“…CIC Collection (IDS17, IDS18, DoS17, DDoS19) [27] 2020 PSH flag count, fwd packet length min, bwd packet length min, down/up ratio [28] 2020 protocol, down/up ratio, active std [13] 2021 PSH flag count, active std [16] 2021 fwd packet length min, packet length min, PSH flag count, ACK flag count [14] 2021 protocol, bwd packet length min [15] 2021 packet length min, bwd packet length min [29] 2022 PSH flag count, packet length min, protocol, fwd packet length min, bwd packet length min active std, idle std, ACK flag count, ECE flag count, RST flag count, down/up ratio [33]) proposed for cyber security ML systems on six criteria. They conclude that white-box techniques (full model access) such as integrated gradients and layer-wise relevance propagation comply best with the tested criteria.…”