[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3654823.3654824acmotherconferencesArticle/Chapter ViewAbstractPublication PagescacmlConference Proceedingsconference-collections
research-article

An Adaptive Federated Learning Intrusion Detection System Based on Generative Adversarial Networks under the Internet of Things

Published: 29 May 2024 Publication History

Abstract

With the rapid advancement of artificial intelligence, the Internet of Things (IoT), and related technologies, cybersecurity concerns are escalating. Reconstruction attacks pose a substantial threat to the privacy and security of machine learning models. This paper explores innovative approaches, specifically federated learning (FL) and generative adversarial networks (GAN), to bolster intrusion detection capabilities. Federated learning, a decentralized machine learning paradigm, empowers individual network clients to conduct model training locally, mitigating privacy risks associated with centralized data uploads. While FL addresses data privacy concerns, it falls short in protecting against reconstruction attacks—malicious attempts to reconstruct sensitive data from training models.To tackle this vulnerability, we integrate GAN into the FL framework, presenting a novel method for IoT anomalous traffic intrusion detection. By combining FL's decentralized training with GAN's generative capabilities, our approach achieves heightened accuracy in identifying and thwarting reconstruction attacks. Experimental evaluations, utilizing publicly available datasets, showcase the superior performance of our method compared to traditional intrusion detection techniques.Our method not only enhances data privacy but also introduces a paradigm shift in network security research and applications. This paper contributes valuable insights and methods, opening new avenues for advancing the field of intrusion detection in the era of evolving cyber threats.

References

[1]
Daniel Wagner, Daniel Kopp, Matthias Wichtlhuber, Christoph Dietzel, Oliver Hohlfeld, Georgios Smaragdakis, and Anja Feldmann. 2021. United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 12, 2021, Virtual Event Republic of Korea. ACM, Virtual Event Republic of Korea, 970–987.https://doi.org/10.1145/3460120.3485385
[2]
Lingjuan Lyu, Han Yu, and Qiang Yang. 2020. Threats to Federated Learning: A Survey. Retrieved November 10, 2023 from http://arxiv.org/abs/2003.02133
[3]
Arwa Aldweesh, Abdelouahid Derhab, and Ahmed Z. Emam. 2020. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems 189, (February 2020), 105124. https://doi.org/10.1016/j.knosys.2019.105124
[4]
Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Networks. Retrieved October 30, 2023 from http://arxiv.org/abs/1406.2661
[5]
Hongkyu Lee, Jeehyeong Kim, Rasheed Hussain, Sunghyun Cho, and Junggab Son. 2021. On Defensive Neural Networks Against Inference Attack in Federated Learning. In ICC 2021 - IEEE International Conference on Communications, June 2021, Montreal, QC, Canada. IEEE, Montreal, QC, Canada, 1–6. . https://doi.org/10.1109/ICC42927.2021.9500936
[6]
Jingwei Sun, Ang Li, Binghui Wang, Huanrui Yang, Hai Li, and Yiran Chen. 2021. Soteria: Provable Defense against Privacy Leakage in Federated Learning from Representation Perspective. In 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2021, Nashville, TN, USA. IEEE, Nashville, TN, USA, 9307–9315.https://doi.org/10.1109/CVPR46437.2021.00919
[7]
Yicheng Chen, Rick S. Blum, Martin Takac, and Brian M. Sadler. 2022. Distributed Learning With Sparsified Gradient Differences. IEEE J. Sel. Top. Signal Process. 16, 3 (April 2022), 585–600. https://doi.org/10.1109/JSTSP.2022.3162989
[8]
Sai Praneeth Karimireddy, Satyen Kale, Mehryar Mohri, Sashank J. Reddi, Sebastian U. Stich, and Ananda Theertha Suresh. 2021. SCAFFOLD: Stochastic Controlled Averaging for Federated Learning. Retrieved October 30, 2023 from http://arxiv.org/abs/1910.06378
[9]
Krishna Pillutla, Kshitiz Malik, Abdelrahman Mohamed, Michael Rabbat, Maziar Sanjabi, and Lin Xiao. 2022. Federated Learning with Partial Model Personalization. Retrieved November 10, 2023 from http://arxiv.org/abs/2204.03809
[10]
Sashank Reddi, Zachary Charles, Manzil Zaheer, Zachary Garrett, Keith Rush, Jakub Konečný, Sanjiv Kumar, and H. Brendan McMahan. 2021. Adaptive Federated Optimization. Retrieved October 30, 2023 from http://arxiv.org/abs/2003.00295
[11]
Michael R. Zhang, James Lucas, Geoffrey Hinton, and Jimmy Ba. 2019. Lookahead Optimizer: k steps forward, 1 step back. Retrieved October 30, 2023 from http://arxiv.org/abs/1907.08610
[12]
Hanchi Ren, Jingjing Deng, and Xianghua Xie. 2022. GRNN: Generative Regression Neural Network – A Data Leakage Attack for Federated Learning. ACM Trans. Intell. Syst. Technol. 13, 4 (August 2022), 1–24. https://doi.org/10.1145/3510032
[13]
Akarsh K. Nair, Ebin Deni Raj, and Jayakrushna Sahoo. 2023. A robust analysis of adversarial attacks on federated learning environments. Computer Standards & Interfaces 86, (August 2023), 103723. https://doi.org/10.1016/j.csi.2023.103723
[14]
Liyang Xie, Kaixiang Lin, Shu Wang, Fei Wang, and Jiayu Zhou. 2018. Differentially Private Generative Adversarial Network. Retrieved October 30, 2023 from http://arxiv.org/abs/1802.06739
[15]
Martin Arjovsky, Soumith Chintala, and Léon Bottou. 2017. Wasserstein GAN. Retrieved October 30, 2023 from http://arxiv.org/abs/1701.07875

Cited By

View all
  • (2025)CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data GenerationApplied Sciences10.3390/app1505241615:5(2416)Online publication date: 24-Feb-2025
  • (2025)A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network securityScientific Reports10.1038/s41598-025-85878-315:1Online publication date: 17-Jan-2025

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CACML '24: Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning
March 2024
478 pages
ISBN:9798400716416
DOI:10.1145/3654823
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Federated Learning
  2. Generative Adversarial Networks
  3. Intrusion Detection
  4. Reconstruction Attacks

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CACML 2024

Acceptance Rates

Overall Acceptance Rate 93 of 241 submissions, 39%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)90
  • Downloads (Last 6 weeks)24
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data GenerationApplied Sciences10.3390/app1505241615:5(2416)Online publication date: 24-Feb-2025
  • (2025)A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network securityScientific Reports10.1038/s41598-025-85878-315:1Online publication date: 17-Jan-2025

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media