Open Access

Enhancing Intrusion Detection with Explainable AI: A Transparent Approach to Network Security


Cite

Udas, M., E. Karim, K. S. Ro. SPIDER: A Shallow PCA-Based Network Intrusion Detection System with Enhanced Recurrent Neural Networks. – Journal of King Saud University – Computer and Information Sciences, Vol. 34, 2022, No 10, pp. 10246-10272.Search in Google Scholar

Wang, K. Zheng, Y. Yang, X. Wang. An Explainable Machine Learning Framework for Intrusion Detection Systems. – IEEE Access, Vol. 8, 2020, pp. 73127-73141.Search in Google Scholar

Premkumar, T., V. P. Sundararajan. DLDM: Deep Learning-Based Defense Mechanism for Denial of Service Attacks in Wireless Sensor Networks. – Microprocess. Microsystems, Vol. 79, 2020, No August, 103278.Search in Google Scholar

IBM Security Cost of a Data Breach Report 2022. 2022.Search in Google Scholar

Fleck, A. Inflation Becomes the Leading Global Concern in 2022. – Statista, 2022 (Accessed 22 Junе 2023). https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/Search in Google Scholar

Alhenawi, H., R. Alazzam, O. Al-Sayyed, Abualghanam, O. Adwan. Hybrid Feature Selection Method for Intrusion Detection Systems Based on an Improved Intelligent Water Drop Algorithm. – Cybernetics and Information Technologies, Vol. 22, 2022, No 4, pp. 73-90.Search in Google Scholar

Batchu, H. Seetha. An Integrated Approach Explaining the Detection of Distributed Denial of Service Attacks. – Computer Networks, 2022, 109269.Search in Google Scholar

Mallampati, H. Seetha. A Review on Recent Approaches of Machine Learning, Deep Learning, and Explainable Artificial Intelligence in Intrusion Detection Systems. – Majelisi Journal of Electrical Engineering, Vol. 17, 2023, No 1, pp. 29-54.Search in Google Scholar

Kim, L. Y., H. Kim. Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks. – Applied Sciences, Vol. 9, 2019, No 7.Search in Google Scholar

Roy, J., B. Li, Choi, Y. Bai. A Lightweight Supervised Intrusion Detection Mechanism for IoT Networks. – Futurre Genereration Computer Systems, Vol. 127, 2022, pp. 276-285.Search in Google Scholar

Saha, A., T. Priyoti, A. Sharma. Towards an Optimised Ensemble Feature Selection for DDoS Detection Using Both Supervised and Unsupervised Method. – In: Proc. of 19th Annual Consumer Communications and Networking Conference (CCNC’22), Las Vegas, N. V., USA, 2022.Search in Google Scholar

De Souza, C., B. Westphall, R. B. Machado, J. B. M. Sobral, G. dos S. Vieira. Hybrid Approach to Intrusion Detection in Fog-Based IoT Environments. – Computer Networks. Vol. 180, 2020.Search in Google Scholar

Yin, Y., et al. IGRF-RFE: A Hybrid Feature Selection Method for MLP-Based Network Intrusion Detection on UNSW-NB15 Dataset. – Journal of Big Data, Vol. 10, 2023, No 1.Search in Google Scholar

Patil, S., et al. Explainable Artificial Intelligence for Intrusion Detection System. – Electronics, Vol. 11, 2022, No 19.Search in Google Scholar

Kannari, N., S. Chowdary, R. Laxmikanth Biradar. An Anomaly-Based Intrusion Detection System Using Recursive Feature Elimination Technique for Improved Attack Detection. – In: Theory of Compututer Science. Vol. 931. 2022, pp. 56-64.Search in Google Scholar

Thakkar, A., R. Lohiya. Fusion of Statistical Importance for Feature Selection in Deep Neural Network-Based Intrusion Detection System. – Information Fusion, Vol. 90, 2023, No February, pp. 353-363.Search in Google Scholar

Hariharan, R., R. Rejimol Robinson, R. R. Prasad, C. Thomas, N. Balakrishnan. XAI for Intrusion Detection System: Comparing Explanations Based on Global and Local Scope. – Journal of Computer Viroogy. Hacking Technologies, Vol. 19, 2023, No 2, pp. 217-239.Search in Google Scholar

