[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3625343.3625356acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaimlrConference Proceedingsconference-collections
research-article

Machine Learning based Intrusion Detection System for IoT Applications using Explainable AI

Published: 11 November 2023 Publication History

Abstract

This research focuses on studying the classification performance of a Machine Learning-based Intrusion Detection System (IDS) using the UNSW-NB15 dataset. The effectiveness of three classifiers - Decision Tree, Multilayer Perceptron (MLP), and XGBoost - was analyzed to determine their accuracy in identifying attacks and normal network traffic. The experimental results revealed that Decision Tree achieved an accuracy of 96.5%, MLP achieved an accuracy of 89.83%, and XGBoost achieved an accuracy of 89.9%. Additionally, the Explanability of the machine learning models was analyzed, highlighting the differences in interpretability among the classifiers. It was observed that Decision Tree provided better Explanability, but lower accuracy compared to MLP and XGBoost. Overall, this research contributes to our comprehension of the performance and Explanability of three different machine learning classifiers for intrusion detection. The findings can provide valuable insights for choosing suitable classifiers that align with the specific priorities and requirements of the IDS system.

References

[1]
A. Jannat, U. Hayat, and T. Sadiq, “Exploration of Machine Learning Algorithms for Development of Intelligent Intrusion Detection Systems,” in 2023 International Conference on Communication, Computing and Digital Systems (C-CODE), Islamabad, Pakistan: IEEE, May 2023, pp. 1–6.
[2]
S. Pontarelli, G. Bianchi, and S. Teofili, “Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System,” IEEE Trans. Comput., vol. 62, no. 11, pp. 2322–2334, Nov. 2013.
[3]
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 42–57, Jan. 2013.
[4]
Nguyen Thanh Van, Tran Ngoc Thinh, and Le Thanh Sach, “An anomaly-based network intrusion detection system using Deep learning,” in 2017 International Conference on System Science and Engineering (ICSSE), Ho Chi Minh City, Vietnam: IEEE, Jul. 2017, pp. 210–214.
[5]
C. Chen, Yunchao Gong, and Yingjie Tian, “Semi-supervised learning methods for network intrusion detection,” in 2008 IEEE International Conference on Systems, Man and Cybernetics, Singapore, Singapore: IEEE, Oct. 2008, pp. 2603–2608.
[6]
N. Moustafa, B. Turnbull, and K.-K. R. Choo, “An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things,” IEEE Internet Things J., vol. 6, no. 3, pp. 4815–4830, Jun. 2019.
[7]
K. A. P. Da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, and V. H. C. De Albuquerque, “Internet of Things: A survey on machine learning-based intrusion detection approaches,” Comput. Netw., vol. 151, pp. 147–157, Mar. 2019.
[8]
A. Barredo Arrieta, “Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI,” Inf. Fusion, vol. 58, pp. 82–115, Jun. 2020.
[9]
N. Moustafa and J. Slay, “The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems,” in 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Kyoto, Japan: IEEE, Nov. 2015, pp. 25–31.
[10]
M. Sarhan, S. Layeghy, and M. Portmann, “Towards a Standard Feature Set for Network Intrusion Detection System Datasets,” Mob. Netw. Appl., vol. 27, no. 1, pp. 357–370, Feb. 2022.
[11]
M. Sarhan, S. Layeghy, N. Moustafa, and M. Portmann, “NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems,” in Big Data Technologies and Applications, Z. Deze, H. Huang, R. Hou, S. Rho, and N. Chilamkurti, Eds., in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 371. Cham: Springer International Publishing, 2021, pp. 117–135.
[12]
K. Amarasinghe, K. Kenney, and M. Manic, “Toward Explainable Deep Neural Network Based Anomaly Detection,” in 2018 11th International Conference on Human System Interaction (HSI), Gdansk, Poland: IEEE, Jul. 2018, pp. 311–317.
[13]
K. Siddique, Z. Akhtar, F. Aslam Khan, and Y. Kim, “KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research,” Computer, vol. 52, no. 2, pp. 41–51, Feb. 2019.
[14]
S. Mane and D. Rao, “Explaining Network Intrusion Detection System Using Explainable AI Framework,” 2021.

Cited By

View all
  • (2025)Adaptable, incremental, and explainable network intrusion detection systems for internet of thingsEngineering Applications of Artificial Intelligence10.1016/j.engappai.2025.110143144(110143)Online publication date: Mar-2025
  • (2024)A lightweight SEL for attack detection in IoT/IIoT networksJournal of Network and Computer Applications10.1016/j.jnca.2024.103980230(103980)Online publication date: Oct-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AIMLR '23: Proceedings of the 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics
September 2023
133 pages
ISBN:9798400708312
DOI:10.1145/3625343
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 November 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Artificial Intelligence (AI)
  2. Decision Tree
  3. Internet of things
  4. Intrusion detection system (IDS)
  5. Machine learning (ML)
  6. Multilayer Perceptron (MLP)
  7. XGBoost classifier

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AIMLR 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)100
  • Downloads (Last 6 weeks)6
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Adaptable, incremental, and explainable network intrusion detection systems for internet of thingsEngineering Applications of Artificial Intelligence10.1016/j.engappai.2025.110143144(110143)Online publication date: Mar-2025
  • (2024)A lightweight SEL for attack detection in IoT/IIoT networksJournal of Network and Computer Applications10.1016/j.jnca.2024.103980230(103980)Online publication date: Oct-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media