Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cyber Security Intrusion Detection Scheme for Malicious Traffic in IoT using Federated Learning

View through CrossRef
With the rise in cyberattacks, Internet of Things (IoT) devices are increasingly vulnerable to malware, security threats, and suspicious activities. Traditional research has mainly focused on centralized intrusion detection systems in cyber security field. However, these centralized methods often struggle to keep pace with the rapid evolution of digital and mobile technologies and carry the risk of a single point of failure, jeopardizing data security and privacy. To enhance network protection, intrusion detection can benefit from the use of federated learning (FL). FL is a collaborative machine learning approach that allows for model testing without the need to share sensitive local data. Instead, computations are performed directly on distributed end devices, preserving data privacy and addressing concerns related to data ownership, confidentiality, computational efficiency, and storage limitations. Unlike traditional centralized machine learning, FL processes data where it resides, leading to improved security and efficiency. Previous studies on federated learning have examined the challenges posed by non-independent and non-identically distributed data. Implementing FL algorithms in intrusion detection focuses on monitoring routers, detecting intrusions, and analyzing user activity patterns. By incorporating federated learning into intrusion detection systems, network security can see significant enhancements. Experimental research utilizing network intrusion datasets indicates that the Deep Extreme Learning Machine (DELM), when paired with the CSIDS-FL system model, achieves an impressive accuracy rate of 94.23%, surpassing earlier models and demonstrating the effectiveness of this method.
Title: Cyber Security Intrusion Detection Scheme for Malicious Traffic in IoT using Federated Learning
Description:
With the rise in cyberattacks, Internet of Things (IoT) devices are increasingly vulnerable to malware, security threats, and suspicious activities.
Traditional research has mainly focused on centralized intrusion detection systems in cyber security field.
However, these centralized methods often struggle to keep pace with the rapid evolution of digital and mobile technologies and carry the risk of a single point of failure, jeopardizing data security and privacy.
To enhance network protection, intrusion detection can benefit from the use of federated learning (FL).
FL is a collaborative machine learning approach that allows for model testing without the need to share sensitive local data.
Instead, computations are performed directly on distributed end devices, preserving data privacy and addressing concerns related to data ownership, confidentiality, computational efficiency, and storage limitations.
Unlike traditional centralized machine learning, FL processes data where it resides, leading to improved security and efficiency.
Previous studies on federated learning have examined the challenges posed by non-independent and non-identically distributed data.
Implementing FL algorithms in intrusion detection focuses on monitoring routers, detecting intrusions, and analyzing user activity patterns.
By incorporating federated learning into intrusion detection systems, network security can see significant enhancements.
Experimental research utilizing network intrusion datasets indicates that the Deep Extreme Learning Machine (DELM), when paired with the CSIDS-FL system model, achieves an impressive accuracy rate of 94.
23%, surpassing earlier models and demonstrating the effectiveness of this method.

Related Results

Stacking Ensemble and Federