Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
by
Kim, Howon
, Le, Thi-Thu-Huong
, Kim, Haeyoung
, Kang, Hyoeun
in
Accuracy
/ Algorithms
/ Classification
/ Computational linguistics
/ Computer Security
/ Cybercrime
/ Cyberterrorism
/ Datasets
/ decision tree
/ Decision trees
/ Detectors
/ ensemble trees
/ explanation AI (XAI)
/ Humans
/ Internet of Things
/ Intrusion detection systems
/ intrusion detection systems (IDS)
/ Language processing
/ Machine Learning
/ Methods
/ Natural language interfaces
/ Neural networks
/ Neural Networks, Computer
/ random forest
/ SHapley Additive exPlanations (SHAP)
/ Software
/ Support vector machines
/ Trust
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
by
Kim, Howon
, Le, Thi-Thu-Huong
, Kim, Haeyoung
, Kang, Hyoeun
in
Accuracy
/ Algorithms
/ Classification
/ Computational linguistics
/ Computer Security
/ Cybercrime
/ Cyberterrorism
/ Datasets
/ decision tree
/ Decision trees
/ Detectors
/ ensemble trees
/ explanation AI (XAI)
/ Humans
/ Internet of Things
/ Intrusion detection systems
/ intrusion detection systems (IDS)
/ Language processing
/ Machine Learning
/ Methods
/ Natural language interfaces
/ Neural networks
/ Neural Networks, Computer
/ random forest
/ SHapley Additive exPlanations (SHAP)
/ Software
/ Support vector machines
/ Trust
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
by
Kim, Howon
, Le, Thi-Thu-Huong
, Kim, Haeyoung
, Kang, Hyoeun
in
Accuracy
/ Algorithms
/ Classification
/ Computational linguistics
/ Computer Security
/ Cybercrime
/ Cyberterrorism
/ Datasets
/ decision tree
/ Decision trees
/ Detectors
/ ensemble trees
/ explanation AI (XAI)
/ Humans
/ Internet of Things
/ Intrusion detection systems
/ intrusion detection systems (IDS)
/ Language processing
/ Machine Learning
/ Methods
/ Natural language interfaces
/ Neural networks
/ Neural Networks, Computer
/ random forest
/ SHapley Additive exPlanations (SHAP)
/ Software
/ Support vector machines
/ Trust
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
Journal Article
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method
2022
Request Book From Autostore
and Choose the Collection Method
Overview
In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are becoming increasingly complex in model architectures with high resource computing in hardware requirements. In addition, it is difficult for humans to obtain explanations behind the decisions made by these DNN models using large IoT-based IDS datasets. Many proposed IDS methods have not been applied in practical deployments, because of the lack of explanation given to cybersecurity experts, to support them in terms of optimizing their decisions according to the judgments of the IDS models. This paper aims to enhance the attack detection performance of IDS with big IoT-based IDS datasets as well as provide explanations of machine learning (ML) model predictions. The proposed ML-based IDS method is based on the ensemble trees approach, including decision tree (DT) and random forest (RF) classifiers which do not require high computing resources for training models. In addition, two big datasets are used for the experimental evaluation of the proposed method, NF-BoT-IoT-v2, and NF-ToN-IoT-v2 (new versions of the original BoT-IoT and ToN-IoT datasets), through the feature set of the net flow meter. In addition, the IoTDS20 dataset is used for experiments. Furthermore, the SHapley additive exPlanations (SHAP) is applied to the eXplainable AI (XAI) methodology to explain and interpret the classification decisions of DT and RF models; this is not only effective in interpreting the final decision of the ensemble tree approach but also supports cybersecurity experts in quickly optimizing and evaluating the correctness of their judgments based on the explanations of the results.
Publisher
MDPI AG,MDPI
Subject
This website uses cookies to ensure you get the best experience on our website.