Open Access
ARTICLE
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
1 Centro Direzionale, Department of Engineering, University of Naples ‘Parthenope’, Isola C4, Napoli, 80133, Italy
2 Department of Computer and Information Science, Software and Systems, Linköping University, Linköping, 58183, Sweden
3 ITTI Sp. z o.o., Poznań, 61-612, Poland
4 Faculty of Telecommunications, Computer Science and Electrical Engineering, Bydgoszcz University of Science and Technology, Bydgoszcz, 85-796, Poland
* Corresponding Author: Michał Choraś. Email:
(This article belongs to the Special Issue: Artificial Intelligence Current Perspectives and Alternative Paths: From eXplainable AI to Generative AI and Data Visualization Technologies)
Computers, Materials & Continua 2025, 83(2), 1607-1621. https://doi.org/10.32604/cmc.2025.062801
Received 28 December 2024; Accepted 05 March 2025; Issue published 16 April 2025
Abstract
The growing sophistication of cyberthreats, among others the Distributed Denial of Service attacks, has exposed limitations in traditional rule-based Security Information and Event Management systems. While machine learning–based intrusion detection systems can capture complex network behaviours, their “black-box” nature often limits trust and actionable insight for security operators. This study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules, thereby enhancing the detection of Distributed Denial of Service (DDoS) attacks. The proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules - to extract decision criteria from a fully trained model. The methodology was validated on two benchmark datasets, CICIDS2017 and WUSTL-IIOT-2021. Extracted rules were evaluated against conventional Security Information and Event Management Systems rules with metrics such as precision, recall, accuracy, balanced accuracy, and Matthews Correlation Coefficient. Experimental results demonstrate that xAI-derived rules consistently outperform traditional static rules. Notably, the most refined xAI-generated rule achieved near-perfect performance with significantly improved detection of DDoS traffic while maintaining high accuracy in classifying benign traffic across both datasets.Keywords
In recent years, the landscape of Artificial Intelligence (AI) and Machine Learning (ML) has expanded rapidly, empowering models with predictive capabilities that often exceed human ingenuity. However, these remarkable achievements frequently come at the expense of transparency, as the reasoning behind model outputs remains obscure [1,2]. Recognizing this issue, Explainable Artificial Intelligence (xAI) has emerged as a pivotal research area dedicated to elucidating the internal logic of ML models [3]. By providing insights into how features influence predictions, xAI holds the promise of bridging the gap between opaque algorithms and the practitioners who rely on them.
This pursuit for interpretability is especially important in cybersecurity, where the acceptance and efficacy of AI-driven solutions hinge on trustworthiness. Despite increasing adoption, many decision-makers in this field remain wary of AI’s ‘black-box’ nature [4], further complicated by the legal and ethical implications of automated decisions [5]. As cyberthreats grow more sophisticated, ensuring that detection methods are both accurate and transparent becomes paramount. Here, xAI finds a compelling application, as trust and clarity underpin robust cybersecurity strategies [6–9].
Within the defensive arsenal of organizations, Security Information and Event Management (SIEM) systems have played a leading role by applying human-crafted, rule-based detection schemes [10] for a long time now [10–12]. By many, SIEM systems are believed to be indispensable [13]. While these rules are transparent and grounded in domain expertise, they may not fully capture the complexity and evolving nature of modern threats. Conversely, ML-powered Network Intrusion Detection Systems (NIDS) offer dynamic and data-driven capabilities to identify anomalous activities, yet their black-box models are often met with skepticism and a reluctance to fully integrate them into established workflows [14].
This research aims to unify these two paradigms—traditional rule-based SIEM and advanced ML-driven NIDS—into a synergistic solution. Specifically, this paper proposes a methodology to extract explainable and actionable detection rules directly from an ML model, leveraging xAI techniques. By doing so, the paper provides a conceptual and technological bridge between longstanding cybersecurity practices and the promise of cutting-edge ML algorithms.
