2021
DOI: 10.1016/j.procs.2021.08.239
|View full text |Cite
|
Sign up to set email alerts
|

Detecting anomalies and attacks in network traffic monitoring with classification methods and XAI-based explainability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…The experiments were planned to be carried out in an extended version of the virtual environment mentioned in [ 73 ]. However, the number of simulated workstations was increased to two attacking systems and four victims.…”
Section: Methodsmentioning
confidence: 99%
“…The experiments were planned to be carried out in an extended version of the virtual environment mentioned in [ 73 ]. However, the number of simulated workstations was increased to two attacking systems and four victims.…”
Section: Methodsmentioning
confidence: 99%
“…Unlike noise, network outliers carry important information, which can inform proactive network threat management. For example, an unusually large number of requests coming from one computer could be an outlier generated by a different process, which could indicate a malicious attack or some other type of unusual activity [11]. Thus, network outliers can help detect malicious behavior or provide insight into abnormal traffic patterns.…”
Section: Related Workmentioning
confidence: 99%
“…By detecting unusual activity in the network, organizations can identify malicious activities and reduce the risk of security breaches. Network anomaly detection can also be used to improve network performance by identifying and addressing network congestion, latency issues, and slow response times [11,12]. Li et al [13] developed an optimized resource allocation and communication technique for the fault detection system.…”
Section: Related Workmentioning
confidence: 99%
“…3) Use of XAI in IDS: There are several examples where XAI-methods have been used with ML-based IDS. Wawrowski et al [39] used SHAP with a ML techniques called gradient boosting to implement an anomaly detection system. Mane & Rao [18] used a neural network to detect network intrusions, while presenting a XAI framework which explains each step of the ML pipeline.…”
Section: A Xaimentioning
confidence: 99%
“…Several studies of SOC environments, including the use of AI in the SOC, have pointed towards adapting and using XAI techniques to support analysts [25], [7], [21], [9], [32], [2], [16], [26]. There have also been several attempts applying XAI to explain ML-generated alerts [39], [38], [28], [15], [20], [27], [34]. However, studies on how and if XAI actually provided the necessary explanation for a security analyst seems to be missing [11].…”
Section: Introductionmentioning
confidence: 99%