ebook img

Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) PDF

283 Pages·2022·6.039 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)

Studies in Computational Intelligence 1025 Mohiuddin Ahmed · Sheikh Rabiul Islam · Adnan Anwar · Nour Moustafa · Al-Sakib Khan Pathan   Editors Explainable Artificial Intelligence for Cyber Security Next Generation Artificial Intelligence Studies in Computational Intelligence Volume 1025 SeriesEditor JanuszKacprzyk,PolishAcademyofSciences,Warsaw,Poland The series “Studies in Computational Intelligence” (SCI) publishes new develop- mentsandadvancesinthevariousareasofcomputationalintelligence—quicklyand withahighquality.Theintentistocoverthetheory,applications,anddesignmethods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms,evolutionarycomputation,artificialintelligence,cellularautomata,self- organizingsystems,softcomputing,fuzzysystems,andhybridintelligentsystems. Ofparticularvaluetoboththecontributorsandthereadershiparetheshortpublica- tiontimeframeandtheworld-widedistribution,whichenablebothwideandrapid disseminationofresearchoutput. IndexedbySCOPUS,DBLP,WTIFrankfurteG,zbMATH,SCImago. AllbookspublishedintheseriesaresubmittedforconsiderationinWebofScience. Moreinformationaboutthisseriesathttps://link.springer.com/bookseries/7092 · · Mohiuddin Ahmed Sheikh Rabiul Islam · · Adnan Anwar Nour Moustafa Al-Sakib Khan Pathan Editors Explainable Artificial Intelligence for Cyber Security Next Generation Artificial Intelligence Editors MohiuddinAhmed SheikhRabiulIslam SchoolofScience DepartmentofComputingSciences EdithCowanUniversity UniversityofHartford Joondalup,WA,Australia WestHartford,CT,USA AdnanAnwar NourMoustafa SchoolofIT SchoolofEngineeringandIT DeakinUniversity UNSWCanberra Melbourne,VIC,Australia Campbell,ACT,Australia Al-SakibKhanPathan DepartmentofComputerScience andEngineering UnitedInternationalUniversity(UIU) Dhaka,Bangladesh ISSN1860-949X ISSN1860-9503 (electronic) StudiesinComputationalIntelligence ISBN978-3-030-96629-4 ISBN978-3-030-96630-0 (eBook) https://doi.org/10.1007/978-3-030-96630-0 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNature SwitzerlandAG2022 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Dedicatedto MyLovingSon:ZaifRayan —MohiuddinAhmed Mystudiousdaughter:FarishaIslam —SheikhRabiulIslam Mydevotedfamily —AdnanAnwar Myfamily —NourMoustafa Myfamily —Al-SakibKhanPathan Preface Cyber security is a very complex and diverse discipline. Numerous technological problems need to be solved to make the world safer. It is evident that there is no sign of a decrease in cyber-crime; instead, it is the opposite in nature due to the unprecedentedtechnologicaladvancementandourrelianceonit.Thecybersecurity communityhasbeenleveragingartificialintelligence(AI)technologytosolveseveral complexcomputingproblems,e.g.,intrusiondetectionsystemstoidentifymalicious networkactivities.Inthepasttwodecades,therehavebeenhundredsofalgorithms developed capitalizing on the effectiveness of artificial intelligence. Therefore, we have observed the transition from classical artificial intelligence to deep learning, federatedlearning,reinforcementlearning,etc.Thesetechniqueshavebeencritical in providing solutions for cyber security problems. However, most recent variants of artificial intelligence-based methods are being treated as black-box ones. There is a lack of explanation that humans can easily understand the solution(s) offered. For example, a particular neural network that is perfect for identifying phishing attacks (i.e., the deception using email) is still obscure due to its complex internal workingmechanism.Hence,itisimportanttoexplorevariousavenuesofexplainable artificialintelligence(XAI),anemergingareaofartificialintelligence,toprovidea human-friendlydecisionforcybersecurityfromabroaderperspective. In this context, this book addresses the challenges associated with the explain- able artificial intelligence for cyber security by providing a bigger picture of the coreconcepts,intelligenttechniques,practices,andopenresearchdirectionsinthis area.Additionally,thebookwillserveasasinglesourceofreferenceforacquiring knowledge on the technology, process, and people involved in the next-generation artificialintelligenceandcybersecurity. vii viii Preface Chapters Chapter 1: The Past, Present, and Prospective Future of XAI: A Comprehensive Review Chapter2:AnOverviewofExplainableArtificialIntelligenceforCyberSecurity Chapter3:ArtificialIntelligence:PracticalandEthicalChallenges Chapter4:DomainKnowledge-AidedExplainableArtificialIntelligence Chapter5:MachineLearningBasedIDSforCyberattackClassification Chapter 6: Artificial Intelligence for Cyber Security: Performance Analysis of NetworkIntrusionDetection Chapter7:LeveragingArtificialIntelligenceCapabilitiesforReal-TimeMonitoring ofCybersecurityThreats Chapter8:NetworkForensicsintheEraofArtificialIntelligence Chapter9:Obfuscation-BasedMechanismsinLocation-BasedPrivacyProtection Chapter10:IntelligentRadioFrequencyFingerprintingtoIdentifyMaliciousTags intheInternetofThings Chapter11:ExplainableArtificialIntelligenceforSmartCityApplication:ASecure andTrustedPlatform Chapter12:ExplainableArtificialIntelligenceinSustainableSmartHealthcare Thebookreflectstheintersectionofartificialintelligenceandcybersecurity.Unlike other books on similar topics, the book focuses on the ‘explainability’ of cyber security applications. Chapter 1 showcases a holistic view of explainable artificial intelligence,Chapter2divesintocybersecurityusingartificialintelligence.Chapter3 highlightsethicalissuesassociatedwithartificialintelligence.Chapter4focuseson domain-knowledge aided explainability. Chapters 5–7 focus on network intrusion detection in depth. Chapter 8 includes insights on network forensics. Chapter 9 discussesprivacypreservationandChap.10highlightsmalicioustagsidentification fortheInternetofThings(IoT).Chapters11and12showcasedifferentapplications ofexplainableartificialintelligenceonsmartcitiesandhealthcaresystems. Joondalup,Australia MohiuddinAhmed WestHartford,USA SheikhRabiulIslam Melbourne,Australia AdnanAnwar Campbell,Australia NourMoustafa Dhaka,Bangladesh Al-SakibKhanPathan Acknowledgments It is another incredible book editing experience and our sincere gratitude to the publisher for facilitating the process. This book editing journey enhanced our patience, communication, and tenacity. We are thankful to all the contributors, reviewers,andpublishingteam.Lastbutnotleast,ourthankstoourfamilymembers whosesupportandencouragementcontributedsignificantlytocompletingthisbook. MohiuddinAhmed SheikhRabiulIslam AdnanAnwar NourMoustafa Al-SakibKhanPathan ix Contents 1 The Past, Present, and Prospective Future of XAI: AComprehensiveReview ...................................... 1 MuhammadUsamaIslam, Md.MozaharulMottalib, MehediHassan, ZubairIbneAlam, S.M.Zobaed, andMd.FazleRabby 2 AnOverviewofExplainableArtificialIntelligenceforCyber Security ...................................................... 31 HindKhoulimi,MohamedLahby,andOthmanBenammar 3 ArtificialIntelligence:PracticalandEthicalChallenges ........... 59 SophieRiceAuthorandLeandrosMaglaras 4 DomainKnowledge-AidedExplainableArtificialIntelligence ...... 73 SheikhRabiulIslamandWilliamEberle 5 MachineLearningBasedIDSforCyberattackClassification ...... 93 AndrewMayesandAdnanAnwar 6 Artificial Intelligence for Cyber Security: Performance AnalysisofNetworkIntrusionDetection ........................ 113 ShahriarUsmanKhan, FarihaEusufzai, Md.AzharuddinRedwan, MohiuddinAhmed, andSaifurRahmanSabuj 7 LeveragingArtificialIntelligenceCapabilitiesforReal-Time MonitoringofCybersecurityThreats ........................... 141 NicksonM.Karie, NorMasriBinSahri, WenchengYang, andMichaelN.Johnstone 8 NetworkForensicsintheEraofArtificialIntelligence ............ 171 WenchengYang, MichaelN.Johnstone, SongWang, NicksonM.Karie,NorMasribinSahri,andJamesJinKang xi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.