Explainable AI-Driven Zero-Trust Anomaly Detection for Encrypted Traffic

Team

Supervisors

Table of content

  1. Abstract
  2. Related works
  3. Methodology
  4. Experiment Setup and Implementation
  5. Results and Analysis
  6. Conclusion
  7. Publications
  8. Links

Abstract

Modern cybersecurity is shifting toward encryption to protect data privacy, but this often blinds traditional Intrusion Detection Systems (IDS) that rely on payload inspection. Concurrently, the rise of cloud computing and remote work has made perimeter-based security obsolete, leading to the adoption of Zero-Trust Architecture (ZTA), which requires continuous verification of every entity. While Deep Learning (DL) models can detect anomalies in encrypted traffic without decryption by analyzing metadata, their “black-box” nature creates a trust deficit that hinders automated policy enforcement. This project proposes a framework integrating Encrypted Traffic Analysis (ETA) with Explainable AI (XAI) using SHAP to provide real-time, human-readable rationales for security decisions.

Methodology

The proposed framework utilizes a multi-stage pipeline:

  1. Feature Extraction: Focuses on non-encrypted metadata including packet size, inter-arrival times, and TLS handshake parameters.

  2. Detection Model: Employs Deep Dictionary Learning enhanced with Decision Trees or Isolation Forests.

  3. XAI Integration: A SHAP-based engine provides real-time explanations for why a specific flow was flagged.

  4. Policy Enforcement: Decisions feed back into the ZTA Policy Engine to dynamically adjust access (e.g., throttle, block, or step-up authentication).

Experiment Setup and Implementation

⚠️ Status: Currently in Progress

Results and Analysis

Status: Pending (Expected Feb 2026)

Conclusion

This project identifies that XAI is the “missing piece” needed to make AI-based detection usable in automated Zero-Trust systems. By bridging the gap between detection, explanation, and automated policy creation, the framework aims to provide a practical solution for securing modern hidden data streams.

Publications

📝 Note: Documents will be linked as they become available.

  1. Perera, C., Wanasinghe, J., Wijewardhana, S. et al. “Explainable AI-Driven Zero Trust Anomaly Detection for Encrypted Traffic” (2025). (Not Published)