IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Explainable AI for Cybersecurity

Explainable AI for Cybersecurity
View Sample PDF
Author(s): Siva Raja Sindiramutty (Taylor's University, Malaysia), Chong Eng Tan (Universiti Malaysia Sarawak, Malaysia), Sei Ping Lau (Universiti Malaysia Sarawak, Malaysia), Rajan Thangaveloo (University Malaysia Sarawak, Malaysia), Abdalla Hassan Gharib (Zanzibar University, Tanzania), Amaranadha Reddy Manchuri (Kyungpook National University, South Korea), Navid Ali Khan (Taylor's University, Malaysia), Wee Jing Tee (Taylor's University, Malaysia)and Lalitha Muniandy (Tunku Abdul Rahman University of Management and Technology, Malaysia)
Copyright: 2024
Pages: 67
Source title: Advances in Explainable AI Applications for Smart Cities
Source Author(s)/Editor(s): Mangesh M. Ghonge (Sandip Institute of Technology and Research Centre, India), Nijalingappa Pradeep (Bapuji Institute of Engineering and Technology, India), Noor Zaman Jhanjhi (School of Computer Science, Faculty of Innovation and Technology, Taylor’s University, Malaysia)and Praveen M. Kulkarni (Karnatak Law Society's Institute of Management Education and Research (KLS IMER), Belagavi, India)
DOI: 10.4018/978-1-6684-6361-1.ch002

Purchase

View Explainable AI for Cybersecurity on the publisher's website for pricing and purchasing information.

Abstract

In recent years, the utilization of AI in the field of cybersecurity has become more widespread. Black-box AI models pose a significant challenge in terms of interpretability and transparency, which is one of the major drawbacks of AI-based systems. This chapter explores explainable AI (XAI) techniques as a solution to these challenges and discusses their application in cybersecurity. The chapter begins with an explanation of AI in cybersecurity, including the types of AI commonly utilized, such as DL, ML, and NLP, and their applications in cybersecurity, such as intrusion detection, malware analysis, and vulnerability assessment. The chapter then highlights the challenges with black-box AI, including difficulty identifying and resolving errors, the lack of transparency, and the inability to understand the decision-making process. The chapter then delves into XAI techniques for cybersecurity solutions, including interpretable machine-learning models, rule-based systems, and model explanation techniques.

Related Content

Azeem Khan, Noor Zaman Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar. © 2024. 30 pages.
Siva Raja Sindiramutty, Chong Eng Tan, Sei Ping Lau, Rajan Thangaveloo, Abdalla Hassan Gharib, Amaranadha Reddy Manchuri, Navid Ali Khan, Wee Jing Tee, Lalitha Muniandy. © 2024. 67 pages.
Ruchi Doshi, Kamal Kant Hiran. © 2024. 16 pages.
N. Ambika. © 2024. 9 pages.
Siva Raja Sindiramutty, Wee Jing Tee, Sumathi Balakrishnan, Sukhminder Kaur, Rajan Thangaveloo, Husin Jazri, Navid Ali Khan, Abdalla Gharib, Amaranadha Reddy Manchuri. © 2024. 54 pages.
Azeem Khan, NZ Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar. © 2024. 22 pages.
Azeem Khan, Noor Zaman Jhanjhi, Dayang Hajah Tiawa Binti Awang Haji Hamid, Haji Abdul Hafidz bin Haji Omar. © 2024. 36 pages.
Body Bottom