An XAI-based adversarial training approach for cyber-threat detection

被引:3
作者
Al-Essa, Malik [1 ]
Andresini, Giuseppina [1 ]
Appice, Annalisa [1 ]
Malerba, Donato [1 ]
机构
[1] Univ Bari Aldo Moro, Dept Comp Sci, Bari, Italy
来源
2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH) | 2022年
关键词
Adversarial training; eXplainable Artificial Intelligence; Transfer learning; Cyber-threat detection;
D O I
10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial training is commonly used in the artificial intelligence literature to improve the robustness of deep neural models to adversarial samples. In addition, eXplainable Artificial Intelligence (XAI) has been recently investigated to improve the interpretability and explainability of black-box artificial systems such as deep neural models. In this study, we propose a methodology that combines adversarial training and XAI, in order to increase the accuracy of deep neural models trained for cyber-threat detection. In particular, we use the FGSM technique to generate the adversarial samples for the adversarial training stage, and SHAP to produce the local explanations of decisions made during the adversarial training stage. These local explanations are, subsequently, used to produce a new feature set that describes the effect of the original cyber-data characteristics on the classifications of the examples processed during the adversarial training stage. Leveraging this XAI-based information, we apply a transfer learning strategy, namely fine-tuning, to improve the accuracy performance of the deep neural model. Experiments conducted on two benchmark cybersecurity datasets prove the effectiveness of the proposed methodology in the multi-class classification of cyber-data.
引用
收藏
页码:806 / 813
页数:8
相关论文
共 24 条
  • [1] Andresini Giuseppina, 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, P111, DOI 10.1145/3474369.3486864
  • [2] Andresini G., 2021, Mach. Intell. Big Data Anal. Cybersecur. Appl., P105
  • [3] Andresini G., 2022, J COMPUT MATH DATA S, V3
  • [4] ROULETTE: A neural attention multi-output model for explainable Network Intrusion Detection
    Andresini, Giuseppina
    Appice, Annalisa
    Caforio, Francesco Paolo
    Malerba, Donato
    Vessio, Gennaro
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 201
  • [5] GAN augmentation to deal with imbalance in imaging-based intrusion detection
    Andresini, Giuseppina
    Appice, Annalisa
    De Rose, Luca
    Malerba, Donato
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 123 (123): : 108 - 127
  • [6] Bai T, 2021, PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, P4312
  • [7] Berman D. S., INFORMATION, V10
  • [8] Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Systems
    Caforio, Francesco Paolo
    Andresini, Giuseppina
    Vessio, Gennaro
    Appice, Annalisa
    Malerba, Donato
    [J]. DISCOVERY SCIENCE (DS 2021), 2021, 12986 : 385 - 400
  • [9] Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study
    Engelen, Gints
    Rimmer, Vera
    Joosen, Wouter
    [J]. 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 7 - 12
  • [10] On learning effective ensembles of deep neural networks for intrusion detection
    Folino, F.
    Folino, G.
    Guarascio, M.
    Pisani, F. S.
    Pontieri, L.
    [J]. INFORMATION FUSION, 2021, 72 : 48 - 69