Intelligent intrusion detection based on federated learning aided long short-term memory

被引:65
作者
Zhao, Ruijie [1 ]
Yin, Yue [2 ]
Shi, Yong [1 ]
Xue, Zhi [1 ]
机构
[1] Shanghai Jiao Tong Univ SJTU, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Natl Engn Res Ctr Commun & Network Technol, Nanjing 210003, Peoples R China
关键词
Intrusion detection; Deep learning; Federated learning; Long short-term memory; AUTOMATIC MODULATION CLASSIFICATION; NETWORK; MIMO; INTERNET; LSTM;
D O I
10.1016/j.phycom.2020.101157
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deep learning based intelligent intrusion detection (IID) methods have been received strongly attention for computer security protection in cybersecurity. All these learning models are trained at either a single user server or centralized server. For one thing, it is almost impossible to train a powerful deep learning model at a single user. For other, it will encounter intrusion risks at centre server and violate user privacy if collecting dataset from all of user servers. In order to solve these problems, this paper proposes an effective IID method based on federated learning (FL) aided long short-term memory (FL-LSTM) framework. First, the initial LSTM global model is deployed at all of user servers. Second, each user trains its single model and then uploads its model parameters to central server. Finally, the central server performs model parameters aggregation to form a new global model and distributes it to user servers. Use this step as a loop for communication to complete the training of the intrusion detection model. Simulation results show that our proposed method achieves a higher accuracy and better consistency than conventional methods. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:9
相关论文
共 37 条
  • [1] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998
  • [2] Communication-Efficient Federated Deep Learning With Layerwise Asynchronous Model Update and Temporally Weighted Aggregation
    Chen, Yang
    Sun, Xiaoyan
    Jin, Yaochu
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (10) : 4229 - 4238
  • [3] Deep CNN-Based Channel Estimation for mmWave Massive MIMO Systems
    Dong, Peihao
    Zhang, Hua
    Li, Geoffrey Ye
    Gaspar, Ivan Simoes
    NaderiAlizadeh, Navid
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2019, 13 (05) : 989 - 1000
  • [4] Deep Learning Based Channel Estimation for Massive MIMO With Mixed-Resolution ADCs
    Gao, Shen
    Dong, Peihao
    Pan, Zhiwen
    Li, Geoffrey Ye
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1989 - 1993
  • [5] 6G: Opening New Horizons for Integration of Comfort, Security, and Intelligence
    Gui, Guan
    Liu, Miao
    Tang, Fengxiao
    Kato, Nei
    Adachi, Fumiyuki
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (05) : 126 - 132
  • [6] Flight Delay Prediction Based on Aviation Big Data and Machine Learning
    Gui, Guan
    Liu, Fan
    Sun, Jinlong
    Yang, Jie
    Zhou, Ziqi
    Zhao, Dongxu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (01) : 140 - 150
  • [7] Hu BX, 2018, IEEE GLOB COMM CONF
  • [8] Ten Challenges in Advancing Machine Learning Technologies toward 6G
    Kato, Nei
    Mao, Bomin
    Tang, Fengxiao
    Kawamoto, Yuichi
    Liu, Jiajia
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (03) : 96 - 103
  • [9] THE DEEP LEARNING VISION FOR HETEROGENEOUS NETWORK TRAFFIC CONTROL: PROPOSAL, CHALLENGES, AND FUTURE PERSPECTIVE
    Kato, Nei
    Fadlullah, Zubair Md.
    Mao, Bomin
    Tang, Fengxiao
    Akashi, Osamu
    Inoue, Takeru
    Mizutani, Kimihiro
    [J]. IEEE WIRELESS COMMUNICATIONS, 2017, 24 (03) : 146 - 153
  • [10] DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
    Kholidy, Hisham A.
    Baiardi, Fabrizio
    Hariri, Salim
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (02) : 164 - 178