Enhancing intrusion detection performance using explainable ensemble deep learning.

PeerJ Comput Sci

MIS Department, College of Business, University of Jeddah, Jeddah, Jeddah, Saudi Arabia.

Published: September 2024

Given the exponential growth of available data in large networks, the need for an accurate and explainable intrusion detection system has become of high necessity to effectively discover attacks in such networks. To deal with this challenge, we propose a two-phase Explainable Ensemble deep learning-based method (EED) for intrusion detection. In the first phase, a new ensemble intrusion detection model using three one-dimensional long short-term memory networks (LSTM) is designed for an accurate attack identification. The outputs of three classifiers are aggregated using a meta-learner algorithm resulting in refined and improved results. In the second phase, interpretability and explainability of EED outputs are enhanced by leveraging the capabilities of SHape Additive exPplanations (SHAP). Factors contributing to the identification and classification of attacks are highlighted which allows security experts to understand and interpret the attack behavior and then implement effective response strategies to improve the network security. Experiments conducted on real datasets have shown the effectiveness of EED compared to conventional intrusion detection methods in terms of both accuracy and explainability. The EED method exhibits high accuracy in accurately identifying and classifying attacks while providing transparency and interpretability.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11419647PMC
http://dx.doi.org/10.7717/peerj-cs.2289DOI Listing

Publication Analysis

Top Keywords

intrusion detection
20
explainable ensemble
8
ensemble deep
8
explainability eed
8
detection
5
enhancing intrusion
4
detection performance
4
performance explainable
4
deep learning
4
learning exponential
4

Similar Publications

Pathogens know no borders, and the COVID-19 pandemic highlighted the urgent need for comparable, globally accessible pathogen data. This paper proposes a European wastewater pathogen monitoring network using aircraft and airport samples as a proof of concept for an effective cross-national surveillance system. The study emphasizes the importance of genomic data collection from strategic sites to produce high-value data for disease surveillance and epidemiological analysis.

View Article and Find Full Text PDF

Gold ores are important strategic key mineral resource in China. The Sanshan Island area produces gold ores, in which the magmatic activity becomes the heat source for the activation of gold-bearing fluids, and the widely developed fracture structure provides the channel and spatial structure for gold transport and enrichment. Therefore, it is an important direction to utilize the inversion method to portray the distribution of fractures and intrusive rocks.

View Article and Find Full Text PDF

In an era of increasing sophistication and frequency of cyber threats, securing Internet of Things (IoT) networks has become a paramount concern. IoT networks, with their diverse and interconnected devices, face unique security challenges that traditional methods often fail to address effectively. To tackle these challenges, an Intrusion Detection System (IDS) is specifically designed for IoT environments.

View Article and Find Full Text PDF

Respiratory rate (RR) is an important vital sign but is often neglected. Multiple technologies exist for RR monitoring but are either expensive or impractical. Tri-axial accelerometry represents a minimally intrusive solution for continuous RR monitoring, however, the method has not been validated in a wide RR range.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!