Federated Deep Learning-based Intrusion Detection Approach for Enhancing Privacy in Fog-IoT Networks

被引:8
作者
Radjaa, Bensaid [1 ]
Nabila, Labraoui [2 ]
Salameh, Haythem Bany [3 ]
机构
[1] Abou Bekr Belkaid Univ, STIC Lab, Tilimsen, Algeria
[2] Abou Bekr Belkaid Univ, LRI Lab, Tilimsen, Algeria
[3] Al Ain Univ, Coll Engn, Al Ain, U Arab Emirates
来源
2023 10TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS | 2023年
关键词
Fog-IoT network; IDS-based anomaly detection; Federated Deep Learning; INTERNET; THINGS;
D O I
10.1109/IOTSMS59855.2023.10325826
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) revolution has led to a proliferation of connected devices. However, these IoT devices face inherent limitations, such as limited computing power, storage capacity, and battery life. This makes them susceptible to misuse and exploitation. Attackers exploit these vulnerabilities to compromise IoT devices and create botnets that threaten fog-IoT networks. Therefore, developing effective cyber-attack detection mechanisms such as Machine Learning (ML) based Intrusion Detection Systems (IDSs) becomes crucial, which is imperative to safeguard fog-IoT infrastructures. However, conventional ML approaches often require centralized data storage on a single server or in the cloud, leading to concerns regarding data confidentiality, communication overhead, and energy consumption. This paper addresses this issue by leveraging IDS-based anomaly detection to prevent cyber attacks on IoT networks. Specifically, we propose using Federated Deep Learning (FDL) across a fog-based IDS architecture that utilizes the Lost Short-Term Memory (LSTM) model and the Bot-IoT dataset. Our solution adopts a local learning approach, allowing devices to acquire knowledge from others by sharing only model updates without exposing their data. By adopting the FDL approach, the detection model demonstrates a comparable (slightly improved) performance compared to existing centralized deep learning while ensuring data privacy-preserving.
引用
收藏
页码:156 / 160
页数:5
相关论文
共 18 条
[1]  
Abadi M, 2016, ACM SIGPLAN NOTICES, V51, P1, DOI [10.1145/2951913.2976746, 10.1145/3022670.2976746]
[2]   A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond [J].
AbdulRahman, Sawsan ;
Tout, Hanine ;
Ould-Slimane, Hakima ;
Mourad, Azzam ;
Talhi, Chamseddine ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5476-5497
[3]   Fog computing security and privacy for the Internet of Thing applications: State-of-the-art [J].
Alzoubi, Yehia I. ;
Osmanaj, Valmira H. ;
Jaradat, Ashraf ;
Al-Ahmad, Ahmad .
SECURITY AND PRIVACY, 2021, 4 (02)
[4]  
Aouedi O, 2022, Computer Communications
[5]  
Dastjerdi AV, 2016, Internet of Things, P61, DOI [10.1016/B978 -0-12-805395-9.00004-6. arXiv: 1601.02752, DOI 10.1016/B978-0-12-805395-9.00004-6.ARXIV:1601.02752]
[6]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[7]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[8]  
Huba D., 2022, PROC MACH LEARN SYST, V4, P814
[9]  
Imteaj A., 2022, Federated and Transfer Learning (Adaptation, Learning, and Optimization), P7
[10]  
Keras.io, 2023, ABOUT US