{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:00:41Z","timestamp":1778083241625,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s13042-024-02242-z","type":"journal-article","created":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T05:06:55Z","timestamp":1718687215000},"page":"5337-5360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Bridging the gap: advancing the transparency and trustworthiness of network intrusion detection with explainable AI"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8764-6151","authenticated-orcid":false,"given":"Md. Tohidul","family":"Islam","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7771-4587","authenticated-orcid":false,"given":"Md. Khalid","family":"Syfullah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5662-0813","authenticated-orcid":false,"given":"Md.Golam","family":"Rashed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8202-9477","authenticated-orcid":false,"given":"Dipankar","family":"Das","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"key":"2242_CR1","unstructured":"CISA. \u201cWhat is Cybersecurity? | CISA,\u201d What is Cybersecurity? https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-001. Accessed 20 Mar 2023"},{"issue":"4","key":"2242_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122","volume":"10","author":"DS Berman","year":"2019","unstructured":"Berman DS, Buczak AL, Chavis JS, Corbett CL (2019) A survey of deep learning methods for cyber security. Information 10(4):4. https:\/\/doi.org\/10.3390\/info10040122","journal-title":"Information"},{"key":"2242_CR3","unstructured":"Number of internet users worldwide 2021. Statista. https:\/\/www.statista.com\/statistics\/273018\/number-of-internet-users-worldwide\/. Accessed 20 Mar 2023"},{"key":"2242_CR4","unstructured":"2021 Cyber Attack Trends Mid-Year Report | Check Point Software. https:\/\/pages.checkpoint.com\/cyber-attack-2021-trends.html. Accessed 20 Mar 2023"},{"key":"2242_CR5","doi-asserted-by":"publisher","first-page":"23817","DOI":"10.1109\/ACCESS.2020.2968045","volume":"8","author":"S Zeadally","year":"2020","unstructured":"Zeadally S, Adi E, Baig Z, Khan IA (2020) Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access 8:23817\u201323837. https:\/\/doi.org\/10.1109\/ACCESS.2020.2968045","journal-title":"IEEE Access"},{"key":"2242_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109032","volume":"212","author":"M Macas","year":"2022","unstructured":"Macas M, Wu C, Fuertes W (2022) A survey on deep learning for cybersecurity: progress, challenges, and opportunities. Comput Netw 212:109032. https:\/\/doi.org\/10.1016\/j.comnet.2022.109032","journal-title":"Comput Netw"},{"issue":"2","key":"2242_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/IOTM.005.2200028","volume":"5","author":"ZA El Houda","year":"2022","unstructured":"El Houda ZA, Brik B, Senouci S-M (2022) A novel IoT-based explainable deep learning framework for intrusion detection systems. IEEE Internet Things Mag 5(2):20\u201323. https:\/\/doi.org\/10.1109\/IOTM.005.2200028","journal-title":"IEEE Internet Things Mag"},{"key":"2242_CR8","doi-asserted-by":"publisher","unstructured":"Marino DL, Wickramasinghe CS, Manic M (2018) An adversarial approach for explainable AI in intrusion detection systems. In: IECON 2018\u201444th annual conference of the IEEE industrial electronics society, pp 3237\u20133243., https:\/\/doi.org\/10.1109\/IECON.2018.8591457","DOI":"10.1109\/IECON.2018.8591457"},{"key":"2242_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359","author":"M Wang","year":"2020","unstructured":"Wang M, Zheng K, Yang Y, Wang X (2020) An explainable machine learning framework for intrusion detection systems. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988359","journal-title":"IEEE Access"},{"key":"2242_CR10","unstructured":"A Systematic Review of Human\u2013Computer Interaction and Explainable Artificial Intelligence in Healthcare With Artificial Intelligence Techniques | IEEE Journals & Magazine | IEEE Xplore. https:\/\/ieeexplore.ieee.org\/document\/9614151. Accessed 2 July 2022"},{"key":"2242_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3186589","author":"P Barnard","year":"2022","unstructured":"Barnard P, Marchetti N, Silva LAD (2022) Robust network intrusion detection through explainable artificial intelligence (XAI). IEEE Netw Lett. https:\/\/doi.org\/10.1109\/LNET.2022.3186589","journal-title":"IEEE Netw Lett."},{"key":"2242_CR12","doi-asserted-by":"publisher","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \u2018Why should i trust you?\u2019: explaining the predictions of any classifier. https:\/\/doi.org\/10.48550\/arXiv.1602.04938","DOI":"10.48550\/arXiv.1602.04938"},{"key":"2242_CR13","unstructured":"Lundberg SM, Lee S-I (2017) A unified approach to interpreting model predictions. In: Advances in neural information processing systems, vol 30 [Online]. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/8a20a8621978632d76c43dfd28b67767-Abstract.html. Accessed 9 July 2022"},{"key":"2242_CR14","doi-asserted-by":"publisher","unstructured":"Arya V et al (2019) One explanation does not fit all: a toolkit and taxonomy of AI explainability techniques. https:\/\/doi.org\/10.48550\/arXiv.1909.03012","DOI":"10.48550\/arXiv.1909.03012"},{"key":"2242_CR15","unstructured":"AI Explainability 360 (v0.2.0) (2019) [Online]. https:\/\/github.com\/Trusted-AI\/AIX360"},{"key":"2242_CR16","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"A Barredo Arrieta","year":"2020","unstructured":"Barredo Arrieta A et al (2020) Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf Fusion 58:82\u2013115. https:\/\/doi.org\/10.1016\/j.inffus.2019.12.012","journal-title":"Inf Fusion"},{"issue":"8","key":"2242_CR17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080832","volume":"8","author":"DV Carvalho","year":"2019","unstructured":"Carvalho DV, Pereira EM, Cardoso JS (2019) Machine learning interpretability: a survey on methods and metrics. Electronics 8(8):8. https:\/\/doi.org\/10.3390\/electronics8080832","journal-title":"Electronics"},{"key":"2242_CR18","doi-asserted-by":"publisher","unstructured":"Speith T (2022) A review of taxonomies of explainable artificial intelligence (XAI) methods. In: 2022 ACM conference on fairness, accountability, and transparency, New York, pp 2239\u20132250. https:\/\/doi.org\/10.1145\/3531146.3534639.","DOI":"10.1145\/3531146.3534639"},{"key":"2242_CR19","doi-asserted-by":"publisher","unstructured":"Wachter S, Mittelstadt B, Russell C (2017) Counterfactual explanations without opening the black box: automated decisions and the GDPR, Rochester. https:\/\/doi.org\/10.2139\/ssrn.3063289","DOI":"10.2139\/ssrn.3063289"},{"key":"2242_CR20","doi-asserted-by":"publisher","unstructured":"Liu H, Yin Q, Wang WY (2019) Towards explainable NLP: a generative explanation framework for text classification. https:\/\/doi.org\/10.48550\/arXiv.1811.00196","DOI":"10.48550\/arXiv.1811.00196"},{"key":"2242_CR21","doi-asserted-by":"publisher","unstructured":"Danilevsky M, Qian K, Aharonov R, Katsis Y, Kawas B, Sen P (2020) A survey of the state of explainable ai for natural language processing. https:\/\/doi.org\/10.48550\/arXiv.2010.00711","DOI":"10.48550\/arXiv.2010.00711"},{"key":"2242_CR22","unstructured":"Jeyakumar JV, Noor J, Cheng Y-H, Garcia L, Srivastava M (2020) How can i explain this to you? An empirical study of deep neural network explanation methods. In: Advances in neural information processing systems, vol 33, pp 4211\u20134222 [Online]. https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/2c29d89cc56cdb191c60db2f0bae796b-Abstract.html. Accessed 9 July 2022"},{"key":"2242_CR23","doi-asserted-by":"publisher","unstructured":"Jin W, Li X, Hamarneh G (2022) Evaluating explainable AI on a multi-modal medical imaging task: can existing algorithms fulfill clinical requirements? https:\/\/doi.org\/10.48550\/arXiv.2203.06487","DOI":"10.48550\/arXiv.2203.06487"},{"key":"2242_CR24","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta AB et al (2020) Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf Fusion 58:82\u2013115","journal-title":"Inf Fusion"},{"key":"2242_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3188750","author":"ZAE Houda","year":"2022","unstructured":"Houda ZAE, Brik B, Khoukhi L (2022) \u2018Why should i trust your IDS?\u2019: an explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Open J Commun Soc. https:\/\/doi.org\/10.1109\/OJCOMS.2022.3188750","journal-title":"IEEE Open J Commun Soc"},{"key":"2242_CR26","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani A (2009) A detailed analysis of the KDD CUP 99 data set. In: 2nd IEEE symposium on computational intelligence for security and defense applications (CISDA)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2242_CR27","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military communications and information systems conference (MilCIS). IEEE","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"2242_CR28","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11416-022-00441-2","volume":"19","author":"S Hariharan","year":"2023","unstructured":"Hariharan S, Rejimol Robinson RR, Prasad RR et al (2023) XAI for intrusion detection system: comparing explanations based on global and local scope. J Comput Virol Hack Tech 19:217\u2013239. https:\/\/doi.org\/10.1007\/s11416-022-00441-2","journal-title":"J Comput Virol Hack Tech"},{"key":"2242_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119000","volume":"639","author":"M Keshk","year":"2023","unstructured":"Keshk M, Koroniotis N, Pham N, Moustafa N, Turnbull B, Zomaya AY (2023) An explainable deep learning-enabled intrusion detection framework in IoT networks. Inf Sci 639:119000. https:\/\/doi.org\/10.1016\/j.ins.2023.119000","journal-title":"Inf Sci"},{"key":"2242_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3186589","author":"P Barnard","year":"2022","unstructured":"Barnard P, Marchetti N, Silva LAD (2022) Robust network intrusion detection through explainable artificial intelligence (XAI). IEEE Netw Lett. https:\/\/doi.org\/10.1109\/LNET.2022.3186589","journal-title":"IEEE Netw Lett"},{"key":"2242_CR31","doi-asserted-by":"publisher","unstructured":"Tritscher J, Wolf M, Hotho A, Schl\u00f6r D (2023) Evaluating feature relevance XAI in\u00a0network intrusion detection. In: Longo L (eds) Explainable artificial intelligence. xAI 2023. Communications in computer and information science, vol 1901. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-44064-9_25","DOI":"10.1007\/978-3-031-44064-9_25"},{"key":"2242_CR32","doi-asserted-by":"publisher","first-page":"11459","DOI":"10.1007\/s00521-023-08319-0","volume":"35","author":"S Sivamohan","year":"2023","unstructured":"Sivamohan S, Sridhar SS (2023) An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework. Neural Comput Appl 35:11459\u201311475. https:\/\/doi.org\/10.1007\/s00521-023-08319-0","journal-title":"Neural Comput Appl"},{"key":"2242_CR33","unstructured":"Wei F, Li H, Zhao Z, Hu H (2023) XNIDS: explaining deep learning-based network intrusion detection systems for active intrusion responses. In: Proceedings of the 32nd USENIX conference on security symposium (SEC '23). USENIX Association, USA, Article 243, pp 4337\u20134354"},{"key":"2242_CR34","unstructured":"Mane S, Rao D (2021) Explaining network intrusion detection system using explainable AI framework. arXiv:2103.07110"},{"key":"2242_CR35","doi-asserted-by":"publisher","unstructured":"Arreche O, Guntur, T, Mustafa A (2024) Xai-Ids: towards proposing an explainable artificial intelligence framework for enhancing network intrusion detection systems. https:\/\/ssrn.com\/abstract=4567885 or https:\/\/doi.org\/10.2139\/ssrn.4567885","DOI":"10.2139\/ssrn.4567885"},{"issue":"4","key":"2242_CR36","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/s10922-021-09606-8","volume":"29","author":"H Liu","year":"2021","unstructured":"Liu H, Zhong C, Alnusair A, Islam SR (2021) FAIXID: a framework for enhancing AI explainability of intrusion detection results using data cleaning techniques. J Netw Syst Manag 29(4):40. https:\/\/doi.org\/10.1007\/s10922-021-09606-8","journal-title":"J Netw Syst Manag"},{"key":"2242_CR37","unstructured":"Sanjaya SK, Jena K (2014) A detail analysis on intrusion detection datasets. In: 2014 IEEE International Advance Computing Conference (IACC), Gurgaon, 21\u201322 Feb. 2014"},{"key":"2242_CR38","unstructured":"KDD Cup 1999 (2007) [online]. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"2242_CR39","unstructured":"DARPA intrusion detection evaluation. http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/dataindex.html"},{"key":"2242_CR40","unstructured":"Ranganayaki S, Ramesh Babu A (2023) Machine learning algorithms for detection and classification IoT network intrusion. J Harbin Eng Univ 44(7)"},{"key":"2242_CR41","doi-asserted-by":"publisher","unstructured":"Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 Dataset|SpringerLink. https:\/\/doi.org\/10.1186\/s40537-020-00379-6. Accessed 25 Apr 2023","DOI":"10.1186\/s40537-020-00379-6"},{"key":"2242_CR42","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s40537-023-00694-8","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin Y, Jang-Jaccard J, Xu W et al (2023) IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J Big Data 10:15. https:\/\/doi.org\/10.1186\/s40537-023-00694-8","journal-title":"J Big Data"},{"key":"2242_CR43","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman K, Poornachandran P, AlNemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525\u201341550","journal-title":"IEEE Access"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02242-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02242-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02242-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T01:23:50Z","timestamp":1728437030000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02242-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,18]]},"references-count":43,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["2242"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02242-z","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3263546\/v1","asserted-by":"object"}]},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,18]]},"assertion":[{"value":"14 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}