2023
DOI: 10.3390/computers12020032
|View full text |Cite
|
Sign up to set email alerts
|

Explainable AI-Based DDOS Attack Identification Method for IoT Networks

Abstract: The modern digitized world is mainly dependent on online services. The availability of online systems continues to be seriously challenged by distributed denial of service (DDoS) attacks. The challenge in mitigating attacks is not limited to identifying DDoS attacks when they happen, but also identifying the streams of attacks. However, existing attack detection methods cannot accurately and efficiently detect DDoS attacks. To this end, we propose an explainable artificial intelligence (XAI)-based novel method… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…AI techniques have the potential to significantly enhance the security of IoT systems [13], [15]. Leveraging AI algorithms and models can enable intelligent threat detection, robust authentication mechanisms, and proactive security analytics.…”
Section: Ai Techniques For Iot Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…AI techniques have the potential to significantly enhance the security of IoT systems [13], [15]. Leveraging AI algorithms and models can enable intelligent threat detection, robust authentication mechanisms, and proactive security analytics.…”
Section: Ai Techniques For Iot Securitymentioning
confidence: 99%
“…AI techniques play a pivotal role in enhancing IoT security. Therefore, it is inevitable to explore the application of AI in addressing IoT security [13]- [15] challenges. This paper categorizes AI techniques into cyberattacks and threat detection and prevention, secure communication and authentication, and predictive security analytics.…”
mentioning
confidence: 99%
“…The SHAP method employs the core idea of Shapley values from cooperative game theory to determine how much each feature contributes to the model's production. 50 In the context of machine learning, SHAP values calculate each feature's contribution to the model's prediction, making it helpful in identifying critical elements for specific tasks, such as detecting DDoS attacks based on network behavior. The SHAP feature selection process involves computing SHAP values for every feature in the dataset and ranking them in order of importance.…”
Section: Feature Selectionmentioning
confidence: 99%
“…SHapley Additive exPlanations (SHAP) is a technique used to select features in machine learning models to understand how each component affects the output. The SHAP method employs the core idea of Shapley values from cooperative game theory to determine how much each feature contributes to the model's production 50 . In the context of machine learning, SHAP values calculate each feature's contribution to the model's prediction, making it helpful in identifying critical elements for specific tasks, such as detecting DDoS attacks based on network behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Kalutharage et al [27] proposed XAI-based techniques for detecting DDoS attack anomalies on the USBIDS (University of Sannio, Benevento Instrution Detection System) dataset. The research focuses on instance-by-instance, local and global explanations, and feature correlations, explaining anomalies by providing Autoencoder and Kernel SHAP techniques.…”
Section: B Xai For Modelsmentioning
confidence: 99%