Published August 9, 2025 | Version v1
Conference proceeding Open

SHAP Insights Into Domain Adaptation in Netflow-based Network Intrusion Detection powered by Deep Learning [preprint]

Description

The wide adoption of supervised‐learning–based network intrusion detection systems is hindered by their reliance on labelled traffic, which is costly to obtain in real-world scenarios. In this work, five unsupervised domain adaptation methods are evaluated in an attempt to alleviate this problem. First, the severity of source-target divergence is quantified on two benchmark datasets(CICIDS2018 and UNSW-NB15 netflow datasets) using Maximum Mean Discrepancy, per-feature Wasserstein distances, and Kolmogorov–Smirnov tests. Next, a common neural‐network backbone is trained on the source, and each DA method is used to attempt to bridge the source - target domain gap. Finally, SHAP is used to compare feature‐importance patterns before and after adaptation, to assess the DA effect on model decision logic. The results demonstrate that conventional DA methods fail to deliver robust cross‐domain NIDS.

---

Disclaimer:

This is a preprint version of the article.

The content here is for view-only purposes. This is not the final published version and may differ from the version of record.

Please refer to the official version for citation and authoritative use.

Files

SHAP Insights Into Domain Adaptation.pdf

Files (1.7 MB)

Name Size Download all
md5:8fdac7e1620715281797cd8169285a5e
1.7 MB Preview Download

Additional details

Funding

European Commission
AI4CYBER - Trustworthy Artificial Intelligence for Cybersecurity Reinforcement and System Resilience 101070450

Dates

Available
2025