While this paper primarily focuses on the application of xAI to enhance detection of DDoS attacks, the methodologies developed here have potential implications for a broader range of cyberthreats, suggesting a promising avenue for future research to expand the scope of these techniques in future work.
1.2 Major Contribution and Extension of This Paper
The principal contribution of this work comes in addressing the current gap in practical approaches leveraging xAI and ML-powered NIDS. Traditional SIEM systems primarily rely on predefined, static rules and patterns to detect anomalies, which often fail to adapt to the dynamic nature of modern cyberthreats. The reliance on pre-established thresholds and criteria can prevent the detection of low-and-slow attack variants, which do not initially trigger these thresholds but can escalate into severe disruptions. A significant drawback of relying on SIEM systems is the knowledge the user needs to possess to be able to update their rules reliably—knowledge which is expensive and hard to find [15,16]. This paper aims at addressing these shortcomings, overcoming some of the limitations of the use of SIEM systems. This is accomplished by augmenting conventional SIEM with xAI insights which distills precise, human-interpretable detection rules from trained models, boosting classification accuracy and maintaining operator confidence.
To the best of the authors’ knowledge, this represents a novel and innovative approach, offering a previously unexplored pathway to harmonize established cybersecurity frameworks with the powerful, yet often opaque, potential of AI.
This work is an invited extension of our published conference paper from the previous Asian Conference on Intelligent Information and Database Systems (ACIIDS) held in 2024 [17].
In the earlier study, the methodology and preliminary findings were introduced and validated using a single dataset.
Hereby, the experiments and evaluation are strengthened and broadened by incorporating another dataset, effectively doubling the scope of the evaluation and providing a more rigorous empirical validation of the proposed methodology. It is always important in machine learning, artificial intelligence and cybersecurity research and practice to generalize approaches and solutions on wide range datasets and scenarios. Therefore, our further efforts in extending the previous work with additional experimental setups on another dataset.
This expanded evaluation underlines the method’s scalability and generalizability, and its relevance for a wider range of cybersecurity environments.
The paper is organized as follows: Section 2 overviews the related work, highlighting the lack of practical approaches; Section 3 delves into the enabling concepts and technologies of the proposed research; Section 4.1 provides details regarding the Datasets and methodology, presenting the correlation rules defined before and after the application of xAI; Section 5 presents the results of the experiments using both sets of rules; Section 6 analyzes the obtained results and provides a comparison between the discovered rules on two different benchmark datasets. Threats to validity and possible future directions are given in Section 7. Finally, Section 8 ends the paper with final remarks. The list of abbreviations used in the paper is enclosed in Table 1.

This section reviews the existing literature on xAI applications in cybersecurity, particularly focusing on NIDS, to underscore the unique contribution of this research as related to the backdrop of previous work.
In the last few years, xAI has been gaining popularity in the cybersecurity domain, as it has become the subject of various reviews [6–9] and experiments.
