Federated Learning-based Intrusion Detection Framework for Internet of Things and Edge Computing backed Critical Infrastructure

被引:2
作者
Meng, Ruofei [1 ]
Shah, Awais Aziz [1 ]
Jamshed, Muhammad Ali [2 ]
Pezaros, Dimitrios [1 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland
[2] Univ Glasgow, Coll Sci & Engn, Glasgow G12 8QQ, Lanark, Scotland
来源
2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024 | 2024年
关键词
Intrusion detection; Federated Learning (FL); Machine Learning (ML); Critical Infrastructure (CI); Internet of Things (IoT); edge computing;
D O I
10.1109/ICCWORKSHOPS59551.2024.10615814
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern Critical Infrastructure (CI) sectors including Smart Girds operate on the Internet of Things and edge computing paradigm. With the enormous growth of these sectors, there are emerging and escalating cyber threats. Traditional Machine Mearning (ML) approaches strive to provide a certain level of resilience against cyber threats but at the cost of privacy leading towards a single point of vulnerability. Following an exhaustive analysis of traditional ML algorithms and cyber threats to the CI, this work introduces a privacy-preserving Federated Learning (FL) driven intrusion detection framework to identify cyber threats focusing on the use case of Smart Grids within the CI. This paper firstly implements and compares various traditional ML algorithms such as Support Vector Machine, Random Forest, and Logistic Regression which works on a centeralised dataset. Secondly, an analysis has been carried out using the proposed FL-based approach to further improve security and privacy along with minimising the need for centralised dataset. Experimental results highlight that our traditional RF-based approach and FL-based approach achieve high intrusion detection accuracy. However, FL has more significant advantages in distributed and privacy-sensitive environments, protecting privacy and reducing the need for data centralisation.
引用
收藏
页码:810 / 815
页数:6
相关论文
共 21 条
[1]   A New Ensemble-Based Intrusion Detection System for Internet of Things [J].
Abbas, Adeel ;
Khan, Muazzam A. ;
Latif, Shahid ;
Ajaz, Maria ;
Shah, Awais Aziz ;
Ahmad, Jawad .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :1805-1819
[2]  
Aksu Dogukan, 2018, Computer and Information Sciences: 32nd International Symposium, ISCIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018. Communications in Computer and Information Science (935), P141, DOI 10.1007/978-3-030-00840-6_16
[3]   Data quality-aware task offloading in Mobile Edge Computing: An Optimal Stopping Theory approach [J].
Alghamdi, Ibrahim ;
Anagnostopoulos, Christos ;
Pezaros, Dimitrios P. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 117 :462-479
[4]   A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization [J].
Ali, Mohammed Hasan ;
Al Mohammed, Bahaa Abbas Dawood ;
Ismail, Alyani ;
Zolkipli, Mohamad Fadli .
IEEE ACCESS, 2018, 6 :20255-20261
[5]  
Ayed M.A., 2021, 2021 INT S NETW COMP, P1
[6]  
Bologna S., 2022, Handbook of Security Science, P1159
[7]  
Chandy S. E., 2018, Cyberattack Detection using Deep Generative Models with Variational Inference
[8]   On the Latency Benefits of Edge NFV [J].
Cziva, Richard ;
Pezaros, Dimitrios P. .
2017 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2017, :105-106
[9]   Container Network Functions: Bringing NFV to the Network Edge [J].
Cziva, Richard ;
Pezaros, Dimitrios P. .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (06) :24-31
[10]  
Freeze D., 2022, Cybercrime To Cost The World 8 Trillion Annually