the proceedings contain 40 papers. the topics discussed include: adaptive, multi-factor authentication as a service for web applications;a benchmark of graph augmentations for contrastive learning-based network attack...
ISBN:
(纸本)9798350342871
the proceedings contain 40 papers. the topics discussed include: adaptive, multi-factor authentication as a service for web applications;a benchmark of graph augmentations for contrastive learning-based network attack detection with graph neural networks;an energy-efficient multiple-factor authentication protocol for critical infrastructure IoT systems;inferring the confidence level of BGP-based distributed intrusion detection systems alarms;adversarial security and differential privacy in mmWave beam prediction in 6G networks;a study on the privacy concerns of the Internet of things;rejectable SoulBound tokens for credentials assignment and acceptance of terms;collection and statistical analysis of a fixed-text keystroke dynamics authentication data set;a tree-mapped taxonomy of blockchain attacks;Ariadne: a privacy-preserving network layer protocol;and towards anomaly detection using multiple instances of micro-cluster detection.
As the capabilities of cyber adversaries continue to evolve, now in parallel to the explosion of maturing and publicly-available artificial intelligence (AI) technologies, cyber defenders may reasonably wonder when cy...
详细信息
cyber attack scenario reconstruction plays a crucial role in understanding and mitigating security breaches. In this paper, we propose a novel framework that leverages Natural Language Processing (NLP), specifically N...
详细信息
the board of directors and mixed media mining strategies are excited about further research and development of the organization's traffic processes. Relying on a unified, programmable controller, security has rece...
详细信息
Advances in sensor and communication technologies have transformed traditional homes into smart homes, equipped with sensors and actuators for various functionalities like smart lighting, temperature control, irrigati...
详细信息
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based networking (IBN), that envision the automatio...
详细信息
Enterprise network systems are confronted with an escalating threat landscape, requiring timely and effective attack detection and mitigation of the risk of potential financial losses and system damages. However, exis...
详细信息
In the forthcoming era of 6G, the mmWave communication is envisioned to be used in dense user scenarios with high bandwidth requirements, that necessitate efficient and accurate beam prediction. Machine learning (ML) ...
详细信息
Artificial Intelligence (AI)-based Intrusion Detection Systems (IDS) significantly advance network security by leveraging Machine Learning (ML) and Deep Learning (DL) for highly accurate and dynamic cyberthreat detec...
详细信息
ISBN:
(纸本)9798331534110;9798331534103
Artificial Intelligence (AI)-based Intrusion Detection Systems (IDS) significantly advance network security by leveraging Machine Learning (ML) and Deep Learning (DL) for highly accurate and dynamic cyberthreat detection. However, a critical limitation of current AI-based IDS is their inherent "black box" nature, which disrupts the decision-making processes, thereby compromising trust and accountability. In response to these challenges, we propose an efficient Explainable Artificial Intelligence (XAI)-based framework designed to enhance boththe robustness and explainability of IDS. Our two-stage process integrates traditional statistical methods with XAI techniques, specifically SHAP and LIME, for feature selection and explanation analysis, providing transparent and interpretable decision-making while maintaining high detection performance. Our experimental evaluation, conducted using the CIC-DDoS2019 and CICIoT2023 datasets, demonstrates that the framework can sustain high detection accuracy while significantly enhancing the interpretability of IDS decisions. Moreover, the proposed feature reduction process lowers the computation effort of the XAI techniques, resulting in up to 87% faster.
暂无评论