For what concerns Intrusion Detection Systems (IDS) [6] introduces an advanced IDS utilizing ML ensemble methods like Decision Trees (DT), Random Forest (RF), and Support Vector Machines (SVM), achieving promising results. In [18], the critical role of trust management in IDS is explored, emphasizing the need for transparency in ML models utilized in the cybersecurity domain. It discusses the challenges of interpreting “black-box” AI models and the importance of xAI in enhancing trust by enabling human experts to comprehend the model’s decision-making process. The paper [19] introduces an IDS employing ML techniques like DT, RF, and xAI on real-world Software-Defined Networking (SDN) data. The evaluation covers various intrusion scenarios, achieving high accuracy. By integrating Machine Learning and xAI using Local Interpretable Model-Agnostic Explanations (LIME), the research aims to boost intrusion detection accuracy and maintain data integrity. The objectives are to classify intrusions using DT and RF algorithms in SDN, compare their performance, and implement LIME to identify key network features contributing to intrusions. In [20], an approach for detecting DDoS attacks using xAI is proposed. The method focuses on identifying attack behaviours in network traffic flows without analyzing packet payloads. By leveraging autoencoders and xAI, it provides a better understanding of the most influential features for attack detection, and setting individual thresholds for such features to support attack detection. The work carried out in [21] aims at contributing to rigorous xAI-equipped IDS for DDoS attacks. It introduces an approach based on artificial immune systems, featuring a decision tree model. The paper details the process of mapping, combining, and merging to transform continuous features into boolean expressions, which are then simplified into prime implicants. The resulting prime implicants serve as rules for DDoS intrusion detection. Most of the research works in the application of xAI in ML-powered NIDS focus on opening the black box of AI, hoping to gather trust for the emerging technology. There is a very relevant gap in the utilisation of knowledge garnered by ML algorithms in NIDS, which would translate into immediately available, actionable intel for the security operatives. The research contained within this paper provides an innovative experimental study to employ xAI to enhance traditional rule-based SIEM systems and IDS, by using ML logic to support the definition of highly accurate discrimination criteria for attack detection. This bridges the gap between the immense benefits of the application of data-based algorithms and the apparent lack of trust in the emerging technology among the cybersecurity community. Despite using various search engines and bibliographic methods, no similar approaches have been found other than the aforementioned works. To the best of the auhtors’knowledge, the proposed research is a novel, innovative approach filling the research gap. In order to illustrate the landscape of current research on the application of xAI in cybersecurity, Table 2 provides a comprehensive overview of related works in the field.

This section provides an overview of the enabling technologies and datasets employed in this study, providing the foundational concepts for understanding the contribution of this work.
3.1 Explainable Artificial Intelligence
The focus of xAI is on creating methods that render ML models more transparent and interpretable, ultimately enabling a human audience to comprehend their internal logic [22]. Various techniques fall under the umbrella of xAI, but they can generally be categorized into three main groups:
• Feature importance: Approaches that pinpoint the most influential features in a model’s decision-making process, assisting practitioners in understanding which inputs are driving predictions.
• Rule-based explanations: Techniques that distil complex model logic into human-readable rules, thereby clarifying how certain outcomes are reached.
• Counterfactual explanations: Methods that determine the minimal input modifications needed to alter a model’s output, shedding light on the underlying rationale and potential scenarios where different predictions could emerge.
By employing these xAI strategies, cybersecurity professionals can gain deeper insights into how ML models detect anomalies, recognize patterns, and differentiate between benign and malicious activities. This enhanced understanding helps to identify potential biases, troubleshoot unexpected behaviours, and ultimately cultivate greater trust and confidence in the outputs of the models.
The RF classifier is a robust ensemble learning method that integrates the strengths of multiple decision trees. By applying bootstrap aggregation (bagging), it constructs numerous trees on randomly selected subsets of the training data, fostering diversity in their learned patterns. This diversity enables the RF to uncover complex relationships between features and the target variable. Each tree serves as a “weak learner,” and their collective predictions are aggregated through majority voting [23,24], effectively creating a strong, stable predictor. Owing to its ability to resist overfitting and model intricate interactions, the RF algorithm has proven to be highly proficient in network intrusion detection tasks [25].
The rationale for employing RF algorithm is in its ability to achieve classification outcomes comparable to those of more complex deep learning approaches on NIDS data. Crucially, in alignment with the objective of reducing barriers to entry in security technology, RF algorithm offers a more straightforward configuration process than their counterparts, such as neural networks. Being a supervised algorithm, it allows one to perform xAI operations for rule derivation, facilitating the approach proposed in this paper.
The proposed methodology was tested using two different datasets: CICIDS2017 (
Owing to the notable class imbalance present in the original datasets, a preliminary data preprocessing phase was performed. To mitigate the skew in the class distribution, the Synthetic Minority Over-sampling Technique (SMOTE) was adopted, following the approach outlined in [28]. Any records containing missing values or duplicates were subsequently removed.
