Skip to main content
Erschienen in: Wireless Personal Communications 2/2023

30.05.2023

Network Intrusion Detection Based on Explainable Artificial Intelligence

verfasst von: Yiwen Wang, Lei Xu, Wanli Liu, Rongzhen Li, Junjie Gu

Erschienen in: Wireless Personal Communications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

People often use similar methods to invade network traffic, such as flood attacks and Ddos attacks. Early detection of malicious traffic usually uses manual filtering to establish a whitelist, and then uses some artificial intelligence to simply measure some characteristic parameters. The high predictive performance of artificial intelligence will inevitably introduce unknowable decision process into network intrusion detection. When it is applied to the extremely important network environment, human’s doubt on its black box effect will hinder its advancement. Here, we make a propose to come up with a network traffic intrusion detection method (XAI-IDS) on account of interpretable artificial intelligence to detect malicious traffic intrusion in networks. XAI-IDS analyzes network traffic data to predict whether the traffic is malicious intrusion.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Prasad, R., Rohokale, V., Prasad, R., & Rohokale, V. (2020). Artificial intelligence and machine learning in cyber security. Cyber Security: The Lifeline of Information and Communication Technology, 47, 231–247. Prasad, R., Rohokale, V., Prasad, R., & Rohokale, V. (2020). Artificial intelligence and machine learning in cyber security. Cyber Security: The Lifeline of Information and Communication Technology, 47, 231–247.
2.
Zurück zum Zitat Bartoletti, I. (2019). Ai in healthcare: Ethical and privacy challenges. In: Artificial Intelligence in Medicine: 17th Conference on Artificial Intelligence in Medicine, AIME 2019, Poznan, Poland Proceedings 17, Springer, pp. 7–10. Bartoletti, I. (2019). Ai in healthcare: Ethical and privacy challenges. In: Artificial Intelligence in Medicine: 17th Conference on Artificial Intelligence in Medicine, AIME 2019, Poznan, Poland Proceedings 17, Springer, pp. 7–10.
3.
Zurück zum Zitat Holzinger, A., Biemann, C., Pattichis, C.S. & Kell, D.B. (2017). What do we need to build explainable ai systems for the medical domain? arXiv preprint arXiv:1712.09923 Holzinger, A., Biemann, C., Pattichis, C.S. & Kell, D.B. (2017). What do we need to build explainable ai systems for the medical domain? arXiv preprint arXiv:​1712.​09923
4.
Zurück zum Zitat Oxborough, C., Cameron, E., Rao, A., Birchall, A., Townsend, A., Westermann, C. (2018). Explainable ai: Driving business value through greater understanding. Retrieved from PWC website: https://www. pwc. co. uk/audit-assurance/assets/explainable-ai. pdf Oxborough, C., Cameron, E., Rao, A., Birchall, A., Townsend, A., Westermann, C. (2018). Explainable ai: Driving business value through greater understanding. Retrieved from PWC website: https://​www.​ pwc. co. uk/audit-assurance/assets/explainable-ai. pdf
5.
Zurück zum Zitat Xia, X., Liu, X., & Lou, J. (2020). A network traffic prediction model of smart substation based on igsa-wnn. ETRI Journal, 42(3), 366–375.CrossRef Xia, X., Liu, X., & Lou, J. (2020). A network traffic prediction model of smart substation based on igsa-wnn. ETRI Journal, 42(3), 366–375.CrossRef
6.
Zurück zum Zitat Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., & Ghogho, M. (2016). Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258–263 . IEEE Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., & Ghogho, M. (2016). Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258–263 . IEEE
7.
Zurück zum Zitat Almiani, M., AbuGhazleh, A., Al-Rahayfeh, A., Atiewi, S., & Razaque, A. (2020). Deep recurrent neural network for iot intrusion detection system. Simulation Modelling Practice and Theory, 101, 102031.CrossRef Almiani, M., AbuGhazleh, A., Al-Rahayfeh, A., Atiewi, S., & Razaque, A. (2020). Deep recurrent neural network for iot intrusion detection system. Simulation Modelling Practice and Theory, 101, 102031.CrossRef
8.
Zurück zum Zitat Lin, W.-H., Lin, H.-C., Wang, P., Wu, B.-H., & Tsai, J.-Y. (2018). Using convolutional neural networks to network intrusion detection for cyber threats. In: 2018 IEEE International Conference on Applied System Invention (ICASI), pp. 1107–1110. IEEE Lin, W.-H., Lin, H.-C., Wang, P., Wu, B.-H., & Tsai, J.-Y. (2018). Using convolutional neural networks to network intrusion detection for cyber threats. In: 2018 IEEE International Conference on Applied System Invention (ICASI), pp. 1107–1110. IEEE
