Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models

To design and develop AI-based cybersecurity systems (e.g., intrusion detection system (IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this...

Full description

Saved in:
Bibliographic Details
Main Authors: Basim Mahbooba, Radhya Sahal, Wael Alosaimi, Martin Serrano
Format: Article
Language:English
Published: Wiley 2021-01-01
Series:Complexity
Online Access:http://dx.doi.org/10.1155/2021/5538896
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832566499061006336
author Basim Mahbooba
Radhya Sahal
Wael Alosaimi
Martin Serrano
author_facet Basim Mahbooba
Radhya Sahal
Wael Alosaimi
Martin Serrano
author_sort Basim Mahbooba
collection DOAJ
description To design and develop AI-based cybersecurity systems (e.g., intrusion detection system (IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree (DT), K nearest neighbour (KNN), random forest (RF), and naïve Bayes (NB). The four deep learning techniques are LSTM (one and two layers) and GRU (one and two layers). Two datasets are used to classify the IDS attack type, including wireless sensor network detection system (WSN-DS) and KDD Cup network intrusion dataset. A detailed comparison of the eight techniques’ performance using all features and selected features is made by measuring the accuracy, precision, recall, and F1-score. Considering the findings related to the data, methodology, and expert accountability, interpretability for AI-based solutions also becomes demanded to enhance trust in the IDS.
format Article
id doaj-art-b2497f8035ad4a6f875d2bc8dda8d24d
institution Kabale University
issn 1076-2787
1099-0526
language English
publishDate 2021-01-01
publisher Wiley
record_format Article
series Complexity
spelling doaj-art-b2497f8035ad4a6f875d2bc8dda8d24d2025-02-03T01:04:04ZengWileyComplexity1076-27871099-05262021-01-01202110.1155/2021/55388965538896Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning ModelsBasim Mahbooba0Radhya Sahal1Wael Alosaimi2Martin Serrano3Data Science Institute Insight Centre for Data Analytics, National University of Ireland Galway, Galway, IrelandFaculty of Computer Science and Engineering, Hodeidah University, Al Hudaydah, YemenDepartment of Information Technology, College of Computers and Information Technology, Taif University, P.O.Box 11099, Taif 21944, Saudi ArabiaData Science Institute Insight Centre for Data Analytics, National University of Ireland Galway, Galway, IrelandTo design and develop AI-based cybersecurity systems (e.g., intrusion detection system (IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree (DT), K nearest neighbour (KNN), random forest (RF), and naïve Bayes (NB). The four deep learning techniques are LSTM (one and two layers) and GRU (one and two layers). Two datasets are used to classify the IDS attack type, including wireless sensor network detection system (WSN-DS) and KDD Cup network intrusion dataset. A detailed comparison of the eight techniques’ performance using all features and selected features is made by measuring the accuracy, precision, recall, and F1-score. Considering the findings related to the data, methodology, and expert accountability, interpretability for AI-based solutions also becomes demanded to enhance trust in the IDS.http://dx.doi.org/10.1155/2021/5538896
spellingShingle Basim Mahbooba
Radhya Sahal
Wael Alosaimi
Martin Serrano
Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
Complexity
title Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
title_full Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
title_fullStr Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
title_full_unstemmed Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
title_short Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models
title_sort trust in intrusion detection systems an investigation of performance analysis for machine learning and deep learning models
url http://dx.doi.org/10.1155/2021/5538896
work_keys_str_mv AT basimmahbooba trustinintrusiondetectionsystemsaninvestigationofperformanceanalysisformachinelearninganddeeplearningmodels
AT radhyasahal trustinintrusiondetectionsystemsaninvestigationofperformanceanalysisformachinelearninganddeeplearningmodels
AT waelalosaimi trustinintrusiondetectionsystemsaninvestigationofperformanceanalysisformachinelearninganddeeplearningmodels
AT martinserrano trustinintrusiondetectionsystemsaninvestigationofperformanceanalysisformachinelearninganddeeplearningmodels