Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cyber Security Intrusion Detection Scheme for Malicious Traffic in IoT using Federated Learning

View through CrossRef
With the rise in cyberattacks, Internet of Things (IoT) devices are increasingly vulnerable to malware, security threats, and suspicious activities. Traditional research has mainly focused on centralized intrusion detection systems in cyber security field. However, these centralized methods often struggle to keep pace with the rapid evolution of digital and mobile technologies and carry the risk of a single point of failure, jeopardizing data security and privacy. To enhance network protection, intrusion detection can benefit from the use of federated learning (FL). FL is a collaborative machine learning approach that allows for model testing without the need to share sensitive local data. Instead, computations are performed directly on distributed end devices, preserving data privacy and addressing concerns related to data ownership, confidentiality, computational efficiency, and storage limitations. Unlike traditional centralized machine learning, FL processes data where it resides, leading to improved security and efficiency. Previous studies on federated learning have examined the challenges posed by non-independent and non-identically distributed data. Implementing FL algorithms in intrusion detection focuses on monitoring routers, detecting intrusions, and analyzing user activity patterns. By incorporating federated learning into intrusion detection systems, network security can see significant enhancements. Experimental research utilizing network intrusion datasets indicates that the Deep Extreme Learning Machine (DELM), when paired with the CSIDS-FL system model, achieves an impressive accuracy rate of 94.23%, surpassing earlier models and demonstrating the effectiveness of this method.
Title: Cyber Security Intrusion Detection Scheme for Malicious Traffic in IoT using Federated Learning
Description:
With the rise in cyberattacks, Internet of Things (IoT) devices are increasingly vulnerable to malware, security threats, and suspicious activities.
Traditional research has mainly focused on centralized intrusion detection systems in cyber security field.
However, these centralized methods often struggle to keep pace with the rapid evolution of digital and mobile technologies and carry the risk of a single point of failure, jeopardizing data security and privacy.
To enhance network protection, intrusion detection can benefit from the use of federated learning (FL).
FL is a collaborative machine learning approach that allows for model testing without the need to share sensitive local data.
Instead, computations are performed directly on distributed end devices, preserving data privacy and addressing concerns related to data ownership, confidentiality, computational efficiency, and storage limitations.
Unlike traditional centralized machine learning, FL processes data where it resides, leading to improved security and efficiency.
Previous studies on federated learning have examined the challenges posed by non-independent and non-identically distributed data.
Implementing FL algorithms in intrusion detection focuses on monitoring routers, detecting intrusions, and analyzing user activity patterns.
By incorporating federated learning into intrusion detection systems, network security can see significant enhancements.
Experimental research utilizing network intrusion datasets indicates that the Deep Extreme Learning Machine (DELM), when paired with the CSIDS-FL system model, achieves an impressive accuracy rate of 94.
23%, surpassing earlier models and demonstrating the effectiveness of this method.

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection
Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles. This h...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
Abstract Intrusion detection is an essential process to identify malicious incidents and continuously alert the many users of the Internet of Things (IoT). The constant mon...

Back to Top