Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System

04/05/2022
by   Qianru Zhou, et al.
0

The Internet is the most complex machine humankind has ever built, and how to defense it from intrusions is even more complex. With the ever increasing of new intrusions, intrusion detection task rely on Artificial Intelligence more and more. Interpretability and transparency of the machine learning model is the foundation of trust in AI-driven intrusion detection results. Current interpretation Artificial Intelligence technologies in intrusion detection are heuristic, which is neither accurate nor sufficient. This paper proposed a rigorous interpretable Artificial Intelligence driven intrusion detection approach, based on artificial immune system. Details of rigorous interpretation calculation process for a decision tree model is presented. Prime implicant explanation for benign traffic flow are given in detail as rule for negative selection of the cyber immune system. Experiments are carried out in real-life traffic.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/09/2012

Classification of artificial intelligence ids for smurf attack

Many methods have been developed to secure the network infrastructure an...
research
11/19/2021

A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System

Cybersecurity has been a concern for quite a while now. In the latest ye...
research
11/22/2019

Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response

Artificial Intelligence (AI) has become an integral part of modern-day s...
research
06/01/2021

Watching Smartly from the Bottom: Intrusion Detection revamped through Programmable Networks and Artificial Intelligence

The advent of Programmable Data Planes represents an outstanding evoluti...
research
07/08/2020

NERD: Neural Network for Edict of Risky Data Streams

Cyber incidents can have a wide range of cause from a simple connection ...
research
07/24/2020

A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures

Volunteer computing uses Internet-connected devices (laptops, PCs, smart...

Please sign up or login with your details

Forgot password? Click here to reset