{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:57:14Z","timestamp":1774630634747,"version":"3.50.1"},"reference-count":51,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":27,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Despite the growing popularity of machine learning models in the cyber\u2010security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black\u2010box. The eXplainable Artificial Intelligence (XAI) has become increasingly important to interpret the machine learning models to enhance trust management by allowing human experts to understand the underlying data evidence and causal reasoning. According to IDS, the critical role of trust management is to understand the impact of the malicious data to detect any intrusion in the system. The previous studies focused more on the accuracy of the various classification algorithms for trust in IDS. They do not often provide insights into their behavior and reasoning provided by the sophisticated algorithm. Therefore, in this paper, we have addressed XAI concept to enhance trust management by exploring the decision tree model in the area of IDS. We use simple decision tree algorithms that can be easily read and even resemble a human approach to decision\u2010making by splitting the choice into many small subchoices for IDS. We experimented with this approach by extracting rules in a widely used KDD benchmark dataset. We also compared the accuracy of the decision tree approach with the other state\u2010of\u2010the\u2010art algorithms.<\/jats:p>","DOI":"10.1155\/2021\/6634811","type":"journal-article","created":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T03:50:06Z","timestamp":1611892206000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":255,"title":["Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5491-4946","authenticated-orcid":false,"given":"Basim","family":"Mahbooba","sequence":"first","affiliation":[]},{"given":"Mohan","family":"Timilsina","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8019-9069","authenticated-orcid":false,"given":"Radhya","family":"Sahal","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Serrano","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"crossref","unstructured":"PientaD. TamsS. andThatcherJ. Can trust be trusted in cybersecurity? Proceedings of the 53rd Hawaii International Conference on System Sciences January 2020 Maui HI USA.","DOI":"10.24251\/HICSS.2020.522"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2916583"},{"key":"e_1_2_10_4_2","doi-asserted-by":"crossref","unstructured":"PerarasiT. VidhyaS. Leeban MosesM. andRamyaP. Malicious vehicles identifying and trust management algorithm for enhance the security in 5G-VANET Proceedings of the 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA) July 2020 Coimbatore India https:\/\/doi.org\/10.1109\/ICIRCA48905.2020.9183184.","DOI":"10.1109\/ICIRCA48905.2020.9183184"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2000050"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1038\/538020a"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080832"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"e_1_2_10_10_2","unstructured":"SvenmarckP. LuotsinenL. NilssonM. andSchubertJ. Possibilities and challenges for artificial intelligence in military applications Proceedings of the NATO Big Data and Artificial Intelligence for Military Decision Making Specialists\u2019 Meeting May 2018 Bordeaux France."},{"key":"e_1_2_10_11_2","doi-asserted-by":"crossref","unstructured":"StamparM.andFertaljK. Artificial intelligence in network intrusion detection Proceedings of the 2015 38th International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO) May 2015 Opatija Croatia IEEE 1318\u20131323 https:\/\/doi.org\/10.1109\/MIPRO.2015.7160479 2-s2.0-84946151625.","DOI":"10.1109\/MIPRO.2015.7160479"},{"key":"e_1_2_10_12_2","doi-asserted-by":"crossref","unstructured":"LeeW. StolfoS. J. ChanP. K.et al. Real time data mining-based intrusion detection Proceedings of the DARPA Information Survivability Conference and Exposition II. DISCEX\u201901 June 2001 Anaheim CA USA IEEE 89\u2013100 https:\/\/doi.org\/10.1109\/DISCEX.2001.932195 2-s2.0-84964411176.","DOI":"10.1109\/DISCEX.2001.932195"},{"key":"e_1_2_10_13_2","doi-asserted-by":"crossref","unstructured":"MehdiS. A. KhalidJ. andKhayamS. A. Revisiting traffic anomaly detection using software defined networking Proceedings of the International Workshop on Recent Advances in Intrusion Detection September 2011 Menlo Park CA USA Springer 161\u2013180 https:\/\/doi.org\/10.1007\/978-3-642-23644-0_9 2-s2.0-84857255431.","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"e_1_2_10_14_2","unstructured":"BojarskiM. Del TestaD. DworakowskiD.et al. End to end learning for self-driving cars 2016 https:\/\/arxiv.org\/abs\/1604.07316."},{"key":"e_1_2_10_15_2","unstructured":"ZahavyT. Ben-ZrihemN. andMannorS. Graying the black box: understanding DQNs Proceedings of the International Conference on Machine Learning 2016 New York NY USA 1899\u20131908."},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-010-9179-5"},{"key":"e_1_2_10_18_2","unstructured":"CupK. 2007 http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_2_10_19_2","doi-asserted-by":"crossref","unstructured":"LazarevicA. ErtozL. KumarV. OzgurA. andSrivastavaJ. A comparative study of anomaly detection schemes in network intrusion detection Proceedings of the 2003 SIAM International Conference on Data Mining May 2003 San Francisco CA USA SIAM 25\u201336.","DOI":"10.1137\/1.9781611972733.3"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2004.823851"},{"key":"e_1_2_10_21_2","doi-asserted-by":"crossref","unstructured":"NovikovD. YampolskiyR. V. andReznikL. Anomaly detection based intrusion detection Proceedings of the Third International Conference on Information Technology: New Generations (ITNG\u201906) April 2006 Las Vegas NV USA IEEE 420\u2013425 https:\/\/doi.org\/10.1109\/ITNG.2006.33 2-s2.0-33750804406.","DOI":"10.1109\/ITNG.2006.33"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.002"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.17762\/ijritcc.v1i8.2837"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.01.014"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"e_1_2_10_26_2","doi-asserted-by":"crossref","unstructured":"LeeW. StolfoS. J. andMokK. W. A data mining framework for building intrusion detection model Proceedings of the IEEE Symposium on Security and Privacy May 1999 Oakland CA USA IEEE Computer Society Press https:\/\/doi.org\/10.1109\/SECPRI.1999.766909 2-s2.0-84940104123.","DOI":"10.1109\/SECPRI.1999.766909"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.12.004"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.008"},{"key":"e_1_2_10_29_2","doi-asserted-by":"crossref","unstructured":"ZamanS.andKarrayF. Lightweight ids based on features selection and ids classification scheme Proceedings of the 2009 International Conference on Computational Science and Engineering August 2009 Vancouver BC Canada IEEE 365\u2013370 https:\/\/doi.org\/10.1109\/CSE.2009.180 2-s2.0-70849116937.","DOI":"10.1109\/CSE.2009.180"},{"key":"e_1_2_10_30_2","doi-asserted-by":"crossref","unstructured":"VimalkumarK.andRadhikaN. A big data framework for intrusion detection in smart grids using Apache spark Proceedings of the 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) September 2017 Udupi India IEEE 198\u2013204 https:\/\/doi.org\/10.1109\/ICACCI.2017.8125840 2-s2.0-85042639569.","DOI":"10.1109\/ICACCI.2017.8125840"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.14355\/ijcsa.2014.0304.02"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015905365"},{"key":"e_1_2_10_33_2","first-page":"57","article-title":"Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm","volume":"60","author":"Paliwal S.","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2016.070159"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4680867"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-018-0145-4"},{"key":"e_1_2_10_37_2","doi-asserted-by":"crossref","unstructured":"GilpinL. H. BauD. YuanB. Z. BajwaA. SpecterM. andKagalL. Explaining explanations: an overview of interpretability of machine learning Proceedings of the 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA) October 2018 Turin Italy IEEE 80\u201389 https:\/\/doi.org\/10.1109\/DSAA.2018.00018 2-s2.0-85062824495.","DOI":"10.1109\/DSAA.2018.00018"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1039\/b907946g"},{"key":"e_1_2_10_39_2","first-page":"800","article-title":"Generating better decision trees","volume":"89","author":"Norton S. W.","year":"1989","journal-title":"IJCAI"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/bf00116251"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.023"},{"key":"e_1_2_10_43_2","unstructured":"KayacikH. G. Zincir-HeywoodA. N. andHeywoodM. I. Selecting features for intrusion detection: a feature relevance analysis on KDD 99 Proceedings of the Third Annual Conference on Privacy Security and Trust October 2005 New Brunswick Canada 1723\u20131722."},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.3233\/ida-2004-8406"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.490"},{"key":"e_1_2_10_46_2","first-page":"1341","article-title":"Feature selection with ensembles, artificial variables, and redundancy elimination","volume":"10","author":"Tuv E.","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_10_47_2","doi-asserted-by":"publisher","DOI":"10.1023\/a:1018628609742"},{"key":"e_1_2_10_48_2","volume-title":"Logistic Regression","author":"Wright R. E.","year":"1995"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2019.04.020"},{"key":"e_1_2_10_50_2","doi-asserted-by":"crossref","unstructured":"WuM. HughesM. C. ParbhooS. ZazziM. RothV. andDoshi-VelezF. Beyond sparsity: tree regularization of deep models for interpretability Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence February 2018 New Orleans LA USA.","DOI":"10.1609\/aaai.v32i1.11501"},{"key":"e_1_2_10_51_2","first-page":"24","volume-title":"Advances in Neural Information Processing Systems","author":"Craven M.","year":"1996"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6634811.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6634811.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6634811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T23:00:31Z","timestamp":1723244431000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6634811"}},"subtitle":[],"editor":[{"given":"Ahmed Mostafa","family":"Khalil","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6634811"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6634811","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-12-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6634811"}}