菜单

关于 🐙 GitHub
arXiv 提交日期: 2026-04-20
📄 Abstract - Enhancing Anomaly-Based Intrusion Detection Systems with Process Mining

Anomaly-based Intrusion Detection Systems (IDSs) ensure protection against malicious attacks on networked systems. While deep learning-based IDSs achieve effective performance, their limited trustworthiness due to black-box architectures remains a critical constraint. Despite existing explainable techniques offering insight into the alarms raised by IDSs, they lack process-based explanations grounded in packet-level sequencing analysis. In this paper, we propose a method that employs process mining techniques to enhance anomaly-based IDSs by providing process-based alarm severity ratings and explanations for alerts. Our method prioritizes critical alerts and maintains visibility into network behavior, while minimizing disruption by allowing misclassified benign traffic to pass. We apply the method to the publicly available USB-IDS-TC dataset, which includes anomalous traffic affected by different variants of the Slowloris DoS attack. Results show that our method is able to discriminate between low- to very-high-severity alarms while preserving up to 99.94% recall and 99.99% precision, effectively discarding false positives while providing different degrees of severity for the true positives.

顶级标签: systems machine learning model evaluation
详细标签: intrusion detection process mining anomaly detection explainable ai network security 或 搜索:

利用过程挖掘技术增强基于异常的入侵检测系统 / Enhancing Anomaly-Based Intrusion Detection Systems with Process Mining


1️⃣ 一句话总结

这篇论文提出了一种新方法,通过分析网络数据包的顺序流程来给入侵警报分级和解释,从而让基于人工智能的入侵检测系统变得更可信、更实用,在保持高检测率的同时有效过滤误报。

源自 arXiv: 2604.18066