Interpretable Intrusion Detection through Approximation of Complex Model

Mengyu Qi, Zun Liu, Yangming Guo, Jiang Long, Yucan Zou

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Intrusion detection models process attack data efficiently with high accuracy while security researchers make decisions based on their results. However, despite the excellent detection results of black-box models, researchers cannot improve their decisions based on the model's predictions. To address the above issues, this paper proposes an interpretable RFAL-stack intrusion detection model, which builds an ensemble L-stack model to accomplish intrusion detection efficiently and transparentizes the original model with random forest approximation. With the transparent random forest, the RFAL-stack can output its decision paths and quantitatively measure the actual contribution of different paths to the results. Finally, the article experimentally demonstrates that the RFAL-stack significantly reduces the decision tree size and improves the interpretability of the model with guaranteed detection performance.

Original languageEnglish
Title of host publication2024 IEEE 19th Conference on Industrial Electronics and Applications, ICIEA 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350360868
DOIs
StatePublished - 2024
Event19th IEEE Conference on Industrial Electronics and Applications, ICIEA 2024 - Kristiansand, Norway
Duration: 5 Aug 20248 Aug 2024

Publication series

Name2024 IEEE 19th Conference on Industrial Electronics and Applications, ICIEA 2024

Conference

Conference19th IEEE Conference on Industrial Electronics and Applications, ICIEA 2024
Country/TerritoryNorway
CityKristiansand
Period5/08/248/08/24

Keywords

  • ensemble model
  • interpretability
  • Intrusion detection
  • transparent model

Fingerprint

Dive into the research topics of 'Interpretable Intrusion Detection through Approximation of Complex Model'. Together they form a unique fingerprint.

Cite this