{"id":"https://openalex.org/W4388887285","doi":"https://doi.org/10.1145/3605772.3624004","title":"Hybrid Explainable Intrusion Detection System: Global vs. Local Approach","display_name":"Hybrid Explainable Intrusion Detection System: Global vs. Local Approach","publication_year":2023,"publication_date":"2023-11-21","ids":{"openalex":"https://openalex.org/W4388887285","doi":"https://doi.org/10.1145/3605772.3624004"},"language":"en","primary_location":{"id":"doi:10.1145/3605772.3624004","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3605772.3624004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045098894","display_name":"Harry Chandra Tanuwidjaja","orcid":"https://orcid.org/0000-0003-2668-559X"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Harry Chandra Tanuwidjaja","raw_affiliation_strings":["National Institute of Information and Communications Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029032117","display_name":"Takeshi Takahashi","orcid":"https://orcid.org/0000-0002-6477-7770"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takeshi Takahashi","raw_affiliation_strings":["National Institute of Information and Communications Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039482466","display_name":"Tsung-Nan Lin","orcid":"https://orcid.org/0000-0001-5659-1194"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tsung-Nan Lin","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048350916","display_name":"Boyi Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166867","display_name":"National Institutes of Applied Research","ror":"https://ror.org/05wcstg80","country_code":"TW","type":"government","lineage":["https://openalex.org/I4210128167","https://openalex.org/I4210166867"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Boyi Lee","raw_affiliation_strings":["National Applied Research Laboratories, Taipei, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Applied Research Laboratories, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I4210166867"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014860606","display_name":"Tao Ban","orcid":"https://orcid.org/0000-0002-9616-3212"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tao Ban","raw_affiliation_strings":["National Institute of Information and Communications Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I90023481"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5045098894"],"corresponding_institution_ids":["https://openalex.org/I90023481"],"apc_list":null,"apc_paid":null,"fwci":0.1997,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53337054,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7837021350860596},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.766386866569519},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.7029513716697693},{"id":"https://openalex.org/keywords/plot","display_name":"Plot (graphics)","score":0.6023784279823303},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.43819698691368103},{"id":"https://openalex.org/keywords/variable","display_name":"Variable (mathematics)","score":0.4338791072368622},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4102153480052948},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3215218186378479},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07474255561828613}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7837021350860596},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.766386866569519},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.7029513716697693},{"id":"https://openalex.org/C167651023","wikidata":"https://www.wikidata.org/wiki/Q1474611","display_name":"Plot (graphics)","level":2,"score":0.6023784279823303},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.43819698691368103},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.4338791072368622},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4102153480052948},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3215218186378479},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07474255561828613},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3605772.3624004","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3605772.3624004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2902900716","https://openalex.org/W3017093935","https://openalex.org/W3121453273","https://openalex.org/W3162956350","https://openalex.org/W3216145890","https://openalex.org/W4224249813","https://openalex.org/W4285058242","https://openalex.org/W4285248859","https://openalex.org/W4296913356","https://openalex.org/W4297538900","https://openalex.org/W4307571902","https://openalex.org/W4313057011","https://openalex.org/W4313116287","https://openalex.org/W4318604557","https://openalex.org/W4367309662"],"related_works":["https://openalex.org/W1557094818","https://openalex.org/W2183246718","https://openalex.org/W2099261052","https://openalex.org/W3209204065","https://openalex.org/W2897156099","https://openalex.org/W2105707930","https://openalex.org/W1755711892","https://openalex.org/W2245242553","https://openalex.org/W2160907113","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDSs)":[3],"play":[4],"a":[5,68,74,84],"major":[6],"role":[7],"in":[8],"detecting":[9],"suspicious":[10],"activities":[11],"and":[12,24,30,41,136,140,161],"alerting":[13],"users":[14],"of":[15,153],"potential":[16],"malicious":[17],"adversaries.":[18],"Security":[19],"operators":[20,47],"investigate":[21],"these":[22],"alerts":[23],"attempt":[25],"to":[26,49,61,82,118],"mitigate":[27],"the":[28,46,51,94,114,121,125,154],"risks":[29],"damage.":[31],"Many":[32],"IDS-related":[33],"studies":[34],"have":[35,98],"focused":[36],"on":[37],"improving":[38],"detection":[39,69],"accuracy":[40],"reducing":[42],"false":[43],"positives;":[44],"however,":[45],"need":[48],"understand":[50],"rationale":[52],"behind":[53],"IDS":[54,109],"engines":[55,66],"issuing":[56],"an":[57,107],"alert.":[58],"In":[59,102],"contrast":[60],"conventional":[62],"rule-based":[63],"engines,":[64],"machine-learning-based":[65],"use":[67],"mechanism":[70],"that":[71,111,120,151],"is":[72,79],"like":[73],"black":[75],"box,":[76],"i.e.,":[77],"it":[78],"not":[80],"designed":[81],"indicate":[83],"rationale.":[85],"%":[86],"Explainable":[87],"AI":[88],"(XAI)":[89],"techniques,":[90],"which":[91],"explain":[92,124],"how":[93],"model":[95],"derives":[96],"decisions,":[97],"also":[99],"been":[100],"studied.":[101],"this":[103,128],"paper,":[104],"we":[105,130,141,166],"introduce":[106],"explainable":[108,174],"(X-IDS)":[110],"copes":[112],"with":[113],"well-used":[115],"XAI":[116],"techniques":[117],"ensure":[119],"system":[122],"can":[123],"decisions.":[126],"To":[127],"end,":[129],"used":[131],"local":[132],"interpretable":[133],"model-agnostic":[134],"explanations":[135],"Shapley":[137],"additive":[138],"explanations,":[139],"evaluated":[142],"their":[143],"differing":[144],"characteristics.":[145],"We":[146],"proposed":[147],"our":[148],"explanation":[149],"framework":[150],"consists":[152],"variable":[155],"importance":[156],"plot,":[157,160],"individual":[158],"value":[159],"partial":[162],"dependence":[163],"plot.":[164],"Furthermore,":[165],"conclude":[167],"by":[168],"discussing":[169],"future":[170],"issues":[171],"regarding":[172],"better":[173],"IDS.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
