An Adversarial Approach for Explainable AI in Intrusion Detection Systems

被引:0
作者
Marino, Daniel L. [1 ]
Wickramasinghe, Chathurika S. [1 ]
Manic, Milos [1 ]
机构
[1] Virginia Commonwealth Univ, Dept Comp Sci, Richmond, VA 23284 USA
来源
IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY | 2018年
关键词
Adversarial Machine Learning; Adversarial samples; Explainable AI; cyber-security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Despite the growing popularity of modern machine learning techniques (e.g. Deep Neural Networks) in cyber-security applications, most of these models are perceived as a black-box for the user. Adversarial machine learning offers an approach to increase our understanding of these models. In this paper we present an approach to generate explanations for incorrect classifications made by data-driven Intrusion Detection Systems (IDSs) An adversarial approach is used to find the minimum modifications (of the input features) required to correctly classify a given set of misclassified samples. The magnitude of such modifications is used to visualize the most relevant features that explain the reason for the misclassification. The presented methodology generated satisfactory explanations that describe the reasoning behind the mis-classifications, with descriptions that match expert knowledge. The advantages of the presented methodology are: 1) applicable to any classifier with defined gradients. 2) does not require any modification of the classifier model. 3) can be extended to perform further diagnosis (e.g. vulnerability assessment) and gain further understanding of the system. Experimental evaluation was conducted on the NSL-KDD99 benchmark dataset using Linear and Multilayer perceptron classifiers. The results are shown using intuitive visualizations in order to improve the interpretability of the results.
引用
收藏
页码:3237 / 3243
页数:7
相关论文
共 23 条
  • [1] Alvaro A. C., CHALLENGES SECURING
  • [2] Amarasinghe K., 2018, 2018 11 INT C HUM SY
  • [3] [Anonymous], 2016, General data protection regulation
  • [4] [Anonymous], 2017, WEB
  • [5] [Anonymous], 1999, Kdd cup 1999 dataset
  • [6] The security of machine learning
    Barreno, Marco
    Nelson, Blaine
    Joseph, Anthony D.
    Tygar, J. D.
    [J]. MACHINE LEARNING, 2010, 81 (02) : 121 - 148
  • [7] Barreno Marco, 2006, P 2006 ACM S INFORM, P16
  • [8] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [9] Frederickson C., 2018, ARXIV180207295
  • [10] Goodfellow I. J., 2015, INT C LEARN REPR