Following the cleaning process, dimensionality reduction was undertaken using the SelectKBest method from the scikit-learn library. This procedure employs a univariate statistical test based on the Analysis of Varience (ANOVA) F-value to gauge how features relate to their labels. Analysing the feature importance scores revealed that, beyond the first 14 features, subsequent scores display a substantial decline. Correlation checks were also conducted to eliminate overlaps, thereby retaining only those features with the most representative information.
4 Proposed Method for SIEM Rules Enhancement
This section outlines the innovation of the proposed method to enhance SIEM rules using xAI, detailing the procedural steps and the rationale behind the integration of ML models and xAI techniques. It introduces the novel strategy for deriving SIEM rules through explainability. The process begins with defining a set of traditional static rules. It then proceeds with mining an enhanced rule set by examining the decision trees empirically, then by using SHAP [29], and ANCHORS [30]. All resulting rules from both approaches have been validated with an RF classifier, and the corresponding experimental outcomes are detailed in Section 5. The pipeline of rule derivation is showcased in Fig. 1.

Figure 1: The pipeline of deriving rules from ML classifiers with xAI
4.1 Definition of Static SIEM Rules
The following subsection delineates how the static SIEM rules were formulated.
LetX represent the set of features in the original dataset D, and let
Within the present research, four different correlation rules have been generated for
After this analysis, the
The thresholds
where
The same logic has been applied considering
To further validate the proposed methodology, an additional baseline rule was extracted using the same approach on
Similarly to the previous set of rules, the threshold
4.2 Novel Method for SIEM Rules Mining via xAI
The application of xAI on the RF for the
All the extracted rules are used for binary classification, dividing network traffic into two classes:
Many of the conditions in the trees involve numerical thresholds. For example, a common pattern is to check if a particular feature is greater than or less than a certain threshold value. If the condition is met, the traffic is classified as benign (
Numerous conditions combine multiple features or rely on logical operators such as “and” to form compound criteria. In certain instances, these conditions include both “greater than” and “less than” thresholds, which increases the complexity of the decision logic. Nodes within the trees frequently adopt an “If...Then...Else” structure, where the tree follows the “Then” branch and assigns a traffic label if a condition is met, or proceeds to the “Else” branch for further evaluation if it is not.
A prominent observation is that most decision pathways culminate in a benign (
The decision tree outputs were initially examined to select a subset of rules suitable for conversion into a nested SIEM rule. This consolidated rule is presented in Eq. (10) in a streamlined format to enhance clarity. The thresholds within this rule are highly precise, having been extracted from recurrent values observed in the forest. These thresholds are denoted as
Subsequently, the SHAP values have been extracted and analyzed, leading to the following SIEM rule (Eq. (11)). The features with the highest SHAP values have been considered and employed in the definition of discriminatory criteria. In the Equation, the threshold
Finally, a third rule has been derived using explainability features provided by ANCHORS. The rule is formalized in Eq. (12), where
Additional experiments were conducted on
The
This value has been selected as the threshold for the
5 Experimental Setup and Results
The following section presents the setup of the performed experiments and the detailed results obtained, as the empirical evidence of the effectiveness of the proposed approach.
The results of the experimental approach are summarized in Tables 3 and 4. The metrics in Table 3 have been extracted by training the ML classifier using the SIEM-labelled datasets, where the labels were assigned through the correlation rules described previously, and using the ground truth dataset for testing. The ones in Table 4 were obtained using the SIEM-labelled dataset obtained from the rules extracted through xAI from the RF Model (RFM) for training, and the ground truth dataset for testing.


The tables show a summary of the classification report based on Precision (15), Recall (16), F1-Score (17), Accuracy (18), Balanced Accuracy (BA) (19), Matthews Correlation Coefficient (MCC) (20), and Geometric Mean (G-mean) (21). In the following equations, for the sake of brevity, True Positive (TP), True Negative (TN), False Positive (FP) and False Negative (FN) are denoted using the acronyms.
