JOURNAL ARTICLE

Novel Actionable Counterfactual Explanations for Intrusion Detection Using Diffusion Models

Vinura GalwadugeJagath Samarabandu

Year: 2025 Journal:   Journal of Cybersecurity and Privacy Vol: 5 (3)Pages: 68-68   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

Modern network intrusion detection systems (NIDSs) rely on complex deep learning models. However, the “black-box” nature of deep learning methods hinders transparency and trust in predictions, preventing the timely implementation of countermeasures against intrusion attacks. Although explainable AI (XAI) methods provide a solution to this problem by providing insights into the reasons behind the predictions, the explanations provided by the majority of them cannot be trivially converted into actionable countermeasures. In this work, we propose a novel tabular diffusion-based counterfactual explanation framework that can provide actionable explanations for network intrusion attacks. We evaluated our proposed algorithm against several other publicly available counterfactual explanation algorithms on three modern network intrusion datasets. To the best of our knowledge, this work also presents the first comparative analysis of the existing counterfactual explanation algorithms within the context of NIDSs. Our proposed method provides plausible and diverse counterfactual explanations more efficiently than the tested counterfactual algorithms, reducing the time required to generate explanations. We also demonstrate how the proposed method can provide actionable explanations for NIDSs by summarizing them into a set of actionable global counterfactual rules, which effectively filter out incoming attack queries. This ability of the rules is crucial for efficient intrusion detection and defense mechanisms. We have made our implementation publicly available on GitHub.

Keywords:
Counterfactual thinking Computer science Diffusion Intrusion detection system Intrusion Data mining Artificial intelligence Psychology Geology Social psychology Physics

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
39
Refs
0.38
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
Topic Modeling
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Diffusion Models for Counterfactual Explanations

Guillaume JeanneretLoïc SimonFrédéric Jurie

Journal:   Computer Vision and Image Understanding Year: 2024 Vol: 249 Pages: 104207-104207
BOOK-CHAPTER

Diffusion Models for Counterfactual Explanations

Guillaume JeanneretLoïc SimonFrédéric Jurie

Lecture notes in computer science Year: 2023 Pages: 219-237
BOOK-CHAPTER

Latent Diffusion Counterfactual Explanations

Simon SchrodiKarim FaridMax ArgusThomas Brox

Lecture notes in computer science Year: 2025 Pages: 295-311
© 2026 ScienceGate Book Chapters — All rights reserved.