• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用可解释集成深度学习提高入侵检测性能。

Enhancing intrusion detection performance using explainable ensemble deep learning.

作者信息

Ben Ncir Chiheb Eddine, Ben HajKacem Mohamed Aymen, Alattas Mohammed

机构信息

MIS Department, College of Business, University of Jeddah, Jeddah, Jeddah, Saudi Arabia.

LARODEC Lab, ISG Tunis, University of Tunis, Le Bardo, Tunis, Tunisia.

出版信息

PeerJ Comput Sci. 2024 Sep 13;10:e2289. doi: 10.7717/peerj-cs.2289. eCollection 2024.

DOI:10.7717/peerj-cs.2289
PMID:39314740
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11419647/
Abstract

Given the exponential growth of available data in large networks, the need for an accurate and explainable intrusion detection system has become of high necessity to effectively discover attacks in such networks. To deal with this challenge, we propose a two-phase Explainable Ensemble deep learning-based method (EED) for intrusion detection. In the first phase, a new ensemble intrusion detection model using three one-dimensional long short-term memory networks (LSTM) is designed for an accurate attack identification. The outputs of three classifiers are aggregated using a meta-learner algorithm resulting in refined and improved results. In the second phase, interpretability and explainability of EED outputs are enhanced by leveraging the capabilities of SHape Additive exPplanations (SHAP). Factors contributing to the identification and classification of attacks are highlighted which allows security experts to understand and interpret the attack behavior and then implement effective response strategies to improve the network security. Experiments conducted on real datasets have shown the effectiveness of EED compared to conventional intrusion detection methods in terms of both accuracy and explainability. The EED method exhibits high accuracy in accurately identifying and classifying attacks while providing transparency and interpretability.

摘要

鉴于大型网络中可用数据呈指数级增长,为了在这类网络中有效发现攻击,对准确且可解释的入侵检测系统的需求变得极为迫切。为应对这一挑战,我们提出了一种基于可解释集成深度学习的两阶段方法(EED)用于入侵检测。在第一阶段,设计了一种使用三个一维长短期记忆网络(LSTM)的新型集成入侵检测模型,用于准确识别攻击。使用元学习算法聚合三个分类器的输出,从而得到优化和改进的结果。在第二阶段,通过利用SHapley值加法解释(SHAP)的功能来增强EED输出的可解释性和可说明性。突出了有助于攻击识别和分类的因素,这使安全专家能够理解和解释攻击行为,进而实施有效的应对策略以提高网络安全性。在真实数据集上进行的实验表明,与传统入侵检测方法相比,EED在准确性和可解释性方面均有效。EED方法在准确识别和分类攻击方面表现出高精度,同时提供透明度和可解释性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/6b434b911d17/peerj-cs-10-2289-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/e656f78814aa/peerj-cs-10-2289-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/e38e57e437d9/peerj-cs-10-2289-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/023433829b48/peerj-cs-10-2289-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/fcf87292886e/peerj-cs-10-2289-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/cebd0c5fe7bc/peerj-cs-10-2289-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/b84ac9633ead/peerj-cs-10-2289-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/abbd659fde54/peerj-cs-10-2289-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/85f2844ead23/peerj-cs-10-2289-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/73d1a90cd4d8/peerj-cs-10-2289-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/6b434b911d17/peerj-cs-10-2289-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/e656f78814aa/peerj-cs-10-2289-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/e38e57e437d9/peerj-cs-10-2289-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/023433829b48/peerj-cs-10-2289-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/fcf87292886e/peerj-cs-10-2289-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/cebd0c5fe7bc/peerj-cs-10-2289-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/b84ac9633ead/peerj-cs-10-2289-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/abbd659fde54/peerj-cs-10-2289-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/85f2844ead23/peerj-cs-10-2289-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/73d1a90cd4d8/peerj-cs-10-2289-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7f96/11419647/6b434b911d17/peerj-cs-10-2289-g010.jpg

相似文献

1
Enhancing intrusion detection performance using explainable ensemble deep learning.使用可解释集成深度学习提高入侵检测性能。
PeerJ Comput Sci. 2024 Sep 13;10:e2289. doi: 10.7717/peerj-cs.2289. eCollection 2024.
2
An improved long short term memory network for intrusion detection.改进的长短时记忆网络入侵检测。
PLoS One. 2023 Aug 1;18(8):e0284795. doi: 10.1371/journal.pone.0284795. eCollection 2023.
3
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.基于集成树和 SHAP 方法的入侵检测系统分类与解释。
Sensors (Basel). 2022 Feb 3;22(3):1154. doi: 10.3390/s22031154.
4
Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages.车载CAN-FD消息的多攻击入侵检测
Sensors (Basel). 2024 May 27;24(11):3461. doi: 10.3390/s24113461.
5
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.基于混合特征加权注意力的深度学习方法与随机森林算法在入侵检测系统中的应用。
PLoS One. 2024 May 23;19(5):e0302294. doi: 10.1371/journal.pone.0302294. eCollection 2024.
6
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems.基于面向对象分析(OOA)改进的双向长短期记忆(Bi-LSTM)网络:一种用于物联网系统的有效入侵检测框架。
Heliyon. 2024 Apr 13;10(8):e29410. doi: 10.1016/j.heliyon.2024.e29410. eCollection 2024 Apr 30.
7
Achieving model explainability for intrusion detection in VANETs with LIME.使用局部可解释模型无关解释方法(LIME)实现车联网入侵检测的模型可解释性。
PeerJ Comput Sci. 2023 Jun 22;9:e1440. doi: 10.7717/peerj-cs.1440. eCollection 2023.
8
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques.使用平衡类分布、特征选择和集成机器学习技术优化物联网入侵检测
Sensors (Basel). 2024 Jul 1;24(13):4293. doi: 10.3390/s24134293.
9
Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things' Devices Security.用于入侵检测的集成学习框架,以增强物联网设备的安全性。
Sensors (Basel). 2023 Jun 14;23(12):5568. doi: 10.3390/s23125568.
10
A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT.一种使用单类自动编码器和集成学习的轻量级物联网智能入侵检测系统。
Sensors (Basel). 2023 Apr 20;23(8):4141. doi: 10.3390/s23084141.

本文引用的文献

1
Deep learning models in genomics; are we there yet?基因组学中的深度学习模型;我们做到了吗?
Comput Struct Biotechnol J. 2020 Jun 17;18:1466-1473. doi: 10.1016/j.csbj.2020.06.017. eCollection 2020.
2
Long short-term memory.长短期记忆
Neural Comput. 1997 Nov 15;9(8):1735-80. doi: 10.1162/neco.1997.9.8.1735.