• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于集成树和 SHAP 方法的入侵检测系统分类与解释。

Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.

机构信息

IoT Research Center, Pusan National University, Busan 609735, Korea.

Faculty of Information Technology, Hung Yen University of Technology and Education, Hung Yen 160000, Vietnam.

出版信息

Sensors (Basel). 2022 Feb 3;22(3):1154. doi: 10.3390/s22031154.

DOI:10.3390/s22031154
PMID:35161899
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8840013/
Abstract

In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are becoming increasingly complex in model architectures with high resource computing in hardware requirements. In addition, it is difficult for humans to obtain explanations behind the decisions made by these DNN models using large IoT-based IDS datasets. Many proposed IDS methods have not been applied in practical deployments, because of the lack of explanation given to cybersecurity experts, to support them in terms of optimizing their decisions according to the judgments of the IDS models. This paper aims to enhance the attack detection performance of IDS with big IoT-based IDS datasets as well as provide explanations of machine learning (ML) model predictions. The proposed ML-based IDS method is based on the ensemble trees approach, including decision tree (DT) and random forest (RF) classifiers which do not require high computing resources for training models. In addition, two big datasets are used for the experimental evaluation of the proposed method, NF-BoT-IoT-v2, and NF-ToN-IoT-v2 (new versions of the original BoT-IoT and ToN-IoT datasets), through the feature set of the net flow meter. In addition, the IoTDS20 dataset is used for experiments. Furthermore, the SHapley additive exPlanations (SHAP) is applied to the eXplainable AI (XAI) methodology to explain and interpret the classification decisions of DT and RF models; this is not only effective in interpreting the final decision of the ensemble tree approach but also supports cybersecurity experts in quickly optimizing and evaluating the correctness of their judgments based on the explanations of the results.

摘要

近年来,研究界设计和开发了许多入侵检测系统 (IDS) 的方法,这些方法在使用 IDS 数据集时都达到了完美的检测率。深度神经网络 (DNN) 是广泛应用于 IDS 的代表性示例。然而,DNN 模型在模型架构方面变得越来越复杂,需要硬件资源进行高资源计算。此外,对于基于大型物联网的 IDS 数据集,人类很难获得这些 DNN 模型决策背后的解释。许多提出的 IDS 方法由于缺乏对网络安全专家的解释,无法在实际部署中得到应用,这无法为他们根据 IDS 模型的判断来优化决策提供支持。本文旨在提高基于大型物联网的 IDS 数据集的攻击检测性能,并提供机器学习 (ML) 模型预测的解释。所提出的基于 ML 的 IDS 方法基于集成树方法,包括决策树 (DT) 和随机森林 (RF) 分类器,这些分类器不需要用于训练模型的高计算资源。此外,还使用了两个大型数据集对所提出方法的实验评估,NF-BoT-IoT-v2 和 NF-ToN-IoT-v2(原始 BoT-IoT 和 ToN-IoT 数据集的新版本),通过网络流量表的特征集。此外,还使用了 IoTDS20 数据集进行实验。此外,SHapley additive exPlanations (SHAP) 应用于可解释人工智能 (XAI) 方法学,以解释和解释 DT 和 RF 模型的分类决策;这不仅有效地解释了集成树方法的最终决策,还支持网络安全专家根据结果的解释快速优化和评估他们判断的正确性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/7d53c562dbe2/sensors-22-01154-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/be9d9e927640/sensors-22-01154-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/1264a548648f/sensors-22-01154-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/ac51b70ce915/sensors-22-01154-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/2045067e0776/sensors-22-01154-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/0fb9a7abb8df/sensors-22-01154-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/72712e9a11a0/sensors-22-01154-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/0a461e93753a/sensors-22-01154-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/161b538bee6b/sensors-22-01154-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/d65dea1b95a3/sensors-22-01154-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/4e76b395059b/sensors-22-01154-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/44f4d0a7f311/sensors-22-01154-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/353a22bf7492/sensors-22-01154-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/739c60a17d44/sensors-22-01154-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/10673eb44fc9/sensors-22-01154-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/7d53c562dbe2/sensors-22-01154-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/be9d9e927640/sensors-22-01154-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/1264a548648f/sensors-22-01154-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/ac51b70ce915/sensors-22-01154-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/2045067e0776/sensors-22-01154-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/0fb9a7abb8df/sensors-22-01154-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/72712e9a11a0/sensors-22-01154-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/0a461e93753a/sensors-22-01154-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/161b538bee6b/sensors-22-01154-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/d65dea1b95a3/sensors-22-01154-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/4e76b395059b/sensors-22-01154-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/44f4d0a7f311/sensors-22-01154-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/353a22bf7492/sensors-22-01154-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/739c60a17d44/sensors-22-01154-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/10673eb44fc9/sensors-22-01154-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a44e/8840013/7d53c562dbe2/sensors-22-01154-g015.jpg