9.
Zurück zum Zitat Xu, C., Shen, J., Du, X., & Zhang, F. (2018). An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access, 6, 48697–48707.CrossRef Xu, C., Shen, J., Du, X., & Zhang, F. (2018). An intrusion detection system using a deep neural network with gated recurrent units. IEEE Access, 6, 48697–48707.CrossRef
10.
Zurück zum Zitat Javaid, A., Niyaz, Q., Sun, W. & Alam, M. (2016). A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21–26. Javaid, A., Niyaz, Q., Sun, W. & Alam, M. (2016). A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21–26.
12.
Zurück zum Zitat Zong, B., Song, Q., Min, M.R., Cheng, W., Lumezanu, C., Cho, D. & Chen, H. (2018). Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations. Zong, B., Song, Q., Min, M.R., Cheng, W., Lumezanu, C., Cho, D. & Chen, H. (2018). Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations.
13.
Zurück zum Zitat Wang, C., Zhang, Y.-M., & Liu, C.-L. (2018). Anomaly detection via minimum likelihood generative adversarial networks. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 1121–1126. IEEE Wang, C., Zhang, Y.-M., & Liu, C.-L. (2018). Anomaly detection via minimum likelihood generative adversarial networks. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 1121–1126. IEEE
14.
Zurück zum Zitat Schlegl, T., Seeböck, P., Waldstein, S.M., Schmidt-Erfurth, U. & Langs, G. (2017). Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Information Processing in Medical Imaging: 25th International Conference, IPMI 2017, Boone, NC, USA, June 25-30, 2017, Proceedings, pp. 146–157. Springer Schlegl, T., Seeböck, P., Waldstein, S.M., Schmidt-Erfurth, U. & Langs, G. (2017). Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Information Processing in Medical Imaging: 25th International Conference, IPMI 2017, Boone, NC, USA, June 25-30, 2017, Proceedings, pp. 146–157. Springer
15.
Zurück zum Zitat Ger, S., Jambunath, Y.S., & Klabjan, D. (2019). Autoencoders and generative adversarial networks for imbalanced sequence classification. arXiv preprint arXiv:1901.02514. Ger, S., Jambunath, Y.S., & Klabjan, D. (2019). Autoencoders and generative adversarial networks for imbalanced sequence classification. arXiv preprint arXiv:​1901.​02514.
16.
Zurück zum Zitat Li, D., Chen, D., Jin, B., Shi, L., Goh, J., & Ng, S.-K. (2019). Mad-gan: Multivariate anomaly detection for time series data with generative adversarial networks. In: Artificial Neural Networks and Machine Learning–ICANN 2019: Text and Time Series: 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IV, pp. 703–716. Springer Li, D., Chen, D., Jin, B., Shi, L., Goh, J., & Ng, S.-K. (2019). Mad-gan: Multivariate anomaly detection for time series data with generative adversarial networks. In: Artificial Neural Networks and Machine Learning–ICANN 2019: Text and Time Series: 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IV, pp. 703–716. Springer
17.
Zurück zum Zitat Zenati, H., Foo, C.S., Lecouat, B., Manek, G., & Chandrasekhar, V.R. (2018). Efficient gan-based anomaly detection. arXiv preprint arXiv:1802.06222 Zenati, H., Foo, C.S., Lecouat, B., Manek, G., & Chandrasekhar, V.R. (2018). Efficient gan-based anomaly detection. arXiv preprint arXiv:​1802.​06222
18.
Zurück zum Zitat Özgür, A., & Erdem, H. (2016). A review of kdd99 dataset usage in intrusion detection and machine learning between 2010 and 2015. Özgür, A., & Erdem, H. (2016). A review of kdd99 dataset usage in intrusion detection and machine learning between 2010 and 2015.
19.
Zurück zum Zitat Elkan, C. (2000). Results of the kdd’99 classifier learning. ACM Sigkdd Explorations Newsletter, 1(2), 63–64.CrossRef Elkan, C. (2000). Results of the kdd’99 classifier learning. ACM Sigkdd Explorations Newsletter, 1(2), 63–64.CrossRef
21.
Zurück zum Zitat He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778. He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778.
Metadaten
Titel
Network Intrusion Detection Based on Explainable Artificial Intelligence
verfasst von
Yiwen Wang
Lei Xu
Wanli Liu
Rongzhen Li
Junjie Gu
Publikationsdatum
30.05.2023
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10472-7

Weitere Artikel der Ausgabe 2/2023

Wireless Personal Communications 2/2023 Zur Ausgabe

Neuer Inhalt