[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration

  • Conference paper
  • First Online:
ICT Systems Security and Privacy Protection (SEC 2024)

Abstract

The perpetual evolution of cyberattacks, especially in the realm of Internet of Things (IoT) networks, necessitates advanced, adaptive, and intelligent defence mechanisms. The integration of expert knowledge can drastically enhance the efficacy of IoT network attack detection systems by enabling them to leverage domain-specific insights. This paper introduces a novel approach by applying Neurosymbolic Learning within the Explainable Artificial Intelligence (XAI) framework to enhance the detection of IoT network attacks while ensuring interpretability and transparency in decision-making. Neurosymbolic Learning synergizes symbolic AI, which excels in handling structured knowledge and providing explainability, with neural networks, known for their prowess in learning from data. Our proposed model utilizes expert knowledge in the form of rules and heuristics, integrating them into a learning mechanism to enhance its predictive capabilities and facilitate the incorporation of domain-specific insights into the learning process. The XAI framework is deployed to ensure that the predictive model is not a “black box”, providing clear, understandable explanations for its predictions, thereby augmenting trust and facilitating further enhancement by domain experts. Through rigorous evaluation against benchmark IoT network attack datasets, our model demonstrates superior detection performance compared to prevailing models, along with enhanced explainability and the successful incorporation of expert knowledge into the adaptive learning process. The proposed approach not only fortifies the security mechanisms against network attacks in IoT environments but also ensures that the knowledge discovery and decision-making processes are transparent, interpretable, and verifiable by human experts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.wireshark.org/.

  2. 2.

    https://github.com/ahlashkari/CICFlowMeter.

References

  1. Catillo, M., Del Vecchio, A., Pecchia, A., Villano, U.: Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study. Softw. Qual. J. 30(4), 955–981 (2022)

    Article  Google Scholar 

  2. Joshi, A., Ramakrishman, N., Houstis, E.N., Rice, J.R.: On neurobiological, neuro-fuzzy, machine learning, and statistical pattern recognition techniques. IEEE Trans. Neural Netw. 8(1), 18–31 (1997)

    Article  Google Scholar 

  3. Kalutharage, C.S., Liu, X., Chrysoulas, C.: Explainable AI and deep autoencoders based security framework for IoT network attack certainty (extended abstract). In: Li, W., Furnell, S., Meng, W. (eds.) ADIoT 2022. LNCS, vol. 13745, pp. 41–50. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-21311-3_8

    Chapter  Google Scholar 

  4. Kalutharage, C.S., Liu, X., Chrysoulas, C., Pitropakis, N., Papadopoulos, P.: Explainable AI-based DDOS attack identification method for IoT networks. Computers 12(2), 32 (2023)

    Article  Google Scholar 

  5. Kambhampati, S.: Polanyi’s revenge and AI’s new romance with tacit knowledge. Commun. ACM 64(2), 31–32 (2021)

    Article  Google Scholar 

  6. Kaur, B., et al.: Internet of things (IoT) security dataset evolution: challenges and future directions. Internet Things 100780 (2023)

    Google Scholar 

  7. McCulloch, W.S., Pitts, W.: A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5, 115–133 (1943)

    Article  MathSciNet  Google Scholar 

  8. Piplai, A., Joshi, A., Finin, T.: Offline RL+ CKG: a hybrid AI model for cybersecurity tasks. UMBC Faculty Collection (2023)

    Google Scholar 

  9. Piplai, A., Kotal, A., Mohseni, S., Gaur, M., Mittal, S., Joshi, A.: Knowledge-enhanced neurosymbolic artificial intelligence for cybersecurity and privacy. IEEE Internet Comput. 27(5), 43–48 (2023)

    Article  Google Scholar 

  10. Piplai, A., Mittal, S., Joshi, A., Finin, T., Holt, J., Zak, R.: Creating cybersecurity knowledge graphs from malware after action reports. IEEE Access 8, 211691–211703 (2020)

    Article  Google Scholar 

  11. Piplai, A., Ranade, P., Kotal, A., Mittal, S., Narayanan, S.N., Joshi, A.: Using knowledge graphs and reinforcement learning for malware analysis. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 2626–2633. IEEE (2020)

    Google Scholar 

  12. Sheth, A., Roy, K., Gaur, M.: Neurosymbolic artificial intelligence (why, what, and how). IEEE Intell. Syst. 38(3), 56–62 (2023)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chathuranga Sampath Kalutharage .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kalutharage, C.S., Liu, X., Chrysoulas, C., Bamgboye, O. (2024). Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration. In: Pitropakis, N., Katsikas, S., Furnell, S., Markantonakis, K. (eds) ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology, vol 710. Springer, Cham. https://doi.org/10.1007/978-3-031-65175-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-65175-5_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-65174-8

  • Online ISBN: 978-3-031-65175-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics