Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
ABSTRACT This survey presents a comprehensive review of current literature on Explainable Artificial
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of Internet-
connected systems and Artificial Intelligence in recent years, Artificial Intelligence including Machine
Learning (ML) and Deep Learning (DL) has been widely utilized in the fields of cyber security including
intrusion detection, malware detection, and spam filtering. However, although Artificial Intelligence-based
approaches for the detection and defense of cyber attacks and threats are more advanced and efficient
compared to the conventional signature-based and rule-based cyber security strategies, most ML-based
techniques and DL-based techniques are deployed in the ‘‘black-box’’ manner, meaning that security
experts and customers are unable to explain how such procedures reach particular conclusions. The
deficiencies of transparencies and interpretability of existing Artificial Intelligence techniques would
decrease human users’ confidence in the models utilized for the defense against cyber attacks, especially in
current situations where cyber attacks become increasingly diverse and complicated. Therefore, it is
essential to apply XAI in the establishment of cyber security models to create more explainable models
while maintaining high accuracy and allowing human users to comprehend, trust, and manage the next
generation of cyber defense mechanisms. Although there are papers reviewing Artificial Intelligence
applications in cyber security areas and the vast literature on applying XAI in many fields including
healthcare, financial services, and criminal justice, the surprising fact is that there are currently no survey
research articles that concentrate on XAI applications in cyber security. Therefore, the motivation behind
the survey is to bridge the research gap by presenting a detailed and up-to-date survey of XAI approaches
applicable to issues in the cyber security field. Our work is the first to propose a clear roadmap for
navigating the XAI literature in the context of applications in cyber security.
INDEX TERMS Artificial intelligence, cyber security, deep learning, explanation artificial intelligence,
intrusion detection, machine learning, malware detection, spam filtering.
Our Paper √ √ √ √ √ √ √ √ √ √ √
30 2022
FIGURE 1. Structure of this paper.
only AI applications in cyber security or XAI implemented in expansion. As a result, by 2026, the worldwide
other domains rather than focusing on cyber security. cybersecurity sector is anticipated to be worth 345.4
From Table 1, it is obvious that this survey is billion USD [39]. On the other hand, besides the
comprehensive and distinct in including the following conventional cyber attacks including malware, botnet, and
features in comparison to previously published survey spam, adversarial cyber security threats specifically
research in the field: summarizing commonly used cyber targeting AI models are Gradually emerging in recent
security datasets available, discussing popular XAI tools and years as well [24]. Therefore, the scope for the domain of
their applications in the cyber security area, analyzing the cyber security analyzed in this survey paper will be
XAI applications in defending different categories of cyber constituted in the following 3 sub-fields in conjunction
attacks, providing assessment measures for evaluating the with XAI:
performance of XAI models, giving descriptions on the 1) Different categories of the most prominent cyber
adversarial cyber attacks which XAI itself may suffer, and attacks including malware, Botnet, spam, fraud,
pointing out some key insights about applying XAI for cyber phishing, Cyber Physical Systems (CPSs) attacks,
security. network intrusion, Denial-of-service (DoS) attacks,
Man-in-the-middle (MITM) attacks, Domain
C. SCOPE OF CYBER SECURITY ANALYSED Generation Algorithms (DGAs), and Structured
In agreement with the International Organization for Query Language (SQL) injection attacks are
Standardization (ISO/IEC 27032) [37], cyber security is described in detail respectively. By doing so, the
defined as the privacy, integrity, and availability of terminologies of cyber attacks are clear and the
internet data. Cyber attacks are cybercriminal attacks defensive systems against these attacks are
undertaken using one or more computers against a single discussed in this paper as well.
or numerous computers or networks. A cyber assault can 2) Cyber security implementation in different
purposefully destroy systems, steal data, or utilize a industrial areas including smart grid, healthcare,
compromised computer as a launch pad for more attacks smart agriculture, smart transportation, Human-
[38]. Due to the wide spreading of cyber attacks and Computer Interaction(HCI), and smart financial
threats, the cyber security industries are seeing rapid
FIGURE 2. Research methodology flow chart.
system will be reviewed in this survey. This paper usage of XAI applications in cyber security.
provides a brief introduction of XAI for cyber 3) We discuss different categories of defensive
security in each domain respectively. applications of XAI against cyber attacks
3) While XAI is implemented in many different respectively, and we highlight the advantages and
scenarios to defend against cyber threats, XAI limitations to develop XAI-based cyber-defense
models will face adversarial attacks targeting XAI systems.
models as well. This survey will investigate cyber 4) We justify XAI for cyber security in different
security from this perspective as well. Adversarial industry scenarios.
threats targeting XAI, defense approaches against 5) We illustrate Adversarial cyber threats pointing to
these attacks, and the establishment of secure XAI XAI models are described whereas the defense
cyber systems will be interpreted respectively. approaches against these attacks.
6) We outline the outstanding issues and existing
D. CONTRIBUTIONS
challenges associated with the intersection of XAI
and cyber security, and we identify the key insights
This study extensively evaluates current breakthroughs and and future research directions for the XAI
state-of-the-art XAI-based solutions in a wide variety of applications in cyber security.
cyber security applications and cyber attack defensive
mechanisms to address the gaps and shortcomings mentioned
E. STRUCTURE OF THIS SURVEY
in earlier surveys. There is no previous survey available
As shown in Fig 1, this survey has been organized in such a
analyzing the state-of-art XAI applications in cyber security
systemically from the perspectives of both cyber attack way that the background information for the research being
defensive schemes and industrial applications. Our research's examined comes first. Section II introduces the methodology
contributions can be summarized in the following points: of research on this survey in the field of XAI applications in
cyber security. Section III discusses the general background
1) We rationalize the motivations for integrating XAI
of XAI, motivations, categorizations, and challenges of XAI
in AI-based cyber security models whereas the
are justified in this section. The section after that (Section IV)
basic background on XAI is presented.
is organized based on the XAI framework and available
2) We provide a thorough summary as well as a quick datasets for cyber security. Section V will be devoted to a
overview of the datasets that are accessible for the
comprehensive discussion of XAI applications in cyber research state-of-art in the areas of XAI applications in cyber
security from different perspectives. The existing challenges, security. Therefore, to collect the research articles reviewed,
key insights, and future directions of this area are highlighted the following criteria were established:
in Section VI, which is followed by the conclusion. And the 1) A thorough search was carried out whereas
conclusion would be the last section, which is Section VII. different academic search engines illustrated in
Table 2 were utilized to collect the relevant
TABLE 2. Research searching database engines.
papers.
2) The searching keywords for this survey paper were
Searching Engines Database Address constituted as 2 aspects: “XAI” and “Cyber
Security”. To create the search string, all potential
Springer https://link.springer.com/
Taylor & Francis https://taylorandfrancis.com/ pertinent synonyms of the given terms were
Semantic Scholar https://www.semanticscholar.org/ discovered in different databases and the percentage
ACM Digital Library https://dl.acm.org/ of reviewed papers from sources was depicted in
ResearchGate https://www.researchgate.net/
Figure 3. The following synonyms may be pertinent
Google Scholar https://scholar.google.com/
IEEE Xplore https://ieeexplore.ieee.org to the subject: “Cyber Security”, “Cyber Physical”,
Elsevier https://www.elsevier.com/ “Cyber Attack”, “Cyber Threat”, Network Security”,
Research Rabbit https://researchrabbitapp.com/ “Cyber Crime”, “XAI”, “Explainable Artificial
Intelligence”, “Interpretable Artificial Intelligence”,
“Explainable ML (XML)”, and “Transparent
Artificial Intelligence”.
3) Only researches published between 2011 and 2022
were selected to report on the most recent trends in
the application of XAI techniques in cyber security
for this research. Besides, papers published after
2017 were given higher attention and occupied a
large proportion of all reviewed publications, as
shown in Figure 4.
4) Only publications written in the English language
were included in this review and duplicated studies
were excluded.
5) Only papers objecting to cyber security vulnerability
domains were reviewed in this survey paper whereas
FIGURE 3. Percentage of Reviewed Papers from Sources.
researches proposing ML-based systems, DL-based
systems, XAI-based mechanisms, and AI-based
mechanisms would be extracted.
The procedure of choosing articles was instantaneous and
consisted of two steps: firstly, the searching results were
initially chosen based on the selection criteria by scanning
the publications' titles and abstracts; secondly, the documents
chosen in the initial phase were thoroughly read to create a
shortlist of articles published that would be chosen based on
the inclusion and exclusion criteria.