Intrusion Detection Using Federated Learning in Non-IID Data Environments
DOI:
https://doi.org/10.54654/isj.v3i23.1061Keywords:
Anomaly detection, deep learning, federated learning, intrusion detection systemsTóm tắt
Intrusion Detection Systems (IDS) are essential for protecting networks by detecting threats. Machine learning (ML) based approaches have enhanced the effectiveness for IDS. However, it raises privacy concerns for IDS based on ML approaches due to the need for centralized data. To address this issue, Federated Learning (FL) has been applied to IDS. It allows ML models to be trained on decentralized devices/clients without sharing raw data. However, FL faces challenges with non-independent and identically distributed (non-IID) data, which reduces the performance of intrusion detection models. This paper introduces a loss function that jointly learns compact local representations on each client and a global model across all clients, enhancing the robustness of FL in non-IID data environments. Experimental results demonstrate that our method significantly improves the accuracy and robustness of FL systems for IDS in non-IID environments.
Downloads
References
D. Musleh, M. Alotaibi, F. Al-Haidari, A. Rahman, and R. Mohammad, “Intrusion detection system using feature extraction with machine learning algorithms in IoT,” in Journal of Sensor and Actuator Networks, vol. 12, no. 2, pp. 1–19, 2023. doi: https://doi.org/10.3390/jsan12020001.
P. Kairouz, H. B. McMahan, B. Avent, A. Bellet, M. Bennis, A. N. Bhagoji, K. Bonawitz, Z. Charles, G. Cormode, R. Cummings, et al., “Advances and open problems in federated learning,” arXiv preprint arXiv:1912.04977, 2019. doi: https://doi.org/10.48550/arXiv.1912.04977.
A. Fallah, A. Mokhtari, and A. Ozdaglar, “Personalized federated learning with theoretical guarantees: A model-agnostic meta-learning approach,” in Advances in Neural Information Processing Systems, H. Larochelle, M. Ranzato, R. Hadsell, M. Balcan, and H. Lin, Eds, vol. 33, Curran Associates, Inc., 2020, pp. 3557–3568.
C. Finn, P. Abbeel, and S. Levine, “Model-agnostic meta-learning for fast adaptation of deep networks,” arXiv preprint arXiv:1703.03400, 2017. doi: https://doi.org/10.48550/arXiv.1703.03400.
P. P. Liang, T. Liu, L. Ziyin, N. B. Allen, R. P. Auerbach, D. Brent, R. Salakhutdinov, and L.-P. Morency, “Think locally, act globally: Federated learning with local and global representations,” arXiv preprint arXiv:2001.01523, 2020. doi: https://doi.org/10.48550/arXiv.2001.01523.
B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. Aguera y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial Intelligence and Statistics, 2017, pp. 1273–1282.
M. Bhavsar, Y. Bekele, K. Roy, J. Kelly, and D. Limbrick, “FL-IDS: Federated learning-based intrusion detection system using edge devices for transportation IoT,” in IEEE Access, vol. PP, pp. 1–1, Jan. 2024. doi: https://doi.org/10.1109/ACCESS.2024.1234567.
C. You, K. Guo, G. Feng, P. Yang, and T. Q. S. Quek, “Automated federated learning in mobile-edge networks—fast adaptation and convergence,” in IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13571–13586, Aug. 2023. doi: https://doi.org/10.1109/JIOT.2023.3262664.
Y. Chen, X. Qin, J. Wang, C. Yu, and W. Gao, “Fedhealth: A federated transfer learning framework for wearable healthcare,” in IEEE Intelligent Systems, vol. 35, pp. 83–93, 2020. doi: https://doi.org/10.1109/MIS.2020.2994885.
L. Collins, H. Hassani, A. Mokhtari, and S. Shakkottai, “Exploiting shared representations for personalized federated learning,” in International Conference on Machine Learning, 2021, pp. 2089–2098.
L. Yi, G. Wang, X. Liu, Z. Shi, and H. Yu, “FedGH: Heterogeneous federated learning with generalized global header,” arXiv preprint arXiv:2303.13137, 2023. doi: doi.org/10.48550/arXiv.2303.13137.
Q. Li, B. He, and D. Song, “Model-contrastive federated learning,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2021, pp. 10713–10722. doi: https://doi.org/10.1109/CVPR.2021.01072.
G. Legate, L. Caccia, and E. Belilovsky, “Re-weighted softmax cross-entropy to control forgetting in federated learning,” arXiv preprint arXiv:2301.12345, 2023. doi: https://doi.org/10.48550/arXiv.2301.12345.
J. Kaliappan, T. Revathi, and K. Sundararajan, “Intrusion detection using artificial neural networks with best set of features”, The International Arab Journal of Information Technology, vol. 12, no. 6A, pp.728-734, Jan. 2015.
J. Wang, Q. Liu, H. Liang, G. Joshi, and H. V. Poor, “Tackling the objective inconsistency problem in heterogeneous federated optimization,” in Advances in Neural Information Processing Systems, vol. 33, pp. 7611–7623, 2020.
B. Reis, E. Maia, and I. Praça, “Selection and performance analysis of CICIDS2017 features importance,” in Selection and Performance Analysis of CICIDS2017 Features Importance, pp. 56–71, Apr. 2020.
M. G. Arivazhagan, V. Aggarwal, A. K. Singh, and S. Choudhary, “Federated learning with personalization layers,” arXiv preprint arXiv:1912.00818, 2019. doi: https://doi.org/10.48550/arXiv.1912.00818.
J. Konečný, H. B. McMahan, F. X. Yu, P. Richtarik, A. T. Suresh, and D. Bacon, “Federated Learning: Strategies for Improving Communication Efficiency,” in NIPS Workshop on Private Multi-Party Machine Learning, 2016. doi: https://doi.org/10.48550/arXiv.1610.05492.
T. N. Quy, N. T. Tung, D. Q. Trung, and D. H. Viet, “Convolutional neural network based sidechannel attacks”, Journal of Science and Technology on Information Security, vol. 1, no. 15, pp. 26-37, Jun. 2022. doi: https://doi.org/10.54654/isj.v1i15.834.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).