Research Article
Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model
Table 1
Types of attack in the datasets.
| Types of attack | Examples | Quantity | Proportion (%) |
| Denial of service (DoS) | smurf, apache2, pod, etc. | 229,853 | 73.90 | Remote-to-local (R2L) | imap, worm, phf, etc. | 16,189 | 5.2 | User to root (U2R) | perl, rootkit, and so on | 228 | 0.07 | PROBING | nmap, portsweep, etc. | 4,166 | 1.34 | Normal | Usual traffic patterns | 60,593 | 19.48 |
|
|