Evaluating Feature Relevance XAI in Network Intrusion Detection

被引:0
|
作者
Tritscher, Julian [1 ]
Wolf, Maximilian [2 ]
Hotho, Andreas [1 ]
Schloer, Daniel [1 ]
机构
[1] Univ Wurzburg, D-97074 Wurzburg, Germany
[2] Coburg Univ Appl Sci, D-96450 Coburg, Germany
关键词
Anomaly detection; Feature relevance; Explainable AI;
D O I
10.1007/978-3-031-44064-9_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As machine learning models become increasingly complex, there is a growing need for explainability to understand and trust the decision-making processes. In the domain of network intrusion detection, post-hoc feature relevance explanations have been widely used to provide insight into the factors driving model decisions. However, recent research has highlighted challenges with these methods when applied to anomaly detection, which can vary in importance and impact depending on the application domain. In this paper, we investigate the challenges of post-hoc feature relevance explanations for network intrusion detection, a critical area for ensuring the security and integrity of computer networks. To gain a deeper understanding of these challenges for the application domain, we quantitatively and qualitatively investigate the popular feature relevance approach SHAP when explaining different network intrusion detection approaches. We conduct experiments to jointly evaluate detection quality and explainability, and explore the impact of replacement data, a commonly overlooked hyperparameter of post-hoc feature relevance approaches. We find that post-hoc XAI can provide high quality explanations, but requires a careful choice of its replacement data as default settings and common choices do not transfer across different detection models. Our study showcases the viability of post-hoc XAI for network intrusion detection systems, but highlights the need for rigorous evaluations of produced explanations.
引用
收藏
页码:483 / 497
页数:15
相关论文
共 50 条
  • [1] Feature relevance XAI in anomaly detection: Reviewing approaches and challenges
    Tritscher, Julian
    Krause, Anna
    Hotho, Andreas
    [J]. FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2023, 6
  • [2] Evaluating Feature Selection Methods for Network Intrusion Detection with Kyoto Data
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Seliya, Naeem
    [J]. INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (01)
  • [3] E-XAI: Evaluating Black-Box Explainable AI Frameworks for Network Intrusion Detection
    Arreche, Osvaldo
    Guntur, Tanish R.
    Roberts, Jack W.
    Abdallah, Mustafa
    [J]. IEEE ACCESS, 2024, 12 : 23954 - 23988
  • [4] Robust Network Intrusion Detection Through Explainable Artificial Intelligence (XAI)
    Barnard, Pieter
    Marchetti, Nicola
    Dasilva, Luiz A.
    [J]. IEEE Networking Letters, 2022, 4 (03): : 167 - 171
  • [5] A Feature Selection Approach for Network Intrusion Detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Amnuaisuk, Somnuk-Phon
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 133 - 137
  • [6] Network Intrusion Detection with Improved Feature Representation
    Lee, Geonsu
    Rhee, Hochang
    Shim, Jae Hoon
    Koo, Hyung Il
    Cho, Nam Ik
    [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 2049 - 2054
  • [7] Network intrusion detection in covariance feature space
    Jin, Shuyuan
    Yeung, Daniel So
    Wang, Xizhao
    [J]. PATTERN RECOGNITION, 2007, 40 (08) : 2185 - 2197
  • [8] Relevance Feature Selection with Data Cleaning for Intrusion Detection System
    Suthaharan, Shan
    Panchagnula, Tejaswi
    [J]. 2012 PROCEEDINGS OF IEEE SOUTHEASTCON, 2012,
  • [9] Evaluating clustering techniques for network intrusion detection
    Zhong, S
    Khoshgoftaar, T
    Seliya, N
    [J]. TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2004, : 173 - 177
  • [10] Deceiving Post-hoc Explainable AI (XAI) Methods in Network Intrusion Detection
    Senevirathna, Thulitha
    Siniarski, Bartlomiej
    Liyanage, Madhusanka
    Wang, Shen
    [J]. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 107 - 112