2021
DOI: 10.36227/techrxiv.17169080
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Explainable AI and Random Forest Based Reliable Intrusion Detection system

Abstract: <p>Emerging Cyber threats with an increased dependency on vulnerable cyber-networks have jeopardized all stakeholders, making Intrusion Detection Systems (IDS) the essential network security requirement. Several IDS have been proposed in the past decade for preventing systems from cyber-attacks. Machine learning (ML) based IDS have shown remarkable performance on conventional cyber threats. However, the introduction of adversarial attacks in the cyber domain highlights the need to upgrade these IDS beca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Recently, many studies have utilized machine learning (ML) and deep learning (DL) algorithms to develop efficient NIDSs. Furthermore, researchers also introduce XAI techniques to comprehend the output of the black box AI systems [32][33][34][35][36][37].…”
Section: Xai In Cybersecuritymentioning
confidence: 99%
“…Recently, many studies have utilized machine learning (ML) and deep learning (DL) algorithms to develop efficient NIDSs. Furthermore, researchers also introduce XAI techniques to comprehend the output of the black box AI systems [32][33][34][35][36][37].…”
Section: Xai In Cybersecuritymentioning
confidence: 99%
“…Faithfulness of an explanation is a desirable property that describes the ability to capture the features used by a predictor [7], but can be quite complex to compute. However, other methods can also be used to compute metrics related to Faithfulness [16,31]. Robustness measures the stability and consistency of a given XAI method [15,28], while Complexity [15] ensures that explanation would be easily understandable by users.…”
Section: Related Workmentioning
confidence: 99%
“…of Computer Science and Engineering, Texas A&M University, USA. (Emails: zahidhus-sain909@tamu.edu, irfankhan@tamu.edu) role of cybersecurity comes into play, acting as a digital shield to protect these interconnected systems [2]. However, as we delve deeper into the realm of IIoT, it becomes evident that traditional cybersecurity methods are struggling to keep up.…”
Section: Introductionmentioning
confidence: 99%