ENIXMA: ENsemble of EXplainable Methods for detecting network Attack

سال انتشار: 1403
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 58

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

این مقاله در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_CKE-7-1_001

تاریخ نمایه سازی: 26 خرداد 1403

چکیده مقاله:

The Internet has become an integral societal component, with its accessibility being imperative. However, malicious actors strive to disrupt internet services and exploit service providers. Countering such challenges necessitates robust methods for identifying network attacks. Yet, prevailing approaches often grapple with compromised precision and limited interpretability. In this paper, we introduce a pioneering solution named ENIXMA, which harnesses a fusion of machine learning classifiers to enhance attack identification. We validate ENIXMA using the CICDDoS۲۰۱۹ dataset. Our approach achieves a remarkable ۹۰% increase in attack detection precision on the balanced CICDDoS۲۰۱۹ dataset, signifying a substantial advancement compared to antecedent methodologies that registered a mere ۳% precision gain. We employ diverse preprocessing and normalization techniques, including z-score, to refine the data. To surmount interpretability challenges, ENIXMA employs SHAP, LIME, and decision tree methods to pinpoint pivotal features in attack detection. Additionally, we scrutinize pivotal scenarios within the decision tree. Notably, ENIXMA not only attains elevated precision and interpretability but also showcases expedited performance in contrast to prior techniques.

نویسندگان

seyed mojtaba abtahi

School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran

Hossein Rahmani

School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran

Milad allahgholi

School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran

Sajjad alizadeh fard

School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • M. Aamir and S. M. Ali Zaidi, “Clustering based semi-supervised ...
  • S. Zavrak and M. Iskefiyeli, “Anomaly-Based Intrusion Detection From Network ...
  • R. Bhatia, R. Sharma, and A. Guleria, “Anomaly Detection Systems ...
  • M. M. Hassan, A. Gumaei, A. Alsanad, M. Alrubaian, and ...
  • S.-T. Chiu and F.-Y. Leu, “Detecting DoS and DDoS Attacks ...
  • M. Nooribakhsh and M. Mollamotalebi, “A review on statistical approaches ...
  • S. Hosseini and M. Azizi, “The hybrid technique for DDoS ...
  • M. Du, N. Liu, and X. Hu, “Techniques for interpretable ...
  • C. Yin, Y. Zhu, J. Fei, and X. He, “A ...
  • M. M. Hassan, A. Gumaei, A. Alsanad, M. Alrubaian, and ...
  • A. Girma, M. Garuba, Jiang Li, and Chunmei Liu, “Analysis ...
  • R. B. Blažek, H. Kim, B. Rozovskii, and A. Tartakovsky, ...
  • S. R. Gaddam, V. v Phoha, and K. S. Balagani, ...
  • Hoai-Vu Nguyen and Yongsun Choi, “Proactive Detection of DDoS Attacks ...
  • A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. ...
  • C.-K. Han and H.-K. Choi, “Effective discovery of attacks using ...
  • C. Di Francescomarino and C. Ghidini, “Predictive Process Monitoring,” in ...
  • W. Rizzi, C. Di Francescomarino, and F. M. Maggi, “Explainability ...
  • R. Sindhgatta, C. Ouyang, and C. Moreira, “Exploring interpretability for ...
  • D. Adi and N. Nurdin, “Explainable Artificial Intelligence (XAI) towards ...
  • I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. ...
  • W. E. Marcilio and D. M. Eler, “From explanations to ...
  • Mirkovic, Jelena, Gregory Prier, and Peter Reiher. "Attacking DDoS at ...
  • J. Mirkovic, G. Prier, and P. Reiher, “Source-end DDoS defense,” ...
  • S. I. Ao and International Association of Engineers., International MultiConference ...
  • X. Liang and T. Znati, “On the performance of intelligent ...
  • X. Wu et al., “Top ۱۰ algorithms in data mining,” ...
  • D. Hu, P. Hong, and Y. Chen, “FADM: DDoS Flooding ...
  • Z. Xie, W. Dong, J. Liu, H. Liu, and D. ...
  • B. Charbuty and A. Abdulazeez, “Classification Based on Decision Tree ...
  • S. K. Murthy, “Automatic Construction of Decision Trees from Data: ...
  • H. Kousar, M. M. Mulla, P. Shettar, and D. G. ...
  • Gao, W. and Morris, T.H., ۲۰۱۴. On cyber attacks and ...
  • نمایش کامل مراجع