skip to main content
10.1145/3579856.3592829acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity

Published:10 July 2023Publication History

ABSTRACT

We have developed a novel ’Teacher-Student with human feedback’ model for Human-Artificial Intelligence (AI) collaborations in cybersecurity tasks. In our model, AI furnishes sufficient information about its decision-making process to enable human agents to provide feedback to improve the model. Our key innovations include: enhancing the interpretability of AI models by analyzing falsely detected samples using LIME and SHAP values; developing a novel posthoc explanation-based dynamic teacher-student model to address concept drift or concept shift; integrating human experts’ feedback on falsely detected samples to increase accuracy, precision, and recall values, without retraining the entire model; establishing a list of attack-based feature values for human experts to promote reproducibility. We show in experiments with real data and threat detection tasks that our model significantly improves the accuracy of existing AI algorithms for these tasks.

References

  1. Sabrina Caldwell, Penny Sweetser, Nicholas O’Donnell, Matthew J Knight, Matthew Aitchison, Tom Gedeon, Daniel Johnson, Margot Brereton, Marcus Gallagher, and David Conroy. 2022. An Agile New Research Framework for Hybrid Human-AI Teaming: Trust, Transparency, and Transferability. ACM Transactions on Interactive Intelligent Systems (TiiS) 12, 3 (2022), 1–36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Tristan Carrier, Princy Victor, Ali Tekeoglu, and Arash Habibi Lashkari. 2022. Detecting Obfuscated Malware using Memory Feature Engineering.. In 8th International Conference on Information Systems Security and Privacy (ICISSP 2022). Science and Technology Publications, Lda., 177–188.Google ScholarGoogle ScholarCross RefCross Ref
  3. Kamaluddeen Usman Danyaro, Haizatul Hafizah Hussain, Mujaheed Abdullahi, MS Liew, Lim Eu Shawn, and Mustapha Yusuf Abubakar. 2022. Development and Integration of Metocean Data Interoperability for Intelligent Operations and Automation Using Machine Learning: A Review. Applied Sciences 12, 11 (2022), 5690.Google ScholarGoogle ScholarCross RefCross Ref
  4. Ilhan Firat Kilincer, Fatih Ertam, and Abdulkadir Sengur. 2021. Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Computer Networks 188 (2021), 107840.Google ScholarGoogle ScholarCross RefCross Ref
  5. Samaneh Mahdavifar, Dima Alhadidi, and Ali A Ghorbani. 2022. Effective and efficient hybrid android malware classification using pseudo-label stacked auto-encoder. Journal of network and systems management 30 (2022), 1–34.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jacob Nilsson, Fredrik Sandin, and Jerker Delsing. 2019. Interoperability and machine-to-machine translation model with mappings to machine learning tasks. In 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), Vol. 1. IEEE, 284–289.Google ScholarGoogle ScholarCross RefCross Ref
  7. Yanou Ramon, David Martens, Foster Provost, and Theodoros Evgeniou. 2020. A comparison of instance-level counterfactual explanation algorithms for behavioral and textual data: SEDC, LIME-C and SHAP-C. Advances in Data Analysis and Classification 14 (2020), 801–819.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Sagar Samtani, Murat Kantarcioglu, and Hsinchun Chen. 2020. Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap., 19 pages.Google ScholarGoogle Scholar
  9. Dylan Slack, Sophie Hilgard, Emily Jia, Sameer Singh, and Himabindu Lakkaraju. 2020. Fooling lime and shap: Adversarial attacks on post hoc explanation methods. In Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 180–186.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
    July 2023
    1066 pages
    ISBN:9798400700989
    DOI:10.1145/3579856

    Copyright © 2023 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 July 2023

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate418of2,322submissions,18%
  • Article Metrics

    • Downloads (Last 12 months)109
    • Downloads (Last 6 weeks)15

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format