FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system

被引:2
作者
Nivaashini, M. [1 ]
Suganya, E. [2 ]
Sountharrajan, S. [3 ]
Prabu, M. [3 ]
Bavirisetti, Durga Prasad [4 ]
机构
[1] Sri Eshwar Coll Engn, Dept Artificial Intelligence & Data Sci, Coimbatore, Tamilnadu, India
[2] Sri Sivasubramaniya Nadar Coll Engn, Dept Informat Technol, Chennai, Tamilnadu, India
[3] Amrita Vishwa Vidyapeetham, Amrita Sch Comp, Dept Comp Sci & Engn, Chennai, India
[4] Norwegian Univ Sci & Technol NTNU, Dept Comp Sci, Trondheim, Norway
关键词
Federated learning (FL); Deep learning (DL); Wi-Fi attacks; Intrusion detection system (IDS);
D O I
10.1186/s13635-024-00156-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet. Wi-Fi network security is severely questioned since there is no physical barrier separating a wireless network from a wired network, and the security procedures in place are defenseless against a wide range of threats. This study set out to assess federated learning, a new technique, as a possible remedy for privacy issues and the high expense of data collecting in network attack detection. To detect and identify cyber threats, especially in Wi-Fi networks, the research presents FEDDBN-IDS, a revolutionary intrusion detection system (IDS) that makes use of deep belief networks (DBNs) inside a federated deep learning (FDL) framework. Every device has a pre-trained DBN with stacking restricted Boltzmann machines (RBM) to learn low-dimensional characteristics from unlabelled local and private data. Later, these models are combined by a central server using federated learning (FL) to create a global model. The whole model is then enhanced by the central server with fully linked SoftMax layers to form a supervised neural network, which is then trained using publicly accessible labeled AWID datasets. Our federated technique produces a high degree of classification accuracy, ranging from 88% to 98%, according to the results of our studies.
引用
收藏
页数:20
相关论文
共 70 条
[1]   Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection [J].
Abdulhammed, Razan ;
Musafer, Hassan ;
Alessa, Ali ;
Faezipour, Miad ;
Abuzneid, Abdelshakour .
ELECTRONICS, 2019, 8 (03)
[2]   An Automated Glowworm Swarm Optimization with an Inception-Based Deep Convolutional Neural Network for COVID-19 Diagnosis and Classification [J].
Abunadi, Ibrahim ;
Albraikan, Amani Abdulrahman ;
Alzahrani, Jaber S. ;
Eltahir, Majdy M. ;
Hilal, Anwer Mustafa ;
Eldesouki, Mohamed, I ;
Motwakel, Abdelwahed ;
Yaseen, Ishfaq .
HEALTHCARE, 2022, 10 (04)
[3]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[4]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[5]   Federated Mimic Learning for Privacy Preserving Intrusion Detection [J].
Al-Marri, Noor Ali Al-Athba ;
Ciftler, Bekir S. ;
Abdallah, Mohamed M. .
2020 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2020,
[6]   GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment [J].
Ali, Yasir ;
Khan, Habib Ullah .
COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 168
[7]  
Andalib A, 2020, IRAN CONF ELECTR ENG, P828
[8]  
[Anonymous], 2014, NIPS 2014 WORKSH DEE
[9]   A theoretical implementation for a proposed hyper-complex chaotic system [J].
Antony, Lellis Thivagar Maria ;
Hamad, Abdulsattar Abdullah .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) :2585-2590
[10]  
AWID, 2015, Awid-wireless security datasets project dataset