Ridge regression.
5 CONCLUSION
In this article, we presented a novel model-agnostic
explainable AI method, PhilaeX, that is featured by
the features selection strategy and more suitable to
explain the AI models used in cyber security tasks.
The explanation is in the form of features attribution
for machine learning classifiers. This method has a
multi-stage feature selection function that identifies
the candidate features to be explained: (1) the core
features to find the features that lead the model to
make a borderline prediction; (2) the features with
positive individual contributions towards the model’s
prediction on the original sample to restrict the ex-
plainer to focus on important features’ attribution,
which is helpful in revealing the model’s behavior in
a more accurate way; and (3) the Ridge regression
model as the surrogate model quantifies the contri-
butions of these features, considering the joint con-
tributions made by them. The explanation fidelity
of the proposed method is evaluated by two experi-
ments. The first experiment aims to find the activated
features from the adversarial sample of Android mal-
ware, through the attribution values (positive values)
by PhilaeX. The results shows PhilaeX has higher ca-
pability of the identification on such activated fea-
tures than those by LIME, SHAP and MPT Explainer.
The second experiment consists of two fidelity tests,
which are the deduction test and augmentation test.
In the deduction test, PhilaeX has significantly higher
fidelity explanations than that of the MPT explainer.
The augmentation test reveals that PhilaeX has higher
PCRs when a small number of features used. Both
experiments results show that PhilaeX can be helpful
for explanation of the AI models, such as those used
in the cyber security field.
REFERENCES
Amerini, I., Galteri, L., Caldelli, R., and Del Bimbo, A.
(2019). Deepfake video detection through optical flow
based cnn. In Proceedings of the IEEE/CVF Inter-
national Conference on Computer Vision Workshops,
pages 0–0.
Apruzzese, G., Andreolini, M., Colajanni, M., and
Marchetti, M. (2020). Hardening random forest cy-
ber detectors against adversarial attacks. IEEE Trans-
actions on Emerging Topics in Computational Intelli-
gence, 4(4):427–439.
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H.,
Rieck, K., and Siemens, C. (2014). Drebin: Effec-
tive and explainable detection of android malware in
your pocket. In Ndss, volume 14, pages 23–26.
Demontis, A., Melis, M., Biggio, B., Maiorca, D., Arp,
D., Rieck, K., Corona, I., Giacinto, G., and Roli, F.
(2017). Yes, machine learning can be more secure! a
case study on android malware detection. IEEE Trans-
actions on Dependable and Secure Computing.
Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K.
(2018). Bert: Pre-training of deep bidirectional trans-
formers for language understanding. arXiv preprint
arXiv:1810.04805.
Do
ˇ
silovi
´
c, F. K., Br
ˇ
ci
´
c, M., and Hlupi
´
c, N. (2018). Ex-
plainable artificial intelligence: A survey. In 2018 41st
International convention on information and commu-
nication technology, electronics and microelectronics
(MIPRO), pages 0210–0215. IEEE.
Efron, B., Hastie, T., Johnstone, I., Tibshirani, R., et al.
(2004). Least angle regression. The Annals of statis-
tics, 32(2):407–499.
G
¨
uera, D. and Delp, E. J. (2018). Deepfake video detection
using recurrent neural networks. In 2018 15th IEEE
international conference on advanced video and sig-
nal based surveillance (AVSS), pages 1–6. IEEE.
Guo, W., Mu, D., Xu, J., Su, P., Wang, G., and Xing, X.
(2018). Lemna: Explaining deep learning based se-
curity applications. In Proceedings of the 2018 ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 364–379.
Hilt, D. E. and Seegrist, D. W. (1977). Ridge, a computer
program for calculating ridge regression estimates,
volume 236. Department of Agriculture, Forest Ser-
vice, Northeastern Forest Experiment . . . .
Jha, A., Aicher, J. K., Gazzara, M. R., Singh, D., and
Barash, Y. (2020). Enhanced integrated gradients: im-
proving interpretability of deep learning models us-
ing splicing codes as a case study. Genome biology,
21(1):1–22.
Kami
´
nski, B., Jakubczyk, M., and Szufel, P. (2018). A
framework for sensitivity analysis of decision trees.
Central European journal of operations research,
26(1):135–159.
Khalili, A. and Chen, J. (2007). Variable selection in finite
mixture of regression models. Journal of the american
Statistical association, 102(479):1025–1038.
Li, W., Ge, J., and Dai, G. (2015). Detecting malware for
android platform: An svm-based approach. In 2015
IEEE 2nd International Conference on Cyber Security
and Cloud Computing, pages 464–469. IEEE.
Liu, X., Du, X., Zhang, X., Zhu, Q., Wang, H., and Guizani,
M. (2019). Adversarial samples on android malware
detection systems for iot systems. Sensors, 19(4):974.
Lu, Z. and Thing, V. L. (2021). “How does it de-
tect a malicious app?” explaining the predictions of
ai-based android malware detector. arXiv preprint
arXiv:2111.05108.
Lundberg, S. M. and Lee, S.-I. (2017). A unified ap-
proach to interpreting model predictions. In Guyon, I.,
Luxburg, U. V., Bengio, S., Wallach, H., Fergus, R.,
Vishwanathan, S., and Garnett, R., editors, Advances
PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection
45