection for IoT [J].
Attota, Dinesh Chowdary ;
Mothukuri, Viraaji ;
Parizi, Reza M. ;
Pouriyeh, Seyedamin .
IEEE ACCESS, 2021, 9 :117734-117745
[5]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[6]   Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks [J].
Bhayo, Jalal ;
Shah, Syed Attique ;
Hameed, Sufian ;
Ahmed, Awais ;
Nasir, Jamal ;
Draheim, Dirk .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 123
[7]   Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments [J].
de Souza, Cristiano Antonio ;
Westphall, Carlos Becker ;
Machado, Renato Bobsin .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
[8]   Ensemble methods in machine learning [J].
Dietterich, TG .
MULTIPLE CLASSIFIER SYSTEMS, 2000, 1857 :1-15
[9]   A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model [J].
Gopalakrishnan, B. ;
Purusothaman, P. .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (05) :2199-2226
[10]  
Han H, 2016, INT CONF SOFTW ENG, P219, DOI 10.1109/ICSESS.2016.7883053