Research Article

Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model

Table 2

Description of top ten features used in a decision tree.

Sr. No.FeaturesDescriptionTypeLabel

V23CountNumber of connections to the same host as the current connection in the past two secondsContinuousT
V3ServiceNetwork service on the destination, e.g., telnetDiscreteB
V6FlagNormal or error status of the connectionDiscreteB
V12Logged_in1 if successfully logged in; 0 otherwiseDiscreteC
V32Dst_host_count% of connections that have continuous H “SYN” errorsContinuousH
V24Serror_rate% of connections that have continuous H “SYN” errorsContinuousH
V37dst_host_ srv_diff_host_rateThe percentage of connection that has different destination machineDiscreteH
V2Protocol_typeType of the protocol, e.g., TCP and UDPDiscreteC
V5dst_bytesNumber of data bytes from destination to sourceContinuousC
V39dst_host_srv_serror_rateServer error rateContinuousH