Alani, M. M. An Explainable Efficient Flow-Based Industrial IoT Intrusion Detection System. – Computers Electrctriacal Engginering, Vol. 108, 2023, No April, 108732.Search in Google Scholar

Sharafaldin, A., H. Lashkari, A. A. Ghorbani. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. – In: Proc. of Int. Conf. on Systems Security and Privacy, 2018, No Cic, pp. 108-116.Search in Google Scholar

Moustafa, N., J. Slay. UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set). – In: Proc of Mil. Commun. Inf. Syst. Conf. (MilCIS’15), 2015, No November.Search in Google Scholar

Veera Brahmam, M., S. Gopikrishnan, K. Raja Sravan Kumar, M. Seshu Bhavani. Pearson Correlation Based Outlier Detection in Spatial-Temporal Data of IoT Networks. – In: Proc. of Innov. Data Commun. Technol. Appl. Proc. ICIDCA 2021, Singapore, Springer, Nature, Singapore, Vol. 96, 2022, pp. 1019-1028).Search in Google Scholar

Silva, N., R. de Oliveira, D. S. V. Medeiros, M. A. Lopez, D. M. F. Mattos. A Statistical Analysis of Intrinsic Bias of Network Security Datasets for Training Machine Learning Mechanisms. – Annals of Telecommunications,Vol. 77, 2022, pp. 555-571Search in Google Scholar

Vergara, P., A. Estévez. A Review of Feature Selection Methods Based on Mutual Information. – Neural Computer Applications, Vol. 24, 2014, No 1, pp. 175-186.Search in Google Scholar

Pudil, J., Novovičová, J. Kittler. Floating Search Methods in Feature Selection. – Pattern Recognit. Lett., Vol. 15, 1994, No 11, pp. 1119-1125.Search in Google Scholar

Shirbani, F., H. Soltanian-Zadeh. Fast SFFS-Based Algorithm for Feature Selection in Biomedical Datasets. – Amirkabir Journal of Science and Technology, Vol. 45, 2013, No 2, pp. 43-56.Search in Google Scholar

Ke, G., et al. LightGBM: A Highly Efficient Gradient Boosting Decision Tree. – In: Proc of Conference on Neural Information Processing Systems, Vol. 2017, 2017, No December, pp. 3147-3155.Search in Google Scholar

Lundberg, P., G. Allen, S.-I. Lee. A Unified Approach to Interpreting Model Predictions (online). https://github.com/slundberg/shapSearch in Google Scholar

Gu, K., Li, Z. Guo, Y. Wang. Semi-Supervised k-Means DDOS Detection Method Using Hybrid Feature Selection Algorithm. – IEEE Access, Vol. 7, 2019, pp. 64351-64365.Search in Google Scholar

Mhawi, A., Aldallal, S. Hassan. Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems. – Symmetry (Basel), Vol. 14, 2022, No 7.Search in Google Scholar

Fu, J., X. Lan Zhang. Gradient Importance Enhancement Based Feature f Fusion Intrusion Detection Technique. – Computer Networks, Vol. 214, 2022 No May, 109180.Search in Google Scholar

Kasongo, Sydney Mambwe. A Deep Learning Technique for Intrusion Detection System Using a Recurrent Neural Networks Based Framework. – Computer Communications, Vol. 199, 2023, pp. 113-125.Search in Google Scholar

Kasongo, Y. Sun. A Deep Learning Method with Wrapper Based Feature Extraction for Wireless Intrusion Detection System. – Computers Security, Vol. 92, 2020.Search in Google Scholar

Eunice, Q., M. Gao, Y. Zhu, Z. Chen, N. Lv. Network Anomaly Detection Technology Based on Deep Learning. – In: Proc. of 3rd Int. IEEE Conf. Front. Technol. Inf. Comput. ICFTIC 2021, pp. 6-9.Search in Google Scholar

Kasongo. An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms. – IEEE Access, Vol. 9, 2021, pp. 113199-113212.Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology