Search Results for author: William Anderson

Found 6 papers, 0 papers with code

Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems

no code implementations18 Jan 2024 Jesse Ables, Nathaniel Childers, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

The contributions of this work include the hybrid X-IDS architecture, the eclectic rule extraction algorithm applicable to intrusion detection datasets, and a thorough analysis of performance and explainability, demonstrating the trade-offs involved in rule extraction speed and accuracy.

Explainable artificial intelligence Explainable Artificial Intelligence (XAI) +2

REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response

no code implementations23 May 2023 Damodar Panigrahi, William Anderson, Joshua Whitman, Sudip Mittal, Benjamin A Blakely

In this paper, to enable this control functionality over an IRS, we create Rules of EngaGement for Automated cybeR Defense (REGARD) system which holds a set of Rules of Engagement (RoE) to protect the managed system according to the instructions provided by the human operator.

Intrusion Detection

Explainable Intrusion Detection Systems Using Competitive Learning Techniques

no code implementations30 Mar 2023 Jesse Ables, Thomas Kirby, Sudip Mittal, Ioana Banicescu, Shahram Rahimi, William Anderson, Maria Seale

Lastly, we analyze the statistical and visual explanations generated by our architecture, and we give a strategy that users could use to help navigate the set of explanations.

Intrusion Detection Navigate

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

no code implementations13 Jul 2022 Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures and government institutions.

Explainable Artificial Intelligence (XAI) Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.