Evaluating Feature Relevance XAI in Network Intrusion Detection

被引:0
|
作者
Tritscher, Julian [1 ]
Wolf, Maximilian [2 ]
Hotho, Andreas [1 ]
Schloer, Daniel [1 ]
机构
[1] Univ Wurzburg, D-97074 Wurzburg, Germany
[2] Coburg Univ Appl Sci, D-96450 Coburg, Germany
关键词
Anomaly detection; Feature relevance; Explainable AI;
D O I
10.1007/978-3-031-44064-9_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As machine learning models become increasingly complex, there is a growing need for explainability to understand and trust the decision-making processes. In the domain of network intrusion detection, post-hoc feature relevance explanations have been widely used to provide insight into the factors driving model decisions. However, recent research has highlighted challenges with these methods when applied to anomaly detection, which can vary in importance and impact depending on the application domain. In this paper, we investigate the challenges of post-hoc feature relevance explanations for network intrusion detection, a critical area for ensuring the security and integrity of computer networks. To gain a deeper understanding of these challenges for the application domain, we quantitatively and qualitatively investigate the popular feature relevance approach SHAP when explaining different network intrusion detection approaches. We conduct experiments to jointly evaluate detection quality and explainability, and explore the impact of replacement data, a commonly overlooked hyperparameter of post-hoc feature relevance approaches. We find that post-hoc XAI can provide high quality explanations, but requires a careful choice of its replacement data as default settings and common choices do not transfer across different detection models. Our study showcases the viability of post-hoc XAI for network intrusion detection systems, but highlights the need for rigorous evaluations of produced explanations.
引用
收藏
页码:483 / 497
页数:15
相关论文
共 50 条
  • [21] False Positive Identification in Intrusion Detection Using XAI
    Lopes, Ricardo Da Silveira
    Duarte, Julio Cesar
    Goldschmidt, Ronaldo Ribeiro
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2023, 21 (06) : 745 - 751
  • [22] Network Intrusion Detection Method Based on Relevance Deep Learning
    Jing, Li
    Bin, Wang
    [J]. 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2017, : 237 - 240
  • [23] Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-Based Network Intrusion Detection
    Sarhan, Mohanad
    Layeghy, Siamak
    Portmann, Marius
    [J]. BIG DATA RESEARCH, 2022, 30
  • [24] Network intrusion detection using feature fusion with deep learning
    Ayantayo, Abiodun
    Kaur, Amrit
    Kour, Anit
    Schmoor, Xavier
    Shah, Fayyaz
    Vickers, Ian
    Kearney, Paul
    Abdelsamea, Mohammed M.
    [J]. JOURNAL OF BIG DATA, 2023, 10 (01)
  • [25] Combinational Feature Selection Approach for Network Intrusion Detection System
    Garg, Tanya
    Kumar, Yogesh
    [J]. 2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 82 - 87
  • [26] Siamese Network Based Feature Learning for Improved Intrusion Detection
    Jmila, Houda
    Ibn Khedher, Mohamed
    Blanc, Gregory
    El Yacoubi, Mounim A.
    [J]. NEURAL INFORMATION PROCESSING (ICONIP 2019), PT I, 2019, 11953 : 377 - 389
  • [27] A study on the feature selection of network traffic for intrusion detection purpose
    Ma, Wanli
    Tran, Dat
    Sharma, Dharmendra
    [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 245 - +
  • [28] Intrusion detection based on feature transform using neural network
    Kim, WN
    Oh, SC
    Yoon, KR
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PT 2, PROCEEDINGS, 2004, 3037 : 212 - 219
  • [29] Effects-based feature identification for network intrusion detection
    Louvieris, Panos
    Clewley, Natalie
    Liu, Xiaohui
    [J]. NEUROCOMPUTING, 2013, 121 : 265 - 273
  • [30] Euclidean-based Feature Selection for Network Intrusion Detection
    Suebsing, Anirut
    Hiransakolwong, Nualsawat
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 222 - 229