The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Explainable AI for Cybersecurity
|
Author(s): Siva Raja Sindiramutty (Taylor's University, Malaysia), Chong Eng Tan (Universiti Malaysia Sarawak, Malaysia), Sei Ping Lau (Universiti Malaysia Sarawak, Malaysia), Rajan Thangaveloo (University Malaysia Sarawak, Malaysia), Abdalla Hassan Gharib (Zanzibar University, Tanzania), Amaranadha Reddy Manchuri (Kyungpook National University, South Korea), Navid Ali Khan (Taylor's University, Malaysia), Wee Jing Tee (Taylor's University, Malaysia)and Lalitha Muniandy (Tunku Abdul Rahman University of Management and Technology, Malaysia)
Copyright: 2024
Pages: 67
Source title:
Advances in Explainable AI Applications for Smart Cities
Source Author(s)/Editor(s): Mangesh M. Ghonge (Sandip Institute of Technology and Research Centre, India), Nijalingappa Pradeep (Bapuji Institute of Engineering and Technology, India), Noor Zaman Jhanjhi (School of Computer Science, Faculty of Innovation and Technology, Taylor’s University, Malaysia)and Praveen M. Kulkarni (Karnatak Law Society's Institute of Management Education and Research (KLS IMER), Belagavi, India)
DOI: 10.4018/978-1-6684-6361-1.ch002
Purchase
|
Abstract
In recent years, the utilization of AI in the field of cybersecurity has become more widespread. Black-box AI models pose a significant challenge in terms of interpretability and transparency, which is one of the major drawbacks of AI-based systems. This chapter explores explainable AI (XAI) techniques as a solution to these challenges and discusses their application in cybersecurity. The chapter begins with an explanation of AI in cybersecurity, including the types of AI commonly utilized, such as DL, ML, and NLP, and their applications in cybersecurity, such as intrusion detection, malware analysis, and vulnerability assessment. The chapter then highlights the challenges with black-box AI, including difficulty identifying and resolving errors, the lack of transparency, and the inability to understand the decision-making process. The chapter then delves into XAI techniques for cybersecurity solutions, including interpretable machine-learning models, rule-based systems, and model explanation techniques.
Related Content
Azeem Khan, Noor Zaman Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar.
© 2024.
30 pages.
|
Siva Raja Sindiramutty, Chong Eng Tan, Sei Ping Lau, Rajan Thangaveloo, Abdalla Hassan Gharib, Amaranadha Reddy Manchuri, Navid Ali Khan, Wee Jing Tee, Lalitha Muniandy.
© 2024.
67 pages.
|
Ruchi Doshi, Kamal Kant Hiran.
© 2024.
16 pages.
|
N. Ambika.
© 2024.
9 pages.
|
Siva Raja Sindiramutty, Wee Jing Tee, Sumathi Balakrishnan, Sukhminder Kaur, Rajan Thangaveloo, Husin Jazri, Navid Ali Khan, Abdalla Gharib, Amaranadha Reddy Manchuri.
© 2024.
54 pages.
|
Azeem Khan, NZ Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar.
© 2024.
22 pages.
|
Azeem Khan, Noor Zaman Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar.
© 2024.
36 pages.
|
|
|