相似文献

1
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.基于集成树和 SHAP 方法的入侵检测系统分类与解释。
Sensors (Basel). 2022 Feb 3;22(3):1154. doi: 10.3390/s22031154.
2
Towards an Explainable Universal Feature Set for IoT Intrusion Detection.面向物联网入侵检测的可解释通用特征集。
Sensors (Basel). 2022 Jul 29;22(15):5690. doi: 10.3390/s22155690.
3
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
4
BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning.增强集成机器学习的物联网系统网络攻击检测高效技术:BoostedEnML
Sensors (Basel). 2022 Sep 29;22(19):7409. doi: 10.3390/s22197409.
5
A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection.物联网网络中一种用于入侵检测的新型特征选择算法。
Sensors (Basel). 2023 Sep 28;23(19):8153. doi: 10.3390/s23198153.
6
IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses.物联网入侵检测分类法、参考架构和分析。
Sensors (Basel). 2021 Sep 26;21(19):6432. doi: 10.3390/s21196432.
7
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.基于机器学习的物联网网络攻击分类的实验分析。
Sensors (Basel). 2021 Jan 10;21(2):446. doi: 10.3390/s21020446.
8
Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection.基于流量的入侵检测的机器学习技术评估。
Sensors (Basel). 2022 Nov 30;22(23):9326. doi: 10.3390/s22239326.
9
Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things' Devices Security.用于入侵检测的集成学习框架,以增强物联网设备的安全性。
Sensors (Basel). 2023 Jun 14;23(12):5568. doi: 10.3390/s23125568.
10
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.

引用本文的文献

1
An Explainable LSTM-Based Intrusion Detection System Optimized by Firefly Algorithm for IoT Networks.一种基于萤火虫算法优化的、用于物联网网络的可解释长短期记忆(LSTM)入侵检测系统。
Sensors (Basel). 2025 Apr 4;25(7):2288. doi: 10.3390/s25072288.
2
Proactive detection of anomalous behavior in Ethereum accounts using XAI-enabled ensemble stacking with Bayesian optimization.使用具有贝叶斯优化的启用XAI的集成堆叠来主动检测以太坊账户中的异常行为。
PeerJ Comput Sci. 2025 Mar 19;11:e2630. doi: 10.7717/peerj-cs.2630. eCollection 2025.
3
A novel intrusion detection framework for optimizing IoT security.

本文引用的文献

1
Analysis of Autoencoders for Network Intrusion Detection.自动编码器在网络入侵检测中的分析。
Sensors (Basel). 2021 Jun 23;21(13):4294. doi: 10.3390/s21134294.
一种用于优化物联网安全的新型入侵检测框架。
Sci Rep. 2024 Sep 18;14(1):21789. doi: 10.1038/s41598-024-72049-z.
4
Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems.用元学习增强医疗物联网(IoMT)安全:一种用于集成入侵检测系统的性能驱动方法。
Sensors (Basel). 2024 May 30;24(11):3519. doi: 10.3390/s24113519.
5
Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models.基于集成特征选择和深度学习模型的物联网网络攻击检测方法
Sensors (Basel). 2023 Aug 23;23(17):7342. doi: 10.3390/s23177342.
6
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.基于条件表格生成对抗的物联网网络 DDoS 和 DOS 攻击入侵检测系统。
Sensors (Basel). 2023 Jun 16;23(12):5644. doi: 10.3390/s23125644.
7
Towards Data-Driven Decision-Making in the Korean Film Industry: An XAI Model for Box Office Analysis Using Dimension Reduction, Clustering, and Classification.迈向韩国电影产业中数据驱动的决策:一种使用降维、聚类和分类的票房分析可解释人工智能模型
Entropy (Basel). 2023 Mar 27;25(4):571. doi: 10.3390/e25040571.
8
Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure.基于机器学习技术的关键基础设施保护入侵检测系统调查。
Sensors (Basel). 2023 Feb 22;23(5):2415. doi: 10.3390/s23052415.
9
Increasing transparency in machine learning through bootstrap simulation and shapely additive explanations.通过引导模拟和 Shapley 加性解释提高机器学习的透明度。
PLoS One. 2023 Feb 23;18(2):e0281922. doi: 10.1371/journal.pone.0281922. eCollection 2023.
10
Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions.检测 NetFlow 特征在检测物联网网络入侵中的适用性。
Sensors (Basel). 2022 Aug 17;22(16):6164. doi: 10.3390/s22166164.