Research Article
Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model
Table 2
Description of top ten features used in a decision tree.
| Sr. No. | Features | Description | Type | Label |
| V23 | Count | Number of connections to the same host as the current connection in the past two seconds | Continuous | T | V3 | Service | Network service on the destination, e.g., telnet | Discrete | B | V6 | Flag | Normal or error status of the connection | Discrete | B | V12 | Logged_in | 1 if successfully logged in; 0 otherwise | Discrete | C | V32 | Dst_host_count | % of connections that have continuous H “SYN” errors | Continuous | H | V24 | Serror_rate | % of connections that have continuous H “SYN” errors | Continuous | H | V37 | dst_host_ srv_diff_host_rate | The percentage of connection that has different destination machine | Discrete | H | V2 | Protocol_type | Type of the protocol, e.g., TCP and UDP | Discrete | C | V5 | dst_bytes | Number of data bytes from destination to source | Continuous | C | V39 | dst_host_srv_serror_rate | Server error rate | Continuous | H |
|
|