Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection

Abstract

Recent years have witnessed an in-depth proliferation of the Internet of Things (IoT) and Industrial Internet of Things (IIoT) systems linked to Industry 4.0 technology. The increasing rate of IoT device usage is associated with rising security risks resulting from malicious network flows during data exchange between the connected devices. Various security threats have shown high adverse effects on the availability, functionality, and usability of the devices among which denial of service (DoS) and distributed denial of service (DDoS), which attempt to exhaust the capacity of the IoT network (gateway), thereby causing failure in the functionality of the system have been more pronounced. Various machine learning and deep learning algorithms have been used to propose intelligent intrusion detection systems (IDS) to mitigate the challenging effects of these network threats. One concern is that although deep learning algorithms have shown good accuracy results on tabular data, not all deep learning algorithms can perform well on tabular datasets, which happen to be the most commonly available format of datasets for machine learning tasks. Again, there is also the challenge of model explainability and feature selection, which affect model performance. In this regard, we propose a model for IDS that uses attentive mechanisms to automatically select salient features from a dataset to train the IDS model and provide explainable results, the TabNet-IDS. We implement the proposed model using the TabNet algorithm based on PyTorch which is a deep-learning framework. The results obtained show that the TabNet architecture can be used on tabular datasets for IoT security to achieve good results comparable to those of neural networks, reaching an accuracy of 97% on CIC-IDS2017, 95% on CSE-CICIDS2018 and 98% on CIC-DDoS2019 datasets.

Introduction

The IoT network is a large network space that lets a lot of devices around the world connect to each other to disseminate information [1]. This reduces the amount of work that people have to do and makes the digital world easier to access, more productive, and easier to control. Because the IoT ecosystem is made up of many different types of devices, it is very vulnerable to cyberattacks that take advantage of the system’s weaknesses to stop it from working [2, 3]. Cyber threats are getting more complex and dangerous, and the IoT infrastructure is proliferating [4, 5]. This makes it very important to improve security in smart IoT networks. The authors of [6] identified and classified the security risks associated with any IoT system into four categories: risks relating to physical impacts on network devices; risks relating to the device and user authentication and validation; security concerns relating to violations of rules and the confidentiality, integrity, and availability (CIA) of information systems; and the risks associated with the processing, transfer, and storage of personal data or other sensitive information. Personal data and additional sensitive information, such as biometrics and medical records, must be sent securely across IoT networks. According to the European Union’s General Data Protection Regulation (GDPR) [7], other data that has been designated as personal data include unique device identifiers, IP addresses, unique identifiers of mobile providers, and wireless access points.

Several attack vectors are currently being investigated in the IoT environment, including but not limited to denial of service (DoS), distributed denial of service (DDoS), web attacks, infiltration, address resolution protocol (ARP) poisoning, and portscans, which can either occur at the perception, transport, or application layers of the network [8]. Due to the high negative impact of any successful attack on the enterprise network and organizational relevance, companies now rely on intelligent IDS models to automatically detect any intrusive attempts on their networks to reduce massive losses; hence, leading to more intensive research in the area of IDS for computer networks [9].

The effects of these attacks have recently resulted in massive data losses, especially those caused by the DDoS [8] which has newly generated severe damages to IoT systems [10]. DDoS attacks in their various forms can bring down an entire network by using up all of its resources by sending too many get requests that are more than the target system can handle. These attacks work mainly by taking advantage of multiple operating systems to break into them and use them as agents to send a lot of traffic to the target client. Other attacks have also shown high levels of negative impacts on computer networks and other computing devices [11]. IoT devices, fog devices, workstations, and more are some of the many vulnerable systems that can be compromised or exploited [10, 12].

In response to the threat that these attack vectors pose, many methods have been looked into to make sure that the IoT network is safe from all kinds of cyber threats. Approaches like machine learning (ML), deep learning (DL), intrusion detection systems (IDS), and intrusion prevention systems (IPS) that are based on artificial intelligence (AI) are some of the most searched-for topics in this field [1315]. At the instance of detection of malicious network flows, IDS can take immediate action to deter the attack from spreading to the entire IoT network [16]. IDS are generally divided into two categories based on the detection mechanism used in their design: anomaly and misuse detection [11]. During the analysis of how network profile activities change over time, flows that could be harmful to the network can be found to be acting in strange ways. Even though they have a lot of false positives (FPs), anomaly detection IDS can find new and different types of attacks. On the contrary, misuse detection is able to distinguish between legitimate and dangerous attacks using previously established patterns; hence, it can accurately identify known attacks but has limitations with new and unknown attacks [11].

With the advent, availability and easy access to large-scale data, highly-performing hardware accelerators, state-of-the-art machine learning, and deep neural networks (DNNs), predictive modeling for problem-solving can now be performed at a large scale, especially in the IoT ecosystem, where large volumes of data are generated and transmitted along a resource-constrained channel [17]. The majority of the datasets used in IDS modeling tasks such as the NSL-KDD, KDD Cup’99, and UNSW-15 contain high dimensionality, which means they have a large number of features. This makes it harder to process these datasets. In order to solve the problem relating to data dimensionality, the most common approach has been the use of singular value decomposition-enabled methods such as principal component analysis (PCA) [18] and isometric feature mapping (Isomap) [19]. The main problems with using PCA and Isomap to reduce the number of features in a dataset are linear embedding and essential feature loss, even though they produce good results and keep the distances between data points to a moderate degree. Hence, they are not most suitable for dealing with the problems of the curse of dimensionality [19]. In [20, 21], the authors presented different methods of reducing the dimensionality and features of the CIC-IDS2017 dataset in an attempt to reduce the computational cost and improve the speed of model performance.

Furthermore, there is the challenge of explaining the relationship between the various features interacting in the dataset to produce the results from the model. In the cybersecurity atmosphere involving network intrusion detection and prevention, where the predictions of the model are of grave importance to the network administrator and the safety of connected devices, it is imperative that AI models be able to automatically provide explanations for their decisions. This is imperative because any misrepresentation or misinterpretation of the model’s performance can cause a devastating loss of the network, data, and other relevant information. Since it is important that ML model predictions continue to be as transparent and dependable as possible in an interpretable way, many model-specific and model-agnostic techniques, including both local and global interpretability, have been applied recently [22]. While the local explanations emphasize individual predictions, the global explanations provide detailed insights about the entire model’s behavior in the form of plots or more interpretable approximations such as decision boxes. Some of the commonly used methods to achieve model explainability include Permutation Feature Importance (PFI) [23], SHapley Additive exPlanation (SHAP) [24], Contextual Importance and Utility (CIU) [25, 26], and Local Interpretable Model-Agnostic Explanation (LIME) [27]. The explanations provided by these methods show high reliability in validating the performance of the model, which can be measured in terms of the accuracy, consistency, and stability of the unseen data [28].

Thus, there is a need for a tabular data-centric algorithm that provides both automatic feature selection and explainable results on the choice of the features used in the model development and the predictions of the model applied to IoT security. Considering the limitations of the existing deep learning-based model to provide interpretability to the model decision without third-party frameworks and large resource requirements, this research specifically addresses these issues categorically. Therefore, we propose an attentive transformer deep learning algorithm for IDS that implements automatic feature engineering and selection for detecting threats in an IoT ecosystem. We develop the IDS model using the TabNet [29] architecture. Different metrics, like accuracy, precision, recall, prediction time, and Matthew’s correlation coefficient, are used to judge how well the model works. We look at how well the model can be explained using the masking feature, which gives us the decision output. Specifically, the major contribution of the paper includes:

  • The proposed IDS model introduces a unique approach to feature engineering and selection by incorporating an attention mechanism. This address the challenge of handling a large number of features, which can result in decreased model performance as a result of noisy and irrelevant features. The attention mechanism permits the model to learn and select which features most importantly contribute to the model overall behavior; leading to a more efficient and accurate IDS model to detect and prevent security breaches.
  • Provides a solution to the challenge of interpretability of deep learning-based models that mostly depend on third-party frameworks to explain the behaviors of the model with respect to feature usage for predictions. By incorporating the ability of TabNet architecture to use a sparse feature selection process and learn interpretable decision rules, we provide an approach to automatic feature explanations which helps users understand the reasoning behind the predictions. Additionally, the explanations are used to improve the model by identifying the features that may require more attention in applications where the TabNet architecture is not implemented.
  • Considering the resource constraints of the IoT system, the model is optimized using a lightweight optimization algorithm, the OPTUNA that is computationally efficient to determine the properties of the TabNet architecture most suitable for the IDS model. This ensures that the resulting model is suitable to be executed in resource-constrained environments and also for real-time applications for fast response.
  • The model offers a balance between computational efficiency and accuracy, meeting the energy requirement of IoT devices. Adding to the lightweight and energy-efficient attributes of our proposed model, it requires less training and test time, making it ideal for real-time applications, as it can process data quickly and accurately, providing fast and reliable predictions.

In general, our proposed IDS model aims to prefer a solution to the limitations of existing deep learning-based models by providing a more inclusive and interpretable solution. The growth rate of IoT devices makes it critical to develop IDS models that not only show high accuracy but also provide insight into its decision rule through interpretability and explanations. This is believed to be of immense assistance to network analysts in analyzing zero-day attacks. Our proposed model emphasizes interpretability, which is critical for gaining trust and understanding the decision rule applied by the IDS model to network flows. By using modern optimization algorithms, we ensure that our proposed model provides competitive results in accuracy while requiring fewer resources for implementation, making it a generalized solution for network security in IoT environments.

Related works

Advances in communication technology, as well as the availability of various sensing and computational devices, have resulted in rapid growth in the field of IoT devices and their application areas. Because of the widespread use of smart devices across various domains, IoT security has become a source of major concern in terms of protecting users’ confidentiality and privacy, as well as the hardware and network of IoT systems. Several authors, including [3032] gave a detailed overview of the current trends in IoT security, asserting that the high rate of adoption of the technology has paved the way for more threats to continue to ravage the IoT system. Despite the fact that numerous research projects are underway with the primary goal of improving the level of security of smart devices, the domain remains largely unexplored. When using some of the most widely available security tools, such as encryption, authentication, access control, network protection, and application control, time wastage is usually encountered coupled with the inefficiency of the tools to provide a comprehensive check against the inherent vulnerabilities.

It is possible for hackers to break into open networks that provide access to certain intelligent utility services (such as smart grid systems, communications systems, and healthcare systems), posing serious hazards of information leakage, service disruption, and financial losses [1]. Such attacks that take down the availability of networks and devices and which have been reported amidst other forms of threats to be most harmful to the networks are the DDoS attacks. For instance, Mirai is an uncommon sort of botnet that triggers huge-scale distributed denial-of-service (DDoS) strikes by abusing IoT machines [33] such that they become unable to respond to user requests, thereby becoming exhausted and eventually shut down. The Persirai thingbot is one variant of Mirai code that continues to grow and infect Internet Protocol (IP) cameras [34].

In [35], authors propose an IDS model in IoT networks using deep learning algorithms specifically designed to detect DoS attacks in two main domains: passive and active threats using different algorithms, including CNN and MLP. The BoT-IoT dataset was used as a testbed to develop and evaluate the model’s performance, using accuracy, recall, and precision measurement as the performance evaluation metrics, with the CNN reaching an average accuracy of 91.27% and MLP achieving 79.01%. With the high accuracy, there remained an issue with understanding the basic features of the dataset that prevailed over the model’s decision. Hence, many ML and DL models remain in the black box domain where there is no thorough explanation of the decision of the model. The interpretations provided by some frameworks about the model decision can be identified as either local or global interpretations. A local interpretation provides insight into the model’s prediction based on each feature of the dataset. On the other hand, when the interpretation is made globally, the explanations result from the entire set of features in the dataset [36]. LIME is well known for its ability to provide local interpretability while SHAP is widely used for global interpretations.

In [37], Ensemble modeling was used to classify network intrusions. The research used the “Network Socket Layer—Knowledge Discovery in Databases” records (NSL-KDD). The authors converted the network flows into a malicious and non-malicious network packet to perform a binary classification task. The research used an ensemble model termed extreme gradient boosting (XGBoost) to identify records based on NSL-KDD input attributes. The XGBoost-based classification model was trained on 125973 and tested on 22544 records with 98.7% accuracy. Leveraging the data from the UNSW-NB15 dataset obtained from a publicly available data repository, authors in [38] performed a machine learning intrusion detection performance analysis and compared different machine learning techniques for detecting network intrusions, including SVM, Naïve Bayes, Decision Tree, and Random Forest. Based on their analysis of the UNSW-NB15 dataset, the authors opined that the SVM, Naïve Bayes, Decision Tree, and Random Forest achieved a detection accuracy of 92.28%, 74.19%, 95.82%, 97.49%, respectively. These results are black-boxed as it does not provide an insight into the different network flows or packets that defined the model’s prediction results.

Because of how complicated the IoT ecosystem is and how much data it generates, each piece of data has a huge impact on how the network flows. This has made it more important to understand how each piece of data helps predict whether the network profile is normal or not. Model explainability is an approach to solving this challenge. In [22], Deep learning algorithms for detecting network intrusion in IoT devices were proposed. Authors leveraged the explainable characteristics of some explainable AI (XAI) frameworks, such as LIME and SHAP to provide explanations for the model’s decisions. The problem with this method is that it needs a lot of computing power because SHAP values are hard to compute. On the NSL-KDD dataset, the proposed models achieved a performance of 82.4% and 96.4% in accuracy and precision, respectively, in a binary classification task. The authors in [36] proposed an approach for model interpretation specifically for security systems called LEMNA. LEMNA was tested on a malware dataset using a deep learning algorithm that takes an input data sample and produces a minimal set of interpretable characteristics that can be used to explain the classification of the input data sample. The central concept is to use a straightforward, interpretable model to approximatively represent a small region of the infinitely complicated decision boundary of deep learning. To better function with security applications (such as binary code analysis), the local interpretable model is optimized to (1) manage feature dependency and (2) handle nonlinear local limits, which improves explanation fidelity.

In both supervised and unsupervised language modeling problems, the ability of attention-based mechanisms to find larger subsets of features used for modeling has been used to improve the accuracy of the predictive model. One of the attention mechanisms is the self-attention network (SAN) [39, 40] which identifies important features primarily from tabular data. Meanwhile, this technique has been found to be more efficient with datasets that have a larger amount of feature space, showing very lower performance with datasets having fewer feature dimensions, therefore, implying that a limited amount of data can impact the relevant part of the feature. TabNet-IDS [29], is proposed, which chooses meaningful features in a dataset to reason from using a sequential attention mechanism in each step of the decision process during the model’s training. It provides a visualization of the feature’s importance and demonstrates how each feature contributes to the prediction made by the model. The mask attribute provides both local and global interpretability [41]. The summary of the related literature including the strength and weaknesses are shown in Table 1. Except for our proposed model, none of the works in the literature utilized optimization techniques to reduce the complexity of the model and improve performance.

thumbnail
Table 1. Summary of related literature and their features.

https://doi.org/10.1371/journal.pone.0286652.t001

Methodology

This section discusses the datasets, and preprocessing approaches, the proposed algorithmic architecture, and the optimization techniques adopted to obtain suitable data for modeling for model development. The overall workflow used for this design is as shown in Fig 1.

thumbnail
Fig 1. Flowchart for the design of the proposed TabNet-IDS model in this research.

https://doi.org/10.1371/journal.pone.0286652.g001

Dataset description

Three different IDS datasets, including CIC-IDS2017, CSE-CIC-IDS2018, and CIC-DDoS2019 are used to evaluate the performance of the proposed model. These datasets are general-purpose and relevant for developing predictive models for IDS in all computer networking scenarios. Considering the versed number of datasets available for training ML models, we have selected these three datasets considering that they are more recent and contain a larger number of network flows and attack profiles; hence provide an enabling ground for the model to learn from a vast feature set and data instances.

CIC-IDS2017.

The CIC-IDS2017 is a general-purpose dataset that is widely used in the cybersecurity domain for modeling predictive IDS for IoT and computer networks. It is widely used among researchers because it was the first realistic yet comprehensive dataset proposed [46]. The dataset contains 83 features and 15 classes, collected using different machines over a period of seven days. A summary of the instances of the dataset and different classes with the percentage contribution is shown in Table 2. Just like other datasets, CIC-IDS2017 suffers from data imbalance, with a total of 83% of the entire network traffic belonging to normal traffic and only 17% being attacks. On analysis, we discovered that CIC-IDS2017 has 288602 instances with missing class labels and 2013 instances with missing information. These unwanted instances are dropped to form a new dataset that contains unique 2830540 instances. for the purpose of our experiment, a sample of the dataset is used after handling the imbalance as described in [11].

thumbnail
Table 2. Distribution of stream records in CICIDS2017 dataset.

https://doi.org/10.1371/journal.pone.0286652.t002

CSE-CIC-IDS2018.

This is a general-purpose dataset constructed using different synthetic communication networks and captured about 2.8 million labeled data (malicious flows) with 80 features, thereby increasing the complexity of the dataset significantly compared to those before it. In total, the dataset contains over 16 million network flows collected over 10 days from different devices and stored as a PCAP file. Because this dataset contains more network profiles, it tends to give more realistic flow behavior, and thus, IDS trained with this dataset tends to learn more on the available feature instances. The dataset contains 16 different classes and 80 features, with the highest number of instances representing the benign class, which mimics normal network communication over the IoT network. The remaining 15 classes represent different attack types to the tune of 18% of the entire dataset, hence showing a high rate of imbalance [11] as shown in Table 3.

thumbnail
Table 3. Distribution of stream records in CSE-CIC-IDS2018 dataset.

https://doi.org/10.1371/journal.pone.0286652.t003

CICDDoS2019.

The CICDDoS2019 dataset is the most recent dataset that describes different DDoS attack profiles that are applicable to both IoT systems and computer networks. The dataset was collected from a public repository at the University of New Brunswick, Canada [8]. Various experiments involving classical ML algorithms and DL methods have already been performed using this dataset, but none specifically considers the problem of using a DL classifier specific to tabular datasets to analyze the dataset. Also, the problem of feature engineering has always been handled manually in previous works, unlike ours, which uses an attention mechanism to automatically select the salient features to reason from during the training and testing phases. Overall, the dataset contains about 50,063,112 records, comprising 56,863 benign traffic profiles and 50,006,249 malicious network flows during the training phase. In the testing phase, a total of 20,364,525 records were obtained, with benign flows of 56,965 and 20,307,560 malicious traffic records. The entire dataset contains 88 unique features extracted from the packet capture (Pcap) files using the CICFlowMeter [47], a network flow generator and analyzer. The first eight features of the dataset, including the source IP, destination IP, source port, destination port, flow ID, timestamp, and protocol, are the default parameters of the CICFlowMeterV3, while the remaining eighty features define the behavior of each of the flows. As noted in the work of [8] who originally generated the dataset, the training dataset contains DDoS attack vectors including, NTP, DNS, LDAP, MSSQL, NetBIOS, SNMP, SSDP, UDP, UDP-Lag, WebDDoS, SYN, and TFTP. Meanwhile, the testing dataset contains only seven (7) DDoS attack types, with the inclusion of a new attack profile that is absent from the training set. The attack vectors are PortScan, NetBIOS, LDAP, MSSQL, UDP, UDP-Lag, and SYN.

For a better understanding of the different attack profiles, they are grouped into two sets, including the reflection-based and exploitation-based attacks. In reflection-based attacks, the attackers use third-party products or components that they legitimately purchased to conceal their identities. The application layer protocol is often used to send both malicious and normal network packets to reflector servers [8]. The attackers set the source IP address of the attacking agent to be the same as the IP address of the victim or target system. This makes it look like the attacker is a real user. This attempt overwhelms the victim’s device and sends a lot of responses until the victim’s device can’t handle it anymore. This is further sub-grouped into TCP-based attacks, UDP-based attacks, and TCP/UDP-based attacks. The TCP-based attacks, like the MSSQL and SSDP profiles, can only be carried out with the TCP protocol. Attacks that use the UDP protocol are called UDP-based attacks, and they include the CharGen, NTP, and TFTP attack vectors. Also, some DDoS attacks can be carried out using either the TCP or the UDP protocols. These are DNS, LDAP, NetBIOS, and SNMP vectors.

Even more, the same method of hiding identity is used in exploitation-based DDoS attacks. However, the major difference lies in the primary focus of the attack points. In this kind of DDoS attack, the attackers try to take advantage of certain protocols, such as the network, application, and transport layers of the Open Systems Interconnection (OSI) model. Cyberattackers send packets to the servers bearing the source IP addresses configured to the victim’s IP address to overburden the victim with response packets. This DDoS attack type is also grouped into the TCP-based attacks that comprise SYN Flood and the UDP-based attacks that include UDP Flood and UDP-Lag. Due to the large volume of the dataset, we used 10% for our research as shown in Fig 2.

thumbnail
Fig 2. Distribution of the 10% of the CIC-DDoS2019 use for the training and testing of the model.

https://doi.org/10.1371/journal.pone.0286652.g002

Data preparation

In most cases, network flows arrive in a very jumbled condition that has to be cleaned up before they can be used. It is still the most important step in machine learning since the quality of the dataset affects how well the model works. In the proposed architecture, the TabNet-IDS, the major data preparation process is automatically handled within the internal mechanism of the algorithm. Therefore, only basic data cleaning, like getting rid of duplicates, deleting and filling in missing values, and encoding categorical characteristics have been handled in this phase. The training of the model can be improved leading to an easy learning process if the labels are encoded into their numerical equivalent. By scaling the data, we were able to collect data points that are very close to one another, which helped remove any bias from the final forecast. In addition to this, it helps keep the data’s integrity intact over time. Another important part of the process of cleaning up the data is figuring out how to deal with the problem of imbalance which is commonly observed in any real-world dataset. Several different methods, like the Synthetic Oversampling Technique (SMOTE) and its variants including, the Adaptive Synthetic (ADASYN) algorithm, SMOTEN, SMOTEN, etc. have been suggested as possible solutions to this problem. However, we take care of problems caused by imbalance automatically within the proposed TabNet-IDS model using the built-in augmentation fit function argument called classificationSMOTE. By setting this argument to true, the model automatically takes care of any issues caused by an imbalance within the training data, ensuring that it is balanced between different classes.

Overview of proposed model and implementation

Sequential attention model.

Tabular data is one of the most readily available types of datasets used for ML tasks. They are arranged in rows and columns and are most often saved as a comma-separated value (CSV) file. DNN models have shown good results on image, audio, and text data utilizing canonical architectures that permit the encoding and communication of the data in different formats [1]. Despite the fact that tabular data contains multiple data types that can easily function well with the canonical architecture, tabular-data-specific deep learning models have yet to be proposed for IDS.

Basically, IDS models developed with tree-based algorithms such as decision trees, random forests, XGBoost, LightGBM, Extra Tree classifiers, and deep learning models, including Deep Neural Networks (DNN), Recurrent Neural Networks (RNN), Convolutional Neural Networks (CNN), [11] etc require that the input tabular data be first feature engineered before it is fed into the algorithm for training. With TabNet, which provides a sequential attention mechanism in the model, the following benefits are inherent [29]: (i) automated preprocessing of the raw dataset, which is then trained using gradient descent-based optimization, thereby, allowing a more flexible data integration. (ii) A sequential attention-enabled feature selection technique carried out in a step-wise and instant-wise fashion. The instant-wise feature selection helps to reduce model complexity train time in comparison with other tree-based classifiers and this is achieved by using a single deep learning architecture, and (iii) a mechanism that encourages the design of lightweight models for IoT systems.

The proposed IDS is implemented with the TabNet architecture, which is an algorithm specifically developed to train models on tabular data. Normally, individual feature selection is done by ML engineers when handling problems associated with DTs and DNNs algorithms. This is important for getting decision boundaries in the hyperplane, which can be thought of as a generalized linear combination of features with coefficients that say how much of each feature to use. TabNet uses this kind of functionality paradigm and also takes care of the problems of selecting features, processing features, and understanding them. Basically, the TabNet architecture exists in four different segments: the encoder, decoder, feature transformer, and attentive transformer modules, as shown in Figs 3 and 4.

thumbnail
Fig 3. The TabNet encoder is made up of three parts: A feature transformer, an attentive transformer, and feature masking.

The information to be used by the attentive transformer and the next feature transformer is separated with a split block. For each phase, the feature selection mask gives interpretable information regarding the model’s functionality, and the masks can be combined to get global feature significance attributes.

https://doi.org/10.1371/journal.pone.0286652.g003

As inputs, we give the architecture raw numerical features that have been slightly cleaned up and embeddings that can be trained for the mapped categorical features. The global feature normalization is not implemented, but we use batch normalization (BN). We implemented batch normalization as it generally improves the performance of deep learning models by normalizing the input layers and adjusting the activation of preceding layers prior to exchanging the information to subsequent layers. Specifically, in our study, batch normalization is used in each of the decision steps to improve the quality of the sparse feature selection process. On the output of the feature transformer, we also used batch normalization to stabilize the distribution of the transformed features, thereby reducing the impact of the initialization of the network data and encouraging the network to learn better representations of the input data. During the training phase, batch normalization computes the mean and variance of the activation for each of the mini-batch of the data and then normalizes the activation. This is done by subtracting the mean and dividing it by the standard deviation. This is to ensure that the mean and variance of the activation remain consistent through different batches, thereby ensuring that overfitting is reduced and improving the overall generalization of the model.

Given dimensions D and batch size B, the features can be expressed as f ∈ ℜB×D. We pass these same dimensional features to each of the decision steps using TabNet encoding that is based on sequential multi-step processing with Nsteps decision steps. The ith step uses the processed network traffic from the (i − 1)th step to decide which features to use and to output the processed feature representation, which is then aggregated into the overall decision. The output of Fig 3 is used as an input to the second phase shown in Fig 4 for the training process. First, the data is split into 10 folds, and in each of the training phases, 9 folds are used, while one is used for validation. The trained IDS model’s accuracy is checked, and then, depending on the score, the model is hyper-parameter tuned and a final evaluation is performed.

A learning mask given by Eq 1 is used to perform a soft selection of the most salient features of the dataset while maintaining the learning capacity of the decision step, resulting in a model that is more parameter efficient. The mask is used to obtain the local and global interpretations of the model performance. (1) where M[i] is the mask of the ith feature of the dataset considered most important at that instant in the decision block.

The masking process uses a multiplicative gating mechanism, which zeros out all the feature values that are not selected by the mask. This helps to create a sparsified feature map engineered to reduce the total number of features that are used for the final prediction and improve interpretability. The attention mechanism uses the function given in Eq 2 to compute the mask M[i]. (2) where hi is an FC and BN layer, P[i − 1] is the prior information and the sparsemax function [48] is used to give sparsity because it can map the Euclidean projection to the probabilistic simplex. Hence, it provides sparse features for explainability. The prior scale denoted as P[i] is us to track all the previous knowledge gained on each of the features during the learning process providing robustness to the model since it can not use a previously used feature. Mathematically, the expression for this function is as given in Eq 3. (3) where γ denotes a relaxation parameter that determines the flexibility of using each of the features in the various decision step of the algorithm. Where γ = 1, a selected feature is restricted to being used only at one decision step, but when the value of γ increases, a particular feature can be used over multiple decision steps. To encourage more robust feature selection, we calculate the sparse loss, which is a regulation technique that penalizes the model for selecting too many features at a given step, forcing the model to pay more attention to the most informative features. The equation for calculating the sparse loss is given by Eq 4. Essentially, the equation computes the negative logarithm of the mask entries that relate to the unselected features implying where Mb,j[i] = 0 (4) where ϵ is a small constant added to the mask entries to avoid taking the logarithm of zero. The selected features are preprocessed so that they can be used in the model training. This is achieved with the feature transformer block, which consists of a fully connected layer (FC) followed by batch normalization (BN) and a gated-linear unit (GLU). The output of the processed feature is split into two parts: one part is used for the decision step, and the other part contains information for the subsequent step, as determined by their interrelationship. This is shown in Eq 5 (5) where and [29]. We improve the model’s parameter efficiency and its ability to learn by using a shared layer to keep features from being used more than once in different decision steps and layers that depend on those steps. We improve the training of a TabNet by using large batch sizes with the BN as well as the ghost BN (a virtual batch normalization) form by using a virtual batch size Bv and momentum mB and aggregating the entire decision embedding using Eq 6 (6) where ReLU is the activation function. The implementation algorithm is shown in Algorithm 1.

Algorithm 1 TabNet Algorithm

Result: Trained TabNet model

Initialize input features ;

 Initialize target labels ;

 Initialize hyperparameters h;

 Initialize empty list of decision steps L = [ ];

 Initialize empty list of feature masks M = [ ];

for t = 1, 2, …, T do

  Feature masking

  Mt ← createMask(X, h);

  M.append(Mt);

  Feature transformation

  XtXMt

  At, Et ← encode(Xt, h)

  Decision step

  dt ← decision(At)

  L.append(dt)

  Update feature importance

  XXEt

  yt ← predict(At)

  X ← updateFeatures(X, yt, h)

end

Train final layer on AT;

return Trained TabNet model

In this algorithm, n represents the number of data instances and d represents the number of input features. h represents the hyperparameters of the model, including the number of decision steps T. createMask() is a function that creates a feature mask matrix for each decision step, which is applied element-wise to the input features to obtain masked features Xt. encode() is a function that applies the encoder layers to the masked features to obtain feature attention masks At and transformed features Et. decision() is a function that computes the decision for each decision step based on the feature attention masks At. updateFeatures() is a function that updates the importance of each feature based on its contribution to the predictions. Finally, the trained model is obtained by training a final layer on the last feature attention mask AT.

Hyperparameter tuning with optuna

One of the most important parts of the TabNet algorithm is that it can explain why certain features were chosen at each step. We implement the design using the PyTorch framework with the Pytorch_tabnet module. PyTorch TabNet has a plethora of arguments that aid performance definition. In Table 4, we present the parameters of the algorithm and their default values. We use a search algorithm called Optuna to perform hyperparameter tuning. Optuna helps us recursively search a given space to find the best parameters that give the most reliable performance. Optuna [49] is an optimization algorithm that: (i) offers dynamic construction of the search space, hence, a define-by-run programming interface; (ii) is applicable to both lightweight and heavy-weight computational tasks due to its easy-to-setup architecture and low computational cost; and (iii) permits reduced time complexity with the use of pruning and efficient sampling paradigm [49]. The internal architecture of the optuna API is shown in Fig 5 adapted from [49].

thumbnail
Fig 5. Optuna’s general system design.

In the search study, each worker is responsible for executing one instance of the objective function. The objective function uses Optuna APIs to run its trial. The objective function accesses the shared storage to obtain information about past studies when necessary. Each worker operates independently, running the objective function and sharing the progress of the current study through the shared storage.

https://doi.org/10.1371/journal.pone.0286652.g005

thumbnail
Table 4. Description of TabNet hyper-parameters and optimized space.

https://doi.org/10.1371/journal.pone.0286652.t004

We used three different steps to implement the optimization algorithm. First, we set the parameters for the search. Then, we started the objective function that would be used during the optimization. Finally, we called the study function, which does the search and records the observations made. We use different graph networks to show the search history, which helps us understand how well the search algorithm works. The parameter importance obtained during the optimization process is shown in Fig 6. The Patience Scheduler which is an instance of the schedulerfn and defines the patience level for each of the optimization trails tends to be the most influencing parameter for the optimization process. This, however, is dependent on the dataset used. The number of steps, patience level, and epochs as well are contributing features that enhance the model accuracy. The general algorithm for implementing the tuning is shown in Algorithm 2.

thumbnail
Fig 6. Hyperparameter importance of the model parameters obtained during the optimization process using optuna.

nda is used to represent the values for nd and na since nd = na is ideal for better performance.

https://doi.org/10.1371/journal.pone.0286652.g006

Algorithm 2 Optuna for TabNet-IDS Tuning

Input: Train and validation data, number of trials n, range of hyperparameters to be tuned

Output: Optimal hyperparameters

objective_function(trial)

Define the objective function to optimize

Input: Hyperparameters hp sampled from trial

Output: Validation accuracy of the model

model ← TabNetModel(…, **hp)

model.compile(loss=”, optimizer=‘adam’, metrics=[‘accuracy’])

model.fit((train data), epochs = hp[‘epochs’], batch_size = hp[‘batch_size’])

val_loss, val_accmodel.evaluate(val_data, val_labels)

return val_acc

Initialize the Optuna study

study ← optuna.create_study(direction=‘maximize’) Run the trials

for i ← 1 to n do

trial ← study.ask() hp ← […]

for param ← trial.params do

  hp[param] ← trial.params[param]

val_acc ← objective_function(trial)study.tell(trial, val_acc)

Print the best hyperparameters found by Optuna best_params ← study.best_params

print(‘Best Hyperparameters:’, best_params)

In this algorithm, the function objective_function defines the objective to optimize, which is the validation accuracy of the TabNet model. The hyperparameters to be tuned are defined by the hp dictionary, which is passed as arguments to the TabNetModel function. The hyperparameters to be tuned can be specified in the range of hyperparameters to be tuned input of the algorithm as the search space S. The optuna.create_study function initializes the Optuna study and the study.ask() function samples a set of hyperparameters for each trial. The study.tell function updates the Optuna study with the validation accuracy of the model for each trial and the study.best_params function returns the best hyperparameters found by Optuna.

Results and discussion

The proposed architecture was implemented on three different datasets, including the CIC-IDS2017, CSE-CICIDS2018, and CIC-DDoS2019. A cross-validation of 10 folds was used for each training process, and the accuracy, precision, recall, f score, and Matthew’s correlation coefficient (MCC) are measured for each model and in each fold. With a batch size of 1024, Adam was used as an optimization function to train the models. We used a Ghost Batch Normalization (GBN) of 128 that served as a virtual_batch_size for mini-batching the training samples, which enhanced the training time for the algorithm. The results obtained for the three datasets are shown in Table 5, indicating the accuracy, precision, recall, f1-measure, MCC, and test time in both the training and testing phases.

thumbnail
Table 5. Performance of the TabNet model on the selected datasets according to the number of folds.

https://doi.org/10.1371/journal.pone.0286652.t005

According to Table 5, the proposed TabNet-IDS model was evaluated using the three data sets which achieved different performance levels considering the evaluation metrics across the selected datasets. On the CIC-IDS2017 dataset, the proposed model achieved an average accuracy of 97.03% with a standard deviation of 0.36% (97.03%±0.36%), an average recall of 91.10% with a standard deviation of 0.33% (97.10%±0.33%), an average precision of 97.02% along with 0.35% standard deviation (97.02%±0.35%), F1-measure of 96.97% with standard deviation of 0.37% (96.97%±0.37%), and MCC score of 96.97% and standard deviation of 0.37% (96.97%±0.37%) The model’s testing time on this dataset is 3.86secs. Similarly, on the CSE-CIC-2018 dataset, the model shows an average accuracy, recall, precision, F-measure, MCC score of 95.58%±0.13%, 95.69%±0.11%, 95.59%±0.13%, 95.55%±0.12%, 95.55%±0.12% respectively. In each of the metrics, the corresponding standard deviation is 0.13%, 0.11%, 0.13%, 0.12% and 0.12% accordingly. The average test time of the model on this dataset is 2.04Secs. In the same way, on the CIC-DDos2019 dataset, similar performances are obtained for the accuracy, recall, precision, F-measure, and MCC score reaching 98.51%±0.12%, 98.50%±0.14%, 98.40%±0.21%, 98.44%±0.32%, 97.52%±0.33% respectively. The average test time on this dataset is 1.16 secs. The general model evaluation performance is shown in Fig 7. Consequently, the results indicate that the proposed model performs well on all three datasets, with the highest performance achieved on the CIC-IDS2019 dataset. The testing times for all three datasets were reasonable, indicating that the proposed model can efficiently process and classify network traffic data. However, it is important to note that the performance may vary depending on the specific characteristics of the dataset, and further evaluation of additional datasets may be necessary to validate the model’s generalizability.

Upon analyzing the performance of the Tabnet-IDS model on the selected datasets, we observed consistent results across the various evaluation metrics. This remarkable feature indicates the reliability and efficiency of the model’s predictions. More importantly, it is notable to state that the prediction time is significantly low, empowering the model to detect high-profile network flows accurately within a short period. As a result, the model can provide assistance in quick response to attacks on IoT devices and deter further malicious attacks.

In terms of explainability, the various features [46] that were selected during each step by the mask are shown for each of the datasets in Figs 810 for CIC-IDS2017, CSE-CICIDS2018, and CIC-DDoS2019 respectively.

thumbnail
Fig 8. Feature masking output for the three decision steps of the TabNet model on the CIC-IDS2017 dataset.

https://doi.org/10.1371/journal.pone.0286652.g008

thumbnail
Fig 9. Global explanation for the selected features used in the CIC-IDS2018 dataset.

https://doi.org/10.1371/journal.pone.0286652.g009

thumbnail
Fig 10. “Global explanation for the selected features used in the CIC-IDS2019 dataset”.

Masks for each step show that the Fwd Packet Length Min, Fwd Packet Length Mean, Total Fwd Packets, Min Packets Length, Bwd Packet Length Mean, Fwd Packet Length Max, and Fwd Packet Length Std are mostly used for the decision in the Masks.

https://doi.org/10.1371/journal.pone.0286652.g010

In each of the masks, different sets of feature values are selected from the dataset based on importance and used to train the model. The dark colors on the masks show the most essential parts, while the light colors show the less critical parts. In Fig 8 for example, features like Fwd IAT Mean, Bwd Packet Length Mean, Fwd Packet Length Std, and Bwd Packet Length Max, tend to show more prominence among all the features in deciding the model’s performance according to mask 1, while in mask 3, features like Flow Duration, Fwd IAT Mean, Flow IAT Min, Packet Length Mean, Down/Up Ratio, and Min Packet Length informed the decision of the model in that step. Similarly, in Fig 9, considering Mask 1, the instant-wise feature selection and reasoning almost utilized the entire features with Protocol, Pkt Len Mean, Flow IAT Std, Fwd IAT Std, Fws Seg Size Mean showing preeminence over all other features. The Flow IAT Std, Fwd Pkts/s, Pkt Len Std, and Ack Flag Cnt are seen to be more influential among the selected features in Mask. Each mask represents the shared decision step shown in Fig 3.

Each feature’s relative weight in the dataset is represented by its color in the feature column. Nevertheless, the relevance of characteristics may vary from sample to sample, as shown by the color of the feature column. Different samples prioritize various features, as seen by the global feature selection shown by the aggregate feature importance mask. Instead of really employing a decision tree, the TabNet approach uses a deep neural network to imitate one. This method is useful since it prevents rows with identical characteristics from always being shown.

In general, the proposed TabNet improves the detection and classification performance of the IDS model by leveraging its inherent features of adaptive feature selection, decision steps, sparse feature representation, gradient-based learning, and the ability to handle high-dimensional data. IDS model is able t filter noise out of the data thereby maintaining that only reasonable data points are used to train and predict the network flows. With the decision steps, the proposed model learns to adapt to specific characteristics of the data, hence, is able to improve the detection rate on network flows. With the reduced complexity that is achieved with the sparse feature representation, our TabNet-IDS is more efficient to provide a timely response in the detection and classification of the traffics.

To better understand the effectiveness of the TabNet-IDS model in categorizing each of the network flows, we evaluate the confusion matrix which depicts the connection between the actual values and the anticipated values in the dataset. These confusion matrices are shown in Figs 1113, respectively, for the CIC-IDS2017, CSE-CICIDS2018, and CIC-DDoS2019 datasets. The normalized confusion matrices show that the proposed model can identify each of the attack vectors as well as the normal traffic in the datasets in all the scenarios involving multi-class network profile detection and classification. There are 9, 7, and 14 different classes in the CIC-IDS2017, CSE-CICIDS2018, and CIC-DDoS2019 that the model is built to identify. The TabNet-IDS shows good performance in each of these scenarios in accurately classifying the network flows with reduced False Positives.

thumbnail
Fig 11. Confusion matrix of the model performance on the CIC-IDS2017 dataset.

The encoded label is 0: Benign, 1: Botnet, 2: Brute force, 3: DDoS, 4: DoS, 5: Heartbleed, 6: Infiltration, 7: PortScan, 8: Web attacks.

https://doi.org/10.1371/journal.pone.0286652.g011

thumbnail
Fig 12. Confusion matrix of the model performance on the CSE-CICIDS2018 dataset with each label encoded as 0: Benign, 1: Bot, 2: DoS, 3: DDoS, 4: Brute force, 5: Infiltration, 6: Web Attacks.

https://doi.org/10.1371/journal.pone.0286652.g012

thumbnail
Fig 13. Confusion matrix of the model performance on the CIC-DDoS2019 dataset where each of the labels is encoded as 0: BENIGN, 1: DNS, 2: LDAP, 3: MSSQL, 4: NTP, 5: NetBIOS, 6: Portmap, 7: SNMP, 8: SSDP, 9: Syn, 10: TFTP, 11: UDP, 12: UDPLag, 13: WebDDoS.

https://doi.org/10.1371/journal.pone.0286652.g013

Performance comparison with related works

Considering that several ML and DL models already exist that have been implemented using different algorithms, it is crucial to compare their performance with our proposed TabNet-IDS model. This is aimed at highlighting the unique features and advantages of our model over existing ones. While accuracy is a key factor in evaluating the relevance of ML or DL model, explainability and interoperability are critical in providing insights into how the model makes its predictions. This is one of the primary focuses of our study. Explainability helps to provide more information on the reasons why specific features of the dataset determine the predictive results of the model. This, in turn, helps to increase the model’s transparency, making it easier to understand, interpret, and trust its predictions. As shown in Table 6, all deep learning-based models presented exhibited similar behaviors with different approaches. The evaluation metrics used showed results for accuracy, recall, and precision with the same range. Among the related works presented, only our proposed study implemented Matthew’s correlation coefficient (MCC) as an evaluation metric. This metric provides important information about the true positive, false positive, true negative, and false negative values in the prediction unlike the accuracy, precision, and recall. It is relevant to note that the implementation of the models used for comparison purposes was carried out on different datasets. The Tab-SRU proposed in [44] used the TabNet architecture for its implementation, and showed a high-performance accuracy as well as our results. While Chen et al [44] performed an experiment on the UKM-IDS20 and UNSW-NB15, we experimented on three more recent datasets. By incorporating explainability techniques into our proposed TabNet-IDS model, we provide detailed insights into the decision-making process of the model, making it easier to identify and address any biases or errors that might arise. As a result, we can improve the model’s overall accuracy and effectiveness in identifying network intrusions and enhancing the security of IoT devices.

thumbnail
Table 6. Comparison of the Performance of our proposed model and other models that implemented similar algorithms.

https://doi.org/10.1371/journal.pone.0286652.t006

Conclusion

Over time, ML and DL algorithms have demonstrated high capabilities for providing enhanced network profile detection and classification, thereby ensuring that packets flowing through a network are reliable and secure. Due to the high dependence of IoT systems on the internet and sometimes delay in providing regular updates, they appear to be highly vulnerable to various forms of exploits. To ensure a more secure IoT ecosystem, ML and DL algorithms are mostly used. In this study, we investigated the application of the DL algorithm that is specifically targeted at tabular data, as most network profiles are extracted in tabular form. This aspect of ML and DL tasks has been under-explored and needs more attention. We experimented with the proposed model architecture on three different general-purpose datasets, including the CIC-IDS 2017, CSE-CICIDS 2018, and CIC-DDoS 2019. The TabNet-IDS model demonstrated a high detection rate and reduced the false alarm rate for detecting and classifying the network profile in a multi-class problem. The algorithm proposed in this study contributes to knowledge in the IDS domain by providing explanations for the choice of the features used in the predictive decision at each step of the training without requiring a third-party framework such as SHAPEly and LIME for interpretations, hence resulting in a lightweight IDS model. Due to the large parameter space in the TabNet algorithm, we performed hyper-parameter tuning to obtain the most relevant parameters and values that best describe the model’s performance while maintaining high accuracy. The model achieved an accuracy of 97%, 95%, and 98% on the CIC-IDS2017, CSE-CICIDS2018, and CIC-DDoS2019. Although the model shows competitive performances and provides interpretability, its varying behavior on different datasets is an acknowledged limitation. To address this, we intend to explore and investigate the model performance on additional datasets. We believe that by analyzing the model’s performance on a wider range of datasets, we can better understand the variations and make necessary adjustments to better improve the overall efficiency; and validate the model’s ability to generalize on unseen data for real-world applications.

References

  1. 1. Okey OD, Melgarejo DC, Saadi M, Rosa RL, Kleinschmidt JH, Rodríguez DZ. Transfer Learning Approach to IDS on Cloud IoT devices using Optimized CNN. IEEE Access. 2023;11:1023–1038.
  2. 2. Umoren Udo E, Iroh C U, Nwaorgu O A, D Okey Ogobuchi. State of Internet of Things (IoT) Network and Rising Issues: A Review. NIPES Journal of Science and Technology Research. 2021;3(3):10.
  3. 3. Wang XW, Yonghong J, Zahra A, Laila M, Navid Y, Osama S. Federated deep learning for anomaly detection in the internet of things; Elsevier: Computers and Electrical Engineering. 2023;108:108651.
  4. 4. Basalan A. Intrusion Detection in IoT Systems Using Machine Learning Algorithms. Southern University and Agricultural and Mechanical College; 2020.
  5. 5. Albulayhi K, Abu Al-Haija Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT. IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method. Applied Sciences. 2022;12(10):5015.
  6. 6. Liu X, Zhao M, Li S, Zhang F, Trappe W. A security framework for the internet of things in the future internet architecture. Future Internet. 2017;9(3):27.
  7. 7. General Data Protection Regulation (GDPR)—Official Legal Text;. https://gdpr-info.eu/.
  8. 8. Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST); 2019. p. 1–8.
  9. 9. Mebawondu OJ, Alowolodu OD, Adetunmbi AO, Mebawondu JO. Optimizing the Classification of Network Intrusion Detection Using Ensembles of Decision Trees Algorithm. In: Misra S, Muhammad-Bello B, editors. Information and Communication Technology and Applications. Cham: Springer International Publishing; 2021. p. 286–300.
  10. 10. Islam U, Muhammad A, Mansoor R, Hossain MS, Ahmad I, Eldin ET, et al. Detection of distributed denial of service (DDoS) attacks in IOT based monitoring system of banking sector using machine learning models. Sustainability. 2022;14(14):8374.
  11. 11. Okey OD, Maidin SS, Adasme P, Lopes Rosa R, Saadi M, Carrillo Melgarejo D, et al. BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning. Sensors. 2022;22(19). pmid:36236506
  12. 12. Badamasi UM, Khaliq S, Babalola O, Musa S, Iqbal T. A Deep Learning based approach for DDoS attack detection in IoT-enabled smart environments. International Journal of Computer Networks and Communications Security. 2020;8(10):93–99.
  13. 13. Verma A, Ranga V. Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications. 2020;111(4):2287–2310.
  14. 14. Latif S, Zou Z, Idrees Z, Ahmad J. A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access. 2020;8:89337–89350.
  15. 15. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019;2(1):1–22.
  16. 16. Alkanhel R, El-kenawy ES, Abdelhamid A, Ibrahim A, Alohali M, Abotaleb M, et al. Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization. Computers, Materials and Continua. 2022;74:2677–2693.
  17. 17. King J, Awad AI. A distributed security mechanism for resource-constrained IoT devices. Informatica. 2016;40(1).
  18. 18. Abdi H, Williams LJ. Principal component analysis. Wiley interdisciplinary reviews: computational statistics. 2010;2(4):433–459.
  19. 19. Fournier Q, Aloise D. Empirical comparison between autoencoders and traditional dimensionality reduction methods. In: 2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE; 2019. p. 211–214.
  20. 20. Reis B, Maia E, Praça I. Selection and performance analysis of CICIDS2017 features importance. In: International Symposium on Foundations and Practice of Security. Springer; 2019. p. 56–71.
  21. 21. Abdulhammed R, Musafer H, Alessa A, Faezipour M, Abuzneid A. Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics. 2019;8(3):322.
  22. 22. Mane S, Rao D. Explaining network intrusion detection system using explainable AI framework. arXiv preprint arXiv:210307110. 2021;.
  23. 23. Altmann A, Toloşi L, Sander O, Lengauer T. Permutation importance: a corrected feature importance measure. Bioinformatics. 2010;26(10):1340–1347. pmid:20385727
  24. 24. Nohara Y, Matsumoto K, Soejima H, Nakashima N. Explanation of machine learning models using improved Shapley Additive Explanation. In: Proceedings of the 10th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics; 2019. p. 546–546.
  25. 25. Hariharan S, Rejimol Robinson R, Prasad RR, Thomas C, Balakrishnan N. XAI for intrusion detection system: comparing explanations based on global and local scope. Journal of Computer Virology and Hacking Techniques. 2022; p. 1–23.
  26. 26. Anjomshoae S, Kampik T, Främling K. Py-CIU: a python library for explaining machine learning predictions using contextual importance and utility. In: IJCAI-PRICAI 2020 Workshop on Explainable Artificial Intelligence (XAI), january 8, 2020; 2020.
  27. 27. Peltola T. Local Interpretable Model-agnostic Explanations of Bayesian Predictive Models via Kullback-Leibler Projections; 2018. Available from: https://arxiv.org/abs/1810.02678.
  28. 28. Molnar C. Interpretable machine learning. Lulu. com; 2020.
  29. 29. Arik SÖ, Pfister T. Tabnet: Attentive interpretable tabular learning. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol. 35; 2021. p. 6679–6687.
  30. 30. Hassan WH, et al. Current research on Internet of Things (IoT) security: A survey. Computer networks. 2019;148:283–294.
  31. 31. Gu X, Zhang Z. IoT security and new trends of solutions. In: Introduction to Internet of Things in Management Science and Operations Research. Springer; 2021. p. 55–76.
  32. 32. Kuzin M, Shmelev Y, Kuskov V. New trends in the world of IoT threats. Kaspersky Lab. 2018;.
  33. 33. Kolias C, Kambourakis G, Stavrou A, Voas J. DDoS in the IoT: Mirai and Other Botnets. Computer. 2017;50(7):80–84.
  34. 34. Radanliev P, De Roure DC, Nicolescu R, Huth M, Montalvo RM, Cannady S, et al. Future developments in cyber risk assessment for the internet of things. Computers in Industry. 2018;102:14–22.
  35. 35. Susilo B, Sari RF. Intrusion Detection in IoT Networks Using Deep Learning Algorithm. Information. 2020;11(5).
  36. 36. Guo W, Mu D, Xu J, Su P, Wang G, Xing X. Lemna: Explaining deep learning based security applications. In: proceedings of the 2018 ACM SIGSAC conference on computer and communications security; 2018. p. 364–379.
  37. 37. Dhaliwal S, Nahid A, Abbas R. Effective intrusion detection using XGBoost. J Inf. 2018;9(149):1–24.
  38. 38. Belouch M, El Hadaj S, Idhammad M. Performance evaluation of intrusion detection based on machine learning using Apache Spark. Procedia Computer Science. 2018;127:1–6.
  39. 39. Škrlj B, Džeroski S, Lavrač N, Petkovič M. Feature importance estimation with self-attention networks. arXiv preprint arXiv:200204464. 2020;.
  40. 40. Wojtas M, Chen K. Feature importance ranking for deep learning. Advances in Neural Information Processing Systems. 2020;33:5105–5114.
  41. 41. Shwartz-Ziv R, Armon A. Tabular data: Deep learning is not all you need. Information Fusion. 2022;81:84–90.
  42. 42. Yang S. Research on network behavior anomaly analysis based on bidirectional LSTM. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE; 2019. p. 798–802.
  43. 43. Singh NB, Singh MM, Sarkar A, Mandal JK. A novel wide & deep transfer learning stacked GRU framework for network intrusion detection. Journal of Information Security and Applications. 2021;61:102899.
  44. 44. Chen Y, Li J, Guo N. Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment. International Journal of Information Security. 2022; p. 1–11.
  45. 45. Yin C, Zhu Y, Fei J, He X. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access. 2017;5:21954–21961.
  46. 46. Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp. 2018;1:108–116.
  47. 47. Lashkari AH, Seo A, Gil GD, Ghorbani A. CIC-AB: Online ad blocker for browsers. In: 2017 International Carnahan Conference on Security Technology (ICCST); 2017. p. 1–7.
  48. 48. Martins A, Astudillo R. From softmax to sparsemax: A sparse model of attention and multi-label classification. In: International conference on machine learning. PMLR; 2016. p. 1614–1623.
  49. 49. Akiba T, Sano S, Yanase T, Ohta T, Koyama M. Optuna: A Next-generation Hyperparameter Optimization Framework. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2019.