According to the results, the rules derived from RF through xAI outperform SIEM detection rules in multiple aspects. As shown in Table 4, the rule defined in Eq. (12) achieved a Precision of 1.0 for the BENIGN class, and 0.96 for the DDoS class, Recall of 0.86 for the BENIGN class, and 1.0 for the DDoS class, F1-score of 0.98 for both classes, Accuracy, BA and G-mean of 0.98, and MCC of 0.96. The best SIEM detection rule (Eq. (6)), on the other hand, achieved a Precision of 0.73 for the BENIGN class, and 0.99 for the DDoS class, Recall of 1.0 for the BENIGN class, and 0.63 for the DDoS class, F1-score of 0.84 for the BENIGN class, and 0.77 for the DDoS class, and overall Accuracy of 0.81. The same performance trends were observed when using the dataset
6 Discussion and Lessons Learnt
This section analyzes the outcomes, discusses the scalability and generalizability of the proposed method, and reflects on the lessons learned from the application of xAI in enhancing cybersecurity practices.
The experimental findings demonstrate that SIEM rules generated through the RF model using xAI methods can surpass the performance of conventional SIEM detection rules. As shown in Table 4, the rule specified in Eq. (10) attains considerably higher Precision and Recall scores in classifying both BENIGN and DDoS samples. Specifically, a Precision of 1.0 for the BENIGN class reflects near-perfect accuracy in identifying benign traffic, while a Recall of 1.0 for the DDoS class indicates the detection of nearly all actual DDoS instances. This equilibrium between Precision and Recall is also evident in a high F1-score, underscoring the rule’s effectiveness in accurately classifying both classes. Moreover, the elevated BA, MCC, and G-mean suggest that the rule remains robust even under imbalanced data conditions.
Subsequent refinement of the SIEM rule, shown in Eq. (11) and informed by SHAP values, yields further improvements, notably in terms of DDoS Precision and BENIGN Recall, as well as F1-score for both classes. This rule also achieves higher overall Accuracy, BA, MCC, and G-mean. The third rule, derived through ANCHORS and presented in Eq. (12), exhibits near-optimal performance across all metrics, thereby surpassing the preceding two.
By contrast, the strongest of the initial SIEM rules (Eq. (6)) maintains a high Precision for the DDoS class but suffers from a considerably reduced Recall for that class. Consequently, although the rule precisely identifies DDoS when triggered, it misclassifies a non-negligible number of malicious instances as benign, leading to a diminished F1-score and lower Accuracy. Despite achieving the best BA, MCC, and G-mean among the original SIEM rules, it still performs markedly below the xAI-derived rules in these measures.
The initial SIEM rules and the RF rules extracted via xAI, used for the definition of the SIEM rules shown in Eqs. (10) and (11), present both similarities and differences. The main similarity is the core logic: conditions are set to determine the final decision, following a binary classification. On the other hand, the RF rules have a more complex structure with multiple conditions and branches, whereas the SIEM rules are simpler and typically involve a single feature comparison for each rule. In the RF rules, conditions are often based on specific feature values, while the SIEM rules use wider and more generic threshold values to make decisions. The SIEM rules have more human-readable conditions, making it easier for someone to understand the logic behind the rules. Another key difference is that the RF rules prioritize the detection of benign traffic, classifying as anomalous all the samples that do not follow the pattern considered innocuous. On the other hand, the traditional SIEM rules set conditions to detect malicious traffic, labelling as benign every sample that does not follow the pattern considered anomalous. Additionally, unlike certain SIEM rules, specifically, Eq. (6), in RF rules features are never compared between each other. Another remarkable difference is that the SIEM rules consider a small subset of features among the most relevant ones, while the RF rules have a wider variety of relevant features taken into consideration. The SIEM rules derived from xAI look to find the common ground between the two sets, by implementing a more complex and accurate correlation logic, while still maintaining human readability and enabling practical implementation in common rule-based SIEM systems. As shown previously, this approach holds the potential to improve traditional SIEM rules’ reliability in detecting network anomalies.
The results using the
7 Threats to Validity and Possible Future Works
While the current study effectively demonstrates the application of xAI-enhanced SIEM systems specifically for DDoS attacks, it acknowledges certain limitations regarding the scope of dataset diversity and validation under dynamic network conditions. Furthermore, the primary focus has been to explore the novel integration of xAI within the context of NIDS, emphasizing the utility of xAI-derived rules not for their intrinsic explainability to end-users but for their capability to distill complex ML insights into actionable, reliable rules within SIEM systems. The goal is to enhance detection capabilities and operational efficiency, even if the security analysts may not fully comprehend the underlying complexities of the ML model. This approach recognizes that in operational environments, the practical applicability and reliability of detection rules often take precedence over the detailed understanding of their derivation, aligning with the primary needs of cybersecurity professionals. Future work will aim to address these limitations by extending the validation of our approach to more varied real-world environments and incorporating a broader spectrum of cyberthreats beyond DDoS. This will involve testing the xAI-enhanced SIEM system across multiple datasets that reflect a wider range of network conditions and attack scenarios, thereby strengthening the generalizability and robustness of our findings. Furthermore, comparative analysis with other cutting-edge methods will also be pursued to benchmark the effectiveness and efficiency of the proposed xAI application in cybersecurity.
This paper is the significant extension of our previous work presented at ACIDS conference [17]. This study investigates the integration of xAI and RFM to enhance traditional SIEM detection rules, with an emphasis on classifying network traffic. A new rule-mining methodology has been introduced, alongside a proof-of-concept implementation for detecting DDoS attacks using two distinct benchmark datasets. The evaluation compares SIEM rules generated through xAI with conventional static rules, highlighting the advantages of the proposed framework. The results indicate that the xAI-derived rules achieve notably superior performance metrics compared to traditional rules. These advanced rules integrate multiple conditions and branches, offering more detailed and refined insights. Such higher complexity allows them to capture intricate relationships between features, leading to more accurate and sophisticated detection criteria. The outcomes of this research underline the potential of xAI and RFM as effective tools in cybersecurity, particularly for anomaly detection and security monitoring. Incorporating these techniques into current practices can strengthen organizations’ abilities to identify and address network anomalies, thereby safeguarding their digital infrastructure and assets.
Acknowledgement: The authors would like to thank all supporting institutions for enabling this research. Any opinions, findings, and conclusions expressed in this article are those of the authors and do not necessarily reflect the views of the affiliated organizations.
Funding Statement: This work is funded under the Horizon Europe AI4CYBER Project, which has received funding from the European Union’s Horizon Europe Research and Innovation Programme under grant agreement No. 101070450.
Author Contributions: Conceptualization, Federica Uccello and Marek Pawlicki; methodology, Federica Uccello, Marek Pawlicki, and Salvatore DAntonio; software, Federica Uccello and Marek Pawlicki; validation, Federica Uccello and Marek Pawlicki; formal analysis, Federica Uccello and Marek Pawlicki; investigation, Federica Uccello; resources, Michał Choraś and Rafal Kozik; data curation, Federica Uccello; writing—original draft preparation, Federica Uccello; writing—review and editing, Marek Pawlicki and Michał Choraś; visualization, Federica Uccello and Marek Pawlicki; supervision, Salvatore DAntonio and Michał Choraś; project administration, Michał Choraś; funding acquisition, Michał Choraś and Marek Pawlicki. All authors reviewed the results and approved the final version of the manuscript.
Availability of Data and Materials: The datasets employed in this study (CICIDS2017 and WUSTL-IIOT-2021) are publicly available benchmark datasets. Interested researchers can obtain the data from their respective official repositories under the terms specified by the dataset publishers.
Ethics Approval: This research did not involve human participants or animal testing. Ethical review and approval were therefore waived.
Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.
References
1. Ribeiro MT, Singh S, Guestrin C. “Why should I trust you?” Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2016; New York, NY, USA. p. 1135–44. [Google Scholar]
2. Doshi-Velez F, Kim B. Towards a rigorous science of interpretable machine learning. arXiv:1702.08608. 2017. [Google Scholar]
3. Molnar C, Casalicchio G, Bischl B. Interpretable machine learning-a brief history, state-of-the-art and challenges. In: Joint European conference on Machine Learning and Knowledge Discovery in Databases; 2020; Cham, Switzerland: Springer. p. 417–31. [Google Scholar]
4. Choraś M, Pawlicki M, Puchalski D, Kozik R. Machine Learning-the results are not the only thing that matters! What about security, explainability and fairness? In: Computational Science-ICCS 2020: 20th International Conference; 2020 Jun 3–5; Amsterdam, The Netherlands. p. 615–28. [Google Scholar]
5. Choraś M, Pawlicka A, Jaroszewska-Choraś D, Pawlicki M. Not only security and privacy: the evolving ethical and legal challenges of e-commerce. In: Katsikas S, Cuppens F, Cuppens-Boulahia N, Lambrinoudakis C, Garcia Alfaro J, Navarro-Arribas G et al., editors. Computer Security. ESORICS, 2023 International Workshops; 2024; Cham: Springer Nature Switzerland. p. 167–81. [Google Scholar]
6. Patil S, Varadarajan V, Mazhar SM, Sahibzada A, Ahmed N, Sinha O, et al. Explainable artificial intelligence for intrusion detection system. Electronics. 2022;11(19):3079. doi:10.3390/electronics11193079. [Google Scholar] [CrossRef]
7. Islam MU, Mozaharul Mottalib M, Hassan M, Alam ZI, Zobaed S, Fazle Rabby M. The past, present, and prospective future of XAI: a comprehensive review. In: Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence; 2022; Cham, Switzerland: Springer. p. 1–29. [Google Scholar]
8. Mendes C, Rios TN. Explainable artificial intelligence and cybersecurity: a systematic literature review. arXiv:230301259. 2023. [Google Scholar]
9. Nwakanma CI, Ahakonye LAC, Njoku JN, Odirichukwu JC, Okolie SA, Uzondu C, et al. Explainable artificial intelligence (XAI) for intrusion detection and mitigation in intelligent connected vehicles: a review. Appl Sci. 2023;13(3):1252. doi:10.3390/app13031252. [Google Scholar] [CrossRef]
10. González-Granadillo G, González-Zarzosa S, Diaz R. Security information and event management (SIEMAnalysis, trends, and usage in critical infrastructures. Sensors. 2021;21(14):4759. doi:10.3390/s21144759. [Google Scholar] [PubMed] [CrossRef]
11. Vielberth M. Security Information and Event Management (SIEM). In: Jajodia S, Samarati P, Yung M, editors. Security Information and Event Management (SIEM); 2021; Berlin/Heidelberg: Springer Berlin Heidelberg. p. 1–3. doi:10.1007/978-3-642-27739-9_1681-1. [Google Scholar] [CrossRef]
12. Zhang Y. Design and implementation of network security management system based on k-means algorithm. In: 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA). Chongqing, China; 2023. 1010–5. [Google Scholar]
13. Podzins O, Romanovs A. Why SIEM is irreplaceable in a secure IT environment? In: 2019 Open Conference of Electrical, Electronic and Information Sciences (eStream); 2019; Vilnius, Lithuania. p. 1–5. doi:10.1109/eStream.2019.8732173. [Google Scholar] [CrossRef]
14. Jacobs AS, Beltiukov R, Willinger W, Ferreira RA, Gupta A, Granville LZ. Ai/ml for network security: the emperor has no clothes. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security; 2022; New York, NY, USA. p. 1537–51. [Google Scholar]
15. Sun N, Ding M, Jiang J, Xu W, Mo X, Tai Y, et al. Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives. IEEE Commun Surv Tutorials. 2023;25(3):1748–74. doi:10.1109/COMST.2023.3273282. [Google Scholar] [CrossRef]
16. Lu Y, Liu T, Zheng H, Zhu X. Research on constructing a network security event knowledge network based on multi-source data. In: 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC); 2024; New York, NY, USA. p. 749–59. [Google Scholar]
17. Uccello F, Pawlicki M, D'Antonio S, Kozik R, Choraś M. A novel approach to the use of explainability to mine network intrusion detection rules. In: Nguyen NT, Chbeir R, Manolopoulos Y, Fujita H, Hong TP, Nguyen LM et al., editors. Intelligent Information and Database Systems; 2024; Singapore: Springer Nature Singapore. p. 70–81. [Google Scholar]
18. Mahbooba B, Timilsina M, Sahal R, Serrano M. Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity. 2021;11:6634811. doi:10.1155/2021/6634811. [Google Scholar] [CrossRef]
19. Karna SK, Paudel P, Saud R, Bhandari M. Explainable prediction of features contributing to intrusion detection using ML algorithms and LIME. Medicon Eng Themes. 2023;5(3):6–15. [Google Scholar]
20. Kalutharage CS, Liu X, Chrysoulas C, Pitropakis N, Papadopoulos P. Explainable AI-based DDOS attack identification method for IoT networks. Computers. 2023;12(2):32. doi:10.3390/computers12020032. [Google Scholar] [CrossRef]
21. Zhou Q, Li R, Xu L, Nallanathan A, Yang J, Fu A. Towards explainable meta-learning for DDoS detection. arXiv:2204.02255. 2022. [Google Scholar]
22. Das A, Rad P. Opportunities and challenges in explainable artificial intelligence (XAIa survey. arXiv:2006.11371. 2020. [Google Scholar]
23. Breiman L. Random forests. Mach Learn. 2001;45(1):5–32. doi:10.1023/A:1010933404324. [Google Scholar] [CrossRef]
24. Ho TK. Random decision forests. In: Proceedings of 3rd International Conference on Document Analysis and Recognition; 1995; IEEE. Vol. 1, p. 278–82. doi:10.1109/ICDAR.1995.598994. [Google Scholar] [CrossRef]
25. Mihailescu ME, Mihai D, Carabas M, Komisarek M, Pawlicki M, Hołubowicz W, et al. The proposition and evaluation of the roedunet-SIMARGL2021 network intrusion detection dataset. Sensors. 2021;21(13):4319. doi:10.3390/s21134319. [Google Scholar] [PubMed] [CrossRef]
26. Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy ICISSP. Funchal, Madeira, Portugal; 2018. Vol. 1, p. 108–16. [Google Scholar]
27. Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R. WUSTL-IIOT-2021 dataset for IIoT cybersecurity research [Internet]. MO, USA: St. Louis; [cited 2025 Mar 4]. Available from: http://www.cse.wustl.edu/∼jain/iiot2/index.html. [Google Scholar]
28. Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP. SMOTE: synthetic minority over-sampling technique. J Artif Intell Res. 2002;16:321–57. doi:10.1613/jair.953. [Google Scholar] [CrossRef]
29. Lundberg SM, Lee SI. A unified approach to interpreting model predictions. In: Advances in Neural Information Processing Systems; 2017; Redwood City, CA, USA. p. 30. [Google Scholar]
30. Ribeiro MT, Singh S, Guestrin C. Anchors: high-precision model-agnostic explanations. In: Proceedings of the AAAI Conference on Artificial Intelligence; 2018; Menlo Park, CA, USA. Vol. 32. [Google Scholar]
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools