Developing Transparent IDS for VANETs Using LIME and SHAP:An Empirical Study  被引量:1

在线阅读下载全文

作  者:Fayaz Hassan Jianguo Yu Zafi Sherhan Syed Arif Hussain Magsi Nadeem Ahmed 

机构地区:[1]Beijing Key Laboratory of Work Safety Intelligent Monitoring,School of Electronic Engineering,Beijing University of Post and Telecommunication,Beijing,100876,China [2]Department of Telecommunication Engineering,Mehran University of Engineering and Technology,Jamshoro,76062,Pakistan [3]State Key Laboratory of Networking and Switching Technology,Beijing University of Post and Telecommunication,Beijing,100876,China [4]School of Electronic Science,Beijing University of Post and Telecommunication,Beijing,100876,China

出  处:《Computers, Materials & Continua》2023年第12期3185-3208,共24页计算机、材料和连续体(英文)

基  金:supported in part by the National Natural Science Foundation of China(NSFC)under Grant Number 62127802.

摘  要:Vehicular Ad-hoc Networks(VANETs)are mobile ad-hoc networks that use vehicles as nodes to create a wireless network.Whereas VANETs offer many advantages over traditional transportation networks,ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks.This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System(IDS)that merges Machine Learning(ML)–based attack detection with Explainable AI(XAI)explanations.This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest(RF)classifier that achieves a classification accuracy of 100%for the binary classification task of identifying normal and malicious traffic.An innovative aspect of this study is the incorporation of XAI methodologies,specifically the Local Interpretable Model-agnostic Explanations(LIME)and SHapley Additive exPlanations(SHAP).In addition,this research also considered key features identified by mutual information-based feature selection for the task at hand.The major findings from this study reveal that the XAI-based intrusion detection methods offer distinct insights into feature importance.Key features identified by mutual information,LIME,and SHAP predominantly relate to Transmission Control Protocol(TCP),Hypertext Transfer Protocol(HTTP),Domain Name System(DNS),and Message Queuing Telemetry Transport(MQTT)protocols,highlighting their significance in distinguishing normal and malicious network activity.This XAI approach equips cybersecurity experts with a robust means of identifying and understanding VANET malicious activities,forming a foundation for more effective security countermeasures.

关 键 词:Intrusion detection system machine learning security vehicular networks 

分 类 号:TP39[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象