Cargando…

Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method

In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are beco...

Descripción completa

Detalles Bibliográficos
Autores principales: Le, Thi-Thu-Huong, Kim, Haeyoung, Kang, Hyoeun, Kim, Howon
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8840013/
https://www.ncbi.nlm.nih.gov/pubmed/35161899
http://dx.doi.org/10.3390/s22031154
_version_ 1784650513049976832
author Le, Thi-Thu-Huong
Kim, Haeyoung
Kang, Hyoeun
Kim, Howon
author_facet Le, Thi-Thu-Huong
Kim, Haeyoung
Kang, Hyoeun
Kim, Howon
author_sort Le, Thi-Thu-Huong
collection PubMed
description In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are becoming increasingly complex in model architectures with high resource computing in hardware requirements. In addition, it is difficult for humans to obtain explanations behind the decisions made by these DNN models using large IoT-based IDS datasets. Many proposed IDS methods have not been applied in practical deployments, because of the lack of explanation given to cybersecurity experts, to support them in terms of optimizing their decisions according to the judgments of the IDS models. This paper aims to enhance the attack detection performance of IDS with big IoT-based IDS datasets as well as provide explanations of machine learning (ML) model predictions. The proposed ML-based IDS method is based on the ensemble trees approach, including decision tree (DT) and random forest (RF) classifiers which do not require high computing resources for training models. In addition, two big datasets are used for the experimental evaluation of the proposed method, NF-BoT-IoT-v2, and NF-ToN-IoT-v2 (new versions of the original BoT-IoT and ToN-IoT datasets), through the feature set of the net flow meter. In addition, the IoTDS20 dataset is used for experiments. Furthermore, the SHapley additive exPlanations (SHAP) is applied to the eXplainable AI (XAI) methodology to explain and interpret the classification decisions of DT and RF models; this is not only effective in interpreting the final decision of the ensemble tree approach but also supports cybersecurity experts in quickly optimizing and evaluating the correctness of their judgments based on the explanations of the results.
format Online
Article
Text
id pubmed-8840013
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-88400132022-02-13 Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method Le, Thi-Thu-Huong Kim, Haeyoung Kang, Hyoeun Kim, Howon Sensors (Basel) Article In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are becoming increasingly complex in model architectures with high resource computing in hardware requirements. In addition, it is difficult for humans to obtain explanations behind the decisions made by these DNN models using large IoT-based IDS datasets. Many proposed IDS methods have not been applied in practical deployments, because of the lack of explanation given to cybersecurity experts, to support them in terms of optimizing their decisions according to the judgments of the IDS models. This paper aims to enhance the attack detection performance of IDS with big IoT-based IDS datasets as well as provide explanations of machine learning (ML) model predictions. The proposed ML-based IDS method is based on the ensemble trees approach, including decision tree (DT) and random forest (RF) classifiers which do not require high computing resources for training models. In addition, two big datasets are used for the experimental evaluation of the proposed method, NF-BoT-IoT-v2, and NF-ToN-IoT-v2 (new versions of the original BoT-IoT and ToN-IoT datasets), through the feature set of the net flow meter. In addition, the IoTDS20 dataset is used for experiments. Furthermore, the SHapley additive exPlanations (SHAP) is applied to the eXplainable AI (XAI) methodology to explain and interpret the classification decisions of DT and RF models; this is not only effective in interpreting the final decision of the ensemble tree approach but also supports cybersecurity experts in quickly optimizing and evaluating the correctness of their judgments based on the explanations of the results. MDPI 2022-02-03 /pmc/articles/PMC8840013/ /pubmed/35161899 http://dx.doi.org/10.3390/s22031154 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Le, Thi-Thu-Huong
Kim, Haeyoung
Kang, Hyoeun
Kim, Howon
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
title Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
title_full Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
title_fullStr Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
title_full_unstemmed Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
title_short Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
title_sort classification and explanation for intrusion detection system based on ensemble trees and shap method
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8840013/
https://www.ncbi.nlm.nih.gov/pubmed/35161899
http://dx.doi.org/10.3390/s22031154
work_keys_str_mv AT lethithuhuong classificationandexplanationforintrusiondetectionsystembasedonensembletreesandshapmethod
AT kimhaeyoung classificationandexplanationforintrusiondetectionsystembasedonensembletreesandshapmethod
AT kanghyoeun classificationandexplanationforintrusiondetectionsystembasedonensembletreesandshapmethod
AT kimhowon classificationandexplanationforintrusiondetectionsystembasedonensembletreesandshapmethod