The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1002/int.23088
|View full text |Cite
|
Sign up to set email alerts
|

Explainable machine learning in cybersecurity: A survey

Abstract: Machine learning (ML) techniques are increasingly important in cybersecurity, as they can quickly analyse and identify different types of threats from millions of events. In spite of the increasing number of possible applications of ML, successful adoption of ML models in cybersecurity still highly relies on the explainability of those models that are used for making predictions. Explanations that support ML model outputs are crucial in cybersecurity‐oriented ML applications because people need to get more inf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 106 publications
(196 reference statements)
0
1
0
1
Order By: Relevance
“…Kemudian dalam penelitian (Ahmetoglu & Das, 2022) dijelaskan juga berbagai teknik ML yaitu deep learning, ensemble, rule system, bayesian, regression, dimensionality reduction, decision tree, instance based, dan clustering. Sedangkan, penelitian (Yan et al, 2022) (Laqtib et al, 2020). Dataset DARPA 1998, KDD CUP 99, NSL-KDD, CIC IDS 2017, CSE-CIC-IDS2018, ADFA 2013, dan UNSW-NB15 juga disebutkan dalam penelitian (Yadav et al, 2020).…”
Section: Hasil Dan Analisis Dari Setiap Research Questionunclassified
“…Kemudian dalam penelitian (Ahmetoglu & Das, 2022) dijelaskan juga berbagai teknik ML yaitu deep learning, ensemble, rule system, bayesian, regression, dimensionality reduction, decision tree, instance based, dan clustering. Sedangkan, penelitian (Yan et al, 2022) (Laqtib et al, 2020). Dataset DARPA 1998, KDD CUP 99, NSL-KDD, CIC IDS 2017, CSE-CIC-IDS2018, ADFA 2013, dan UNSW-NB15 juga disebutkan dalam penelitian (Yadav et al, 2020).…”
Section: Hasil Dan Analisis Dari Setiap Research Questionunclassified
“…At present, the construction of the network security industry is basically realized around the three models, and the security product system is also formed as a result [3]. However, in-depth analysis of the current stage of network security product development at home and abroad is not difficult to find that, at present, there is no security product that can defend against all attacks, which makes the traditional network security protection concepts that have long been practiced, network security protection products there are some fundamental problems [4][5]. Traditional network security protection is in a system of hindsight and hindsight defense and threat defense through generic, specific feature rules; this hindsight and hindsight defense system and network security protection of real-time, forward-looking needs there is a certain contradiction [6].…”
Section: Introductionmentioning
confidence: 99%