CluSHAPify: Synergizing Clustering and SHAP Value Interpretations for Improved Reconnaissance Attack Detection in IIoT Networks
*Corresponding Author(s):
Revised: ; Submitted on ; Accepted: ;
Reconnaissance attacks serve as the initial phase of Advanced Persistent Threats (APTs). The study proposes CluSHAPify, an approach that integrates SHAP-based traffic metadata selection with hierarchical clustering interpretations to determine the most relevant features for attack detection across different attack flow classes. Unlike most studies that select the top-k features, the proposed study uses hierarchical clustering to justify the selection of features identified with the highest SHAP values ensuring the most relevant features are chosen for effective attack detection across different attack flow classes. Additionally, CluSHAPify leverages multiple learners, making it a cross-model approach that also overcomes the limitations of SHAP-based feature selection, which is inherently model-dependent. The proposed approach uses multiple learners to improve feature selection robustness by capturing diverse perspectives, combining XAI for enhanced accuracy and explainability, a novel approach in existing research. This study uses performance metrics designed for unbalanced datasets, demonstrating its effectiveness with various learners, including XGBoost, Random Forest, Decision Tree, and Extra Trees. This makes CluSHAPify a reliable and adaptable solution for detecting reconnaissance attacks in IIoT environments.
Keywords:
Cite this article
Saxena Arpna, Mittal Sangeeta.
Reference
A study on APT in IoT networks
, pp.
An experimental analysis of security vulnerabilities in industrial IoT devices
,
Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases
. Vilnius: Entrepreneurship and Sustainability Center, 2020, 2(
Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning
,
Machine learning for data center optimizations: feature selection using shapley additive explanation (SHAP)
,
SHapley additive explanations (SHAP) for efficient feature selection in rolling bearing fault diagnosis
,
Developing transparent IDS for VANETs using LIME and SHAP: an empirical study
,
An explainable deep learning-enabled intrusion detection framework in IoT networks
,
A model-agnostic XAI approach for developing low-cost IoT intrusion detection dataset
,
XAI-ADS: an explainable artificial intelligence framework for enhancing anomaly detection in autonomous driving systems
.
An ensemble tree-based model for intrusion detection in industrial internet of things networks
,
/
〈 | 〉 |