Volume 17 , Issue 1 , PP: 219-238, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Purshottam J. Assudani 1 * , N. V. S. Pavan Kumar 2 , K. Mohanambal 3 , R. Chitra 4
Doi: https://doi.org/10.54216/JISIoT.170116
The implementation of Intrusion Detection Systems (IDS) remains crucial for network security yet high-dimensional data alongside class imbalance issues decrease their functionality. Machine learning-based IDS models, which use traditional approaches experience difficulties in providing explanations about their prediction results. An IDS framework enhancement with explainable AI (XAI) methods aims at improving the system's transparency throughout this study. The data processing includes KNN imputation combined with K-Means SMOTE to handle missing information and class imbalance problems. When selecting features the model uses a merged methodology combining Pearson Correlation with Mutual Information and Sequential Forward Floating Selection (SFFS) algorithms for optimization. Light Gradient Boosting Model (LGBM) serves as the classification model that produces higher accuracy than competing methods with 90.71% for UNSW-NB 15 and 96.98% for CICIDS-2017. By using SHAP-based explain ability, the system provides worldwide and specific model interpretations that enable users to trust IDS prediction results. The experimental findings validate that the proposed methodology succeeds in simplifying the system while improving its classification functionality and delivering stronger interpretability properties to tackle weaknesses of current IDS technologies. The examination presents important findings for the development of secure network protection technologies, which operate with transparency.
Intrusion Detection System (IDS) , Explainable AI (XAI) , Machine Learning (ML) , Feature Selection , Class Imbalance , Light Gradient Boosting Model (LGBM)
[1] C. Prabhu, R. V. Gandhi, A. K. Jain, V. S. Lalka, S. G. Thottempudi, and P. P. Rao, “A Novel Approach to Extend KM Models with Object Knowledge Model (OKM) and Kafka for Big Data and Semantic Web with Greater Semantics,” Advances in Intelligent Systems and Computing, pp. 544–554, Jun. 2019, doi: https://doi.org/10.1007/978-3-030-22354-0_48.
[2] Y. N. Prajapati and M. Sharma, “Designing AI to Predict Covid-19 Outcomes by Gender,” Dec. 2023, doi: https://doi.org/10.1109/icdsaai59313.2023.10452565.
[3] J. A. Khan, R. S. Rathore, H. H. Abulreesh, A. S. Al-thubiani, S. Khan, and I. Ahmad, “Diversity of antibiotic-resistant Shiga toxin-producing Escherichia coli serogroups in foodstuffs of animal origin in northern India,” Journal of Food Safety, vol. 38, no. 6, p. e12566, Oct. 2018, doi: https://doi.org/10.1111/jfs.12566.
[4] Y. N. Prajapati and M. Sharma, “Novel Machine Learning Algorithms for Predicting COVID-19 Clinical Outcomes with Gender Analysis,” Communications in Computer and Information Science, pp. 296–310, Jan. 2024, doi: https://doi.org/10.1007/978-3-031-56703-2_24.
[5] J. A. Khan, R. S. Rathore, H. H. Abulreesh, A. S. Al-thubiani, S. Khan, and I. Ahmad, “Diversity of antibiotic-resistant Shiga toxin-producing Escherichia coli serogroups in foodstuffs of animal origin in northern India,” Journal of Food Safety, vol. 38, no. 6, p. e12566, Oct. 2018, doi: https://doi.org/10.1111/jfs.12566.
[6] H. Gupta and C. Sharma, “Face mask detection using transfer learning and OpenCVn live videos,” 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), pp. 115–119, Nov. 2022, doi: https://doi.org/10.1109/icfirtp56122.2022.10059441.
[7] Y. Sikkandar et al., “Deep learning based an automated skin lesion segmentation and intelligent classification model,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3245–3255, 2021.
[8] C. Kalaiselvi and G. M. Nasira, “A new approach for diagnosis of diabetes and prediction of cancer using ANFIS,” 2014 Proceedings, World Congress on Computing and Communication Technologies, WCCCT 2014, pp. 188–190.
[9] V. D. P. Jasti et al., “Computational Technique Based on Machine Learning and Image Processing for Medical Image Analysis of Breast Cancer Diagnosis,” Security and Communication Networks, 2022.
[10] N. Dey et al., “Parameter optimization for local polynomial approximation based intersection confidence interval filter using genetic algorithm: An application for brain MRI image de-noising,” Journal of Imaging, vol. 1, no. 1, pp. 60–84, 2015.
[11] S. B. Sasi and N. Sivanandam, “A survey on cryptography using optimization algorithms in WSNs,” Indian Journal of Science and Technology, vol. 8, no. 3, pp. 216–221, 2015.
[12] A. Kashyap and J. Raghuvanshi, “A preliminary study on exploring the critical success factors for developing COVID-19 preventive strategy with an economy centric approach,” Management Research: Journal of the Iberoamerican Academy of Management, vol. 18, no. 4, pp. 357–377, Sep. 2020, doi: https://doi.org/10.1108/mrjiam-06-2020-1046.
[13] V. Roy and S. Shukla, “Image Denoising by Data Adaptive and Non-Data Adaptive Transform Domain Denoising Method Using EEG Signal,” in Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012), V. Kumar and M. Bhatele, Eds. Springer, India, 2013, pp. 1–8, doi: https://doi.org/10.1007/978-81-322-0970-6_2.
[14] V. Roy et al., “Network Physical Address Based Encryption Technique Using Digital Logic,” International Journal of Scientific & Technology Research, vol. 9, no. 4, pp. 3119–3122, 2020.
[15] V. Singh, R. Bansal, and R. B. Singh, “Big-Data Analytics,” pp. 275–291, Oct. 2022, doi: https://doi.org/10.1002/9781119792826.ch12.
[16] A. Saini et al., “A Proposed Method of Machine Learning based Framework for Software Product Line Testing,” Nov. 2022, doi: https://doi.org/10.1109/icfirtp56122.2022.10059409.
[17] H. Gupta et al., “A Machine Learning Framework for Detection of Fake News,” Communications in Computer and Information Science, pp. 64–78, 2022, doi: https://doi.org/10.1007/978-3-031-23647-1_6.
[18] H. Jain and Mahadev Mahadev, “An Analysis of SMS Spam Detection using Machine Learning Model,” 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT), Jul. 2022, doi: https://doi.org/10.1109/ccict56684.2022.00038.
[19] K. Ramu et al., “Augmenting Cervical Cancer Analysis with Deep Learning Classification and Topography Selection Using Artificial Bee Colony Optimization,” SN Computer Science, vol. 5, no. 6, article no. 703, 2024, doi: https://doi.org/10.1007/s42979-024-03040-8.
[20] V. A. Bhagyalakshmi et al., “Review of Detecting Diabetes Mellitus and Diabetic Retinopathy Using Tongue Images and Its Features,” Research Journal of Pharmaceutical Biological and Chemical Sciences, vol. 8, no. 2, pp. 378–386, Apr. 2017.
[21] P. Shukla et al., “A Wavelet Features and Machine Learning Founded Error Analysis of Sound and Trembling Signal,” SN Computer Science, vol. 4, 2023, doi: https://doi.org/10.1007/s42979-023-02189-y.
[22] G. Chauhan and V. Chauhan, “A phase-wise approach to implement lean manufacturing,” International Journal of Lean Six Sigma, vol. 10, no. 1, pp. 106–122, Mar. 2019, doi: https://doi.org/10.1108/ijlss-09-2017-0110.
[23] P. K. Srivastava et al., “Internet of thing uses in materialistic ameliorate farming through AI,” AIP Conference Proceedings, Jan. 2023, doi: https://doi.org/10.1063/5.0154574.
[24] N. Malik, “Authentic leadership – an antecedent for contextual performance of Indian nurses,” Personnel Review, vol. 47, no. 6, pp. 1244–1260, Sep. 2018, doi: https://doi.org/10.1108/pr-07-2016-0168.
[25] A. A. Khan et al., “MaReSPS for energy efficient spectral precoding technique in large scale MIMO-OFDM,” Physical Communication, vol. 58, 2023, 102057, doi: https://doi.org/10.1016/j.phycom.2023.102057.
[26] S. Kala et al., “Shadow and weak gravitational lensing of a rotating regular black hole in a non-minimally coupled Einstein-Yang-Mills theory in the presence of plasma,” The European Physical Journal Plus, vol. 137, no. 4, Apr. 2022, doi: https://doi.org/10.1140/epjp/s13360-022-02634-6.
[27] K. Sood et al., “Identification of Asymmetric DDoS Attacks at Layer 7 with Idle Hyperlink,” ECS Transactions, vol. 107, no. 1, pp. 2171–2181, Apr. 2022, doi: https://doi.org/10.1149/10701.2171ecst.
[28] S. Baskar et al., “An energy persistent Range-dependent Regulated Transmission Communication model for vehicular network applications,” Computer Networks, vol. 152, pp. 144–153, 2019.
[29] V. Srinivasan et al., “Jet lag, circadian rhythm sleep disturbances, and depression: The role of melatonin and its analogs,” Advances in Therapy, vol. 27, no. 11, pp. 796–813, 2010.
[30] S. Jayachitra and A. Prasanth, “Multi-Feature Analysis for Automated Brain Stroke Classification Using Weighted Gaussian Naïve Bayes Classifier,” Journal of Circuits, Systems and Computers, vol. 30, 2021.
[31] A. Prasanth and S. Jayachitra, “A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications,” Peer-to-Peer Networking and Applications, vol. 13, no. 6, pp. 1905–1920, 2020.
[32 ] S. Baskar et al., “A dynamic and interoperable communication framework for controlling the operations of wearable sensors in smart healthcare applications,” Computer Communications, vol. 149, pp. 17–26, 2020.
[33] R. Smith and A. Johnson, “Innovations in Machine Learning for Healthcare Applications,” Journal of Innovative Computing, vol. 10, no. 2, pp. 123–135, 2023, doi: https://doi.org/10.1016/j.jic.2023.02.005.