Contrastive Learning and Data Augmentation in Traffic Classification Using a Flowpic Input Representation

A Finamore, C Wang, J Krolikowski, JM Navarro… - arXiv preprint arXiv …, 2023 - arxiv.org
Over the last years we witnessed a renewed interest towards Traffic Classification (TC)
captivated by the rise of Deep Learning (DL). Yet, the vast majority of TC literature lacks …

Designing Traffic Monitoring Systems for Self-Driving Networks

C Misa - ACM SIGMETRICS Performance Evaluation Review, 2023 - dl.acm.org
Traffic monitoring is a critical component of self-driving networks. In particular, any system
that seeks to automatically manage a network's operation must first be equipped with …

Towards Future-Based Explanations for Deep RL Network Controllers

S Patel, S Abdu Jyothi, N Narodytska - ACM SIGMETRICS Performance …, 2023 - dl.acm.org
Lack of explainability is hindering the practical adoption of high-performance Deep
Reinforcement Learning (DRL) controllers. Prior work focused on explaining the controller …

Using Explainable AI for Neural Network-Based Network Attack Detection

Q Zou, L Zhang, X Sun, A Singhal, P Liu - Computer, 2024 - ieeexplore.ieee.org
Neural network (NN)-based network intrusion detection systems (NIDSs) are becoming
popular these days due to their notable advantages. This article reviews the current …

On Detecting Biased Predictions with Post-hoc Explanation Methods

M Ruggeri, A Dethise, M Canini - … of the 2023 on Explainable and Safety …, 2023 - dl.acm.org
We develop a methodology for the analysis of machine learning (ML) models to detect and
understand biased decisions and apply it to two specific scenarios. In particular, we show …

A Framework for Intelligent Generation of Intrusion Detection Rules Based on Grad-CAM

X Wang, H Bao, W Li, H Chen, W Wang… - … on Computational Science, 2024 - Springer
Intrusion detection systems (IDS) play a critical role in protecting networks from cyber
threats. Currently, intrusion detection methods based on artificial intelligen (AI) stand as the …

CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection

S Lee, YS Chen, SW Shieh - 2023 IEEE Conference on …, 2023 - ieeexplore.ieee.org
Advanced Persistence Threats (APTs) have become one of the major threats to enterprise
security. In the past three years, over 70% of APT campaigns involved Data Exfiltration for …

[PDF][PDF] Bridging the Explanation Gap in AI Security: A Task-Driven Approach to XAI Methods Evaluation.

O Lukás, S García - ICAART (3), 2024 - scitepress.org
Deciding which XAI technique is best depends not only on the domain, but also on the given
task, the dataset used, the model being explained, and the target goal of that model. We …

Enabling Self-Driving Networks with Machine Learning

AS Jacobs, RA Ferreira… - NOMS 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
This work aims to enable self-driving networks by tackling the lack of trust that network
operators have in Machine Learning (ML) models. We assess and scrutinize the decision …

Inferring Visibility of Internet Traffic Matrices Using eXplainable AI

C Zilli, A Sacco, D Monaco, O Okafor… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
A large fraction of recent network management tasks rely on Internet traffic matrices, ranging
from planning and troubleshooting to routing and anomaly detection. Despite extensive …