Explainable Machine Learning for Intrusion Detection

被引:0
|
作者
Bellegdi, Sameh [1 ]
Selamat, Ali [1 ,2 ,3 ,4 ]
Olatunji, Sunday O. [5 ]
Fujita, Hamido [1 ]
Krejcar, Ondfrej [4 ]
机构
[1] Univ Teknol Malaysia UTM, Malaysia Japan Int Inst Technol, Kuala Lumpur 54100, Malaysia
[2] Univ Teknol Malaysia, Univ Teknol Malaysia UTM, Fac Comp, Johor Baharu 81310, Johor, Malaysia
[3] Univ Teknol Malaysia, Media & Games Ctr Excellence MagicX, Johor Baharu 81310, Johor, Malaysia
[4] Univ Hradec Kralove, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic
[5] Imam Abdulrahman Bin Faisal Univ, Dammam 31441, Saudi Arabia
关键词
intrusion detection; IDS; machine learning; explainable machine learning; XAI; SHAP; LIME;
D O I
10.1007/978-981-97-4677-4_11
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection systems (IDS) are essential tools to maintain robust cybersecurity. Machine learning (ML)-based IDS provides promising results. However, such IDS are recognized as black-box and lack trust and transparency. There is a limited number of explainable IDS (X-IDS). Moreover, several X-IDS used outdated datasets. Some papers used deep neural network which is computationally expensive. This paper proposes lightweight tree-based X-IDS using a recent IDS dataset. We explore the effectiveness of explainable artificial intelligence (XAI) techniques in increasing ML-based IDS transparency. Four ML algorithms are employed; viz. LightGBM, random forests, AdaBoost, and XGBoost; to classify a given network flow as benign or malicious. Network flows extracted from the CSE-CIC-IDS2018 dataset are used to evaluate the IDS models. The best F1-score results of 0.979 and 0.978 are achieved with LightGBM and XGBoost, respectively. We use SHapley Additive exPlanations (SHAP) and Local Model-Agnostic Explanations (LIME) techniques to provide global and local explanations for predictions made by the LightGBM. The obtained explanations in the form of graphs provide measurable insights for cybersecurity experts regarding the most important features that impact the detection of intrusions.
引用
收藏
页码:122 / 134
页数:13
相关论文
共 50 条
  • [41] Network intrusion detection system: A machine learning approach
    Panda, Mrutyunjaya
    Abraham, Ajith
    Das, Swagatam
    Patra, Manas Ranjan
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2011, 5 (04): : 347 - 356
  • [42] Machine learning based intrusion detection system for IoMT
    Kulshrestha, Priyesh
    Vijay Kumar, T. V.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (05) : 1802 - 1814
  • [43] A Review of Machine Learning Methodologies for Network Intrusion Detection
    Phadke, Aditya
    Kulkarni, Mohit
    Bhawalkar, Pranav
    Bhattad, Rashmi
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 272 - 275
  • [44] Anomaly Based Intrusion Detection for IoT with Machine Learning
    Shaver, Addison
    Liu, Zhipeng
    Thapa, Niraj
    Roy, Kaushik
    Gokaraju, Balakrishna
    Yuan, Xiaohon
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [45] Intrusion detection with autoencoder based deep learning machine
    Kaynar, Oguz
    Yuksek, Ahmet Gurkan
    Gormez, Yasin
    Isik, Yunus Emre
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [46] Application of adversarial machine learning in network intrusion detection
    Liu, Qixu
    Wang, Junnan
    Yin, Jie
    Chen, Yanhui
    Liu, Jiaxi
    Tongxin Xuebao/Journal on Communications, 2021, 42 (11): : 1 - 12
  • [47] Machine learning-based intrusion detection algorithms
    Tang, Hua
    Cao, Zhuolin
    Journal of Computational Information Systems, 2009, 5 (06): : 1825 - 1831
  • [48] Intrusion Detection Technology Based on Machine Learning Method
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5165 - 5168
  • [49] Research on the application of machine learning to intrusion detection in WSN
    Jiang, Laiwei
    Gu, Haiyang
    Xie, Lixia
    Yang, Hongyu
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (04): : 206 - 225
  • [50] PAREEKSHA - A Machine Learning Approach for Intrusion and Anomaly Detection
    Nagaraja, Arun
    Aljawarneh, Shadi
    Prabhakara, H. S.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE, E-LEARNING AND INFORMATION SYSTEMS 2018 (DATA'18), 2018,