ENIXMA: ENsemble of EXplainable Methods for detecting network Attack
Publish place: Computer and Knowledge Engineering، Vol: 7، Issue: 1
Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 26
This Paper With 8 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
JR_CKE-7-1_001
تاریخ نمایه سازی: 26 خرداد 1403
Abstract:
The Internet has become an integral societal component, with its accessibility being imperative. However, malicious actors strive to disrupt internet services and exploit service providers. Countering such challenges necessitates robust methods for identifying network attacks. Yet, prevailing approaches often grapple with compromised precision and limited interpretability. In this paper, we introduce a pioneering solution named ENIXMA, which harnesses a fusion of machine learning classifiers to enhance attack identification. We validate ENIXMA using the CICDDoS۲۰۱۹ dataset. Our approach achieves a remarkable ۹۰% increase in attack detection precision on the balanced CICDDoS۲۰۱۹ dataset, signifying a substantial advancement compared to antecedent methodologies that registered a mere ۳% precision gain. We employ diverse preprocessing and normalization techniques, including z-score, to refine the data. To surmount interpretability challenges, ENIXMA employs SHAP, LIME, and decision tree methods to pinpoint pivotal features in attack detection. Additionally, we scrutinize pivotal scenarios within the decision tree. Notably, ENIXMA not only attains elevated precision and interpretability but also showcases expedited performance in contrast to prior techniques.
Keywords:
Authors
seyed mojtaba abtahi
School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran
Hossein Rahmani
School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran
Milad allahgholi
School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran
Sajjad alizadeh fard
School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :