Cargando…
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are beco...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8840013/ https://www.ncbi.nlm.nih.gov/pubmed/35161899 http://dx.doi.org/10.3390/s22031154 |
_version_ | 1784650513049976832 |
---|---|
author | Le, Thi-Thu-Huong Kim, Haeyoung Kang, Hyoeun Kim, Howon |
author_facet | Le, Thi-Thu-Huong Kim, Haeyoung Kang, Hyoeun Kim, Howon |
author_sort | Le, Thi-Thu-Huong |
collection | PubMed |
description | In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are becoming increasingly complex in model architectures with high resource computing in hardware requirements. In addition, it is difficult for humans to obtain explanations behind the decisions made by these DNN models using large IoT-based IDS datasets. Many proposed IDS methods have not been applied in practical deployments, because of the lack of explanation given to cybersecurity experts, to support them in terms of optimizing their decisions according to the judgments of the IDS models. This paper aims to enhance the attack detection performance of IDS with big IoT-based IDS datasets as well as provide explanations of machine learning (ML) model predictions. The proposed ML-based IDS method is based on the ensemble trees approach, including decision tree (DT) and random forest (RF) classifiers which do not require high computing resources for training models. In addition, two big datasets are used for the experimental evaluation of the proposed method, NF-BoT-IoT-v2, and NF-ToN-IoT-v2 (new versions of the original BoT-IoT and ToN-IoT datasets), through the feature set of the net flow meter. In addition, the IoTDS20 dataset is used for experiments. Furthermore, the SHapley additive exPlanations (SHAP) is applied to the eXplainable AI (XAI) methodology to explain and interpret the classification decisions of DT and RF models; this is not only effective in interpreting the final decision of the ensemble tree approach but also supports cybersecurity experts in quickly optimizing and evaluating the correctness of their judgments based on the explanations of the results. |
format | Online Article Text |
id | pubmed-8840013 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-88400132022-02-13 Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method Le, Thi-Thu-Huong Kim, Haeyoung Kang, Hyoeun Kim, Howon Sensors (Basel) Article In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are becoming increasingly complex in model architectures with high resource computing in hardware requirements. In addition, it is difficult for humans to obtain explanations behind the decisions made by these DNN models using large IoT-based IDS datasets. Many proposed IDS methods have not been applied in practical deployments, because of the lack of explanation given to cybersecurity experts, to support them in terms of optimizing their decisions according to the judgments of the IDS models. This paper aims to enhance the attack detection performance of IDS with big IoT-based IDS datasets as well as provide explanations of machine learning (ML) model predictions. The proposed ML-based IDS method is based on the ensemble trees approach, including decision tree (DT) and random forest (RF) classifiers which do not require high computing resources for training models. In addition, two big datasets are used for the experimental evaluation of the proposed method, NF-BoT-IoT-v2, and NF-ToN-IoT-v2 (new versions of the original BoT-IoT and ToN-IoT datasets), through the feature set of the net flow meter. In addition, the IoTDS20 dataset is used for experiments. Furthermore, the SHapley additive exPlanations (SHAP) is applied to the eXplainable AI (XAI) methodology to explain and interpret the classification decisions of DT and RF models; this is not only effective in interpreting the final decision of the ensemble tree approach but also supports cybersecurity experts in quickly optimizing and evaluating the correctness of their judgments based on the explanations of the results. MDPI 2022-02-03 /pmc/articles/PMC8840013/ /pubmed/35161899 http://dx.doi.org/10.3390/s22031154 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Le, Thi-Thu-Huong Kim, Haeyoung Kang, Hyoeun Kim, Howon Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method |
title | Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method |
title_full | Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method |
title_fullStr | Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method |
title_full_unstemmed | Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method |
title_short | Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method |
title_sort | classification and explanation for intrusion detection system based on ensemble trees and shap method |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8840013/ https://www.ncbi.nlm.nih.gov/pubmed/35161899 http://dx.doi.org/10.3390/s22031154 |
work_keys_str_mv | AT lethithuhuong classificationandexplanationforintrusiondetectionsystembasedonensembletreesandshapmethod AT kimhaeyoung classificationandexplanationforintrusiondetectionsystembasedonensembletreesandshapmethod AT kanghyoeun classificationandexplanationforintrusiondetectionsystembasedonensembletreesandshapmethod AT kimhowon classificationandexplanationforintrusiondetectionsystembasedonensembletreesandshapmethod |