{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:55:49Z","timestamp":1742982949161,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819749812"},{"type":"electronic","value":"9789819749829"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-4982-9_6","type":"book-chapter","created":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T11:07:08Z","timestamp":1721041628000},"page":"70-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Approach to\u00a0the\u00a0Use of\u00a0Explainability to\u00a0Mine Network Intrusion Detection Rules"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9243-7047","authenticated-orcid":false,"given":"Federica","family":"Uccello","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9327-0138","authenticated-orcid":false,"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,16]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cwhy should i trust you?\u201d explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.\u00a01135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"6_CR2","unstructured":"Doshi-Velez, F., Kim, B.: Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017)"},{"key":"6_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-030-65965-3_28","volume-title":"ECML PKDD 2020 Workshops","author":"C Molnar","year":"2020","unstructured":"Molnar, C., Casalicchio, G., Bischl, B.: Interpretable machine learning \u2013 a brief history, state-of-the-art and challenges. In: Koprinska, I., et al. (eds.) ECML PKDD 2020. CCIS, vol. 1323, pp. 417\u2013431. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65965-3_28"},{"key":"6_CR4","unstructured":"Samek, W., Wiegand, T., M\u00fcller, K.-R.: Explainable artificial intelligence: understanding, visualizing and interpreting deep learning models. arXiv preprint arXiv:1708.08296 (2017)"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Chora\u015b, M., Pawlicki, M., Puchalski, D., Kozik, R.: Machine learning\u2013the results are not the only thing that matters! what about security, explainability and fairness? In: Krzhizhanovskaya, V.V., et al. (eds.) Computational Science\u2013ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, 3\u20135 June 2020, Proceedings, Part IV 20, pp.\u00a0615\u2013628. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50423-6_46","DOI":"10.1007\/978-3-030-50423-6_46"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Chora\u015b, M., Pawlicka, A., Jaroszewska-Chora\u015b, D., Pawlicki, M.: Not only security and privacy: the evolving ethical and legal challenges of e-commerce. In: Katsikas, S., et al. (eds.) Computer Security. ESORICS 2023 International Workshops, pp.\u00a0167\u2013181. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-030-50423-6_46","DOI":"10.1007\/978-3-030-50423-6_46"},{"issue":"19","key":"6_CR7","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.3390\/electronics11193079","volume":"11","author":"S Patil","year":"2022","unstructured":"Patil, S., et al.: Explainable artificial intelligence for intrusion detection system. Electronics 11(19), 3079 (2022)","journal-title":"Electronics"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Islam, M.U., Mottalib, M.M., Hassan, M., Alam, Z.I., Zobaed, S., Rabby, Z.I.: The past, present, and prospective future of XAI: a comprehensive review. In: Ahmed, M., Islam, S.R., Anwar, A., Moustafa, N., Pathan, A.S.K. (eds.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence, vol. 1025, pp.\u00a01\u201329. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96630-0_1","DOI":"10.1007\/978-3-030-96630-0_1"},{"key":"6_CR9","unstructured":"Mendes, C., Rios, T.N.: Explainable artificial intelligence and cybersecurity: a systematic literature review. arXiv preprint arXiv:2303.01259 (2023)"},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.3390\/app13031252","volume":"13","author":"CI Nwakanma","year":"2023","unstructured":"Nwakanma, C.I., et al.: Explainable artificial intelligence (XAI) for intrusion detection and mitigation in intelligent connected vehicles: a review. Appl. Sci. 13(3), 1252 (2023)","journal-title":"Appl. Sci."},{"issue":"14","key":"6_CR11","doi-asserted-by":"publisher","first-page":"4759","DOI":"10.3390\/s21144759","volume":"21","author":"G Gonz\u00e1lez-Granadillo","year":"2021","unstructured":"Gonz\u00e1lez-Granadillo, G., Gonz\u00e1lez-Zarzosa, S., Diaz, R.: Security Information and Event Management (SIEM): analysis, trends, and usage in critical infrastructures. Sensors 21(14), 4759 (2021)","journal-title":"Sensors"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Jacobs, A.S., Beltiukov, R., Willinger, W., Ferreira, R.A., Gupta, A., Granville, L.Z.: AI\/ML for network security: the emperor has no clothes. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp.\u00a01537\u20131551 (2022)","DOI":"10.1145\/3548606.3560609"},{"key":"6_CR13","first-page":"1","volume":"2021","author":"B Mahbooba","year":"2021","unstructured":"Mahbooba, B., Timilsina, M., Sahal, R., Serrano, M.: Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity 2021, 1\u201311 (2021)","journal-title":"Complexity"},{"key":"6_CR14","unstructured":"Karna, S.K., Paudel, P., Saud, R., Bhandari, M.: Explainable prediction of features contributing to intrusion detection using ML algorithms and LIME"},{"issue":"2","key":"6_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/computers12020032","volume":"12","author":"CS Kalutharage","year":"2023","unstructured":"Kalutharage, C.S., Liu, X., Chrysoulas, C., Pitropakis, N., Papadopoulos, P.: Explainable AI-based DDOS attack identification method for IoT networks. Computers 12(2), 32 (2023)","journal-title":"Computers"},{"key":"6_CR16","unstructured":"Zhou, Q., Li, R., Xu, L., Nallanathan, A., Yang, J., Fu, A.: Towards explainable meta-learning for DDOS detection. arXiv preprint arXiv:2204.02255 (2022)"},{"key":"6_CR17","unstructured":"Das, A., Rad, P.: Opportunities and challenges in explainable artificial intelligence (XAI): a survey. arXiv preprint arXiv:2006.11371 (2020)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Ho, T.K.: Random decision forests. In: Proceedings of 3rd International Conference on Document Analysis and Recognition, vol.\u00a01, pp.\u00a0278\u2013282. IEEE (1995)","DOI":"10.1109\/ICDAR.1995.598994"},{"issue":"13","key":"6_CR20","doi-asserted-by":"publisher","first-page":"4319","DOI":"10.3390\/s21134319","volume":"21","author":"M-E Mihailescu","year":"2021","unstructured":"Mihailescu, M.-E., et al.: The proposition and evaluation of the RoEduNet-SIMARGL2021 network intrusion detection dataset. Sensors 21(13), 4319 (2021)","journal-title":"Sensors"},{"key":"6_CR21","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"6_CR23","unstructured":"Lundberg, S.M., Lee, S.-I.: A unified approach to interpreting model predictions. In: Advances in Neural Information Processing Systems, vol.\u00a030 (2017)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, S.: Anchors: high-precision model-agnostic explanations. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a032 (2018)","DOI":"10.1609\/aaai.v32i1.11491"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-4982-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T04:37:26Z","timestamp":1732423046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-4982-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819749812","9789819749829"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-4982-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"16 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ras Al Khaimah","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2024\/index.php#about","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}