Privacy-Preserving Defense: Intrusion Detection in IoT using Federated Learning

被引:2
作者
Almeida, Leonardo [1 ]
Rodrigues, Pedro [1 ]
Teixeira, Rafael [1 ]
Antunes, Mario [1 ,2 ]
Aguiar, Rui L. [1 ,2 ]
机构
[1] Univ Aveiro, Inst Telecomunicacoes, Aveiro, Portugal
[2] Univ Aveiro, DETI, Aveiro, Portugal
来源
2024 IEEE 22ND MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, MELECON 2024 | 2024年
关键词
IoT Security; Intrusion Detection Systems; Machine Learning; Neural Networks; Federated Learning; Decentralized Security;
D O I
10.1109/MELECON56669.2024.10608461
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) presents unprecedented challenges in network security due to its vast deployment and resource limitations. Addressing these challenges requires robust Intrusion Detection Systems (IDS) capable of detecting and mitigating potential threats effectively. In this study, we explore the efficacy of Federated Learning (FL) in training IDS models while ensuring data privacy in IoT scenarios. We leverage three state-of-the-art datasets to evaluate FL-based training approaches with varying numbers of workers. Our experiments demonstrate that FL-based training yields comparable performance to traditional single training methods across multiple performance metrics. Additionally, FL training exhibits faster convergence times, highlighting its efficiency and scalability for training IDS models in IoT environments. These findings underscore the potential of FL as a privacy-preserving technique for enhancing network security in IoT deployments.
引用
收藏
页码:908 / 913
页数:6
相关论文
共 26 条
[1]  
Alkhalifah T., 2021, Mlreal: Bridging the gap between training on synthetic data and real data applications in machine learning
[2]   A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method [J].
Balyan, Amit Kumar ;
Ahuja, Sachin ;
Lilhore, Umesh Kumar ;
Sharma, Sanjeev Kumar ;
Manoharan, Poongodi ;
Algarni, Abeer D. ;
Elmannai, Hela ;
Raahemifar, Kaamran .
SENSORS, 2022, 22 (16)
[3]   ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets [J].
Booij, Tim M. ;
Chiscop, Irina ;
Meeuwissen, Erik ;
Moustafa, Nour ;
den Hartog, Frank T. H. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) :485-496
[4]   Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity [J].
Dini, Pierpaolo ;
Elhanashi, Abdussalam ;
Begni, Andrea ;
Saponara, Sergio ;
Zheng, Qinghe ;
Gasmi, Kaouther .
APPLIED SCIENCES-BASEL, 2023, 13 (13)
[5]  
Fan Wei Lee Wenke Prodromidis Andreas Stolfo., 1999, UCI Machine Learning Repository, DOI DOI 10.24432/C51C7N
[6]   An effective intrusion detection approach using SVM with naive Bayes feature embedding [J].
Gu, Jie ;
Lu, Shan .
COMPUTERS & SECURITY, 2021, 103
[7]   A hybrid deep learning model for efficient intrusion detection in big data environment [J].
Hassan, Mohammad Mehedi ;
Gumaei, Abdu ;
Alsanad, Ahmed ;
Alrubaian, Majed ;
Fortino, Giancarlo .
INFORMATION SCIENCES, 2020, 513 :386-396
[8]   A bidirectional LSTM deep learning approach for intrusion detection [J].
Imrana, Yakubu ;
Xiang, Yanping ;
Ali, Liaqat ;
Abdul-Rauf, Zaharawu .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 185 (185)
[9]   Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network [J].
Jiang, Kaiyuan ;
Wang, Wenya ;
Wang, Aili ;
Wu, Haibin .
IEEE ACCESS, 2020, 8 :32464-32476
[10]   A deep learning method with wrapper based feature extraction for wireless intrusion detection system [J].
Kasongo, Sydney Mambwe ;
Sun, Yanxia .
COMPUTERS & SECURITY, 2020, 92 (92)