EXPLAINABLE AI IN INTRUSION DETECTION SYSTEMS
DOI:
https://doi.org/10.61841/7hxqqm62Keywords:
Intrusion detection System, , Explainable artificial intelligence, NSL-KDD, classificationAbstract
As the use of internet in increasing day by day and the chances of system get compromised due to various types of attacks has increased. Intruders are finding new techniques to compromise the system. The concern about the cyber security is growing and for the user most of the model is perceived as a black box. There is need of finding the attack correctly and then proper reports should be generated to show how the system got compromised. So we are proposing a system where Intrusion Detection System (IDS) can detect the attack and Explainable artificial intelligence tell us about what type of attack is being performed on the system. Intrusion Detection System keeps track of the malicious packets entering in the system. Explainable Artificial Intelligence will show the report on which type of attack took place. In the proposed system we have use the NSL-KDD dataset for classification of attack detected by our proposed Intrusion Detection System.
Downloads
References
[1] Daniel L. Marino, ChathurikaS.Wickramasinghe, Milos Manic, “An Adversarial Approach for Explainable AI in Intrusion Detection System” Department of Computer Science Virginia Commonwealth University Richmond, USA.
[2] JABEZJa, Dr.B.MUTHUKUMAR, “Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach” International Conference on Intelligent Computing, Communication & Convergence.
[3] Asmaa Shaker Ashoor, Prof. Sharad Gore, “Importance of Intrusion Detection System (IDS)” International Journal of Scientific Engineering Research.
[4] Yogita B. Bhavsar1 ,Kalyani C.Waghmare2, “Intrusion Detection System Using Data Mining Technique: Support Vector Machine,” International Journal of Emerging Technology and Advanced Engineering, March 2013.
[5] GulshanKumar ,Krishan Kumar ,Monika Sachdeva" The use of artificial intelligence based techniques for intrusion detection: a review" 4 September 2010.
[6] UdayaSampath K. PereraMiriyaThanthrige, JagathSamarabandu, Xianbin Wang, “Machine Learning Techniques for Intrusion Detection on Public Dataset,” 2016.
[7] James P. Anderson, “Computer Security Threat Monitoring and Surveillance,” Technical report, James P. Anderson Co., Fort Washington, Pennsylvania. April 1980.
[8] Tomas Abraham, “IDDM: INTRUSION Detection using Data Mining Techniques” Technical report DTSO electronics and surveillance research laboratory, Salisbury.
[9] Wenke Lee and Salvatore J. Stolfo, "A Framework for constructing features and models for intrusion detection systems” ACM transactions on Information and system security (TISSEC), vol.3, Issue 4, Nov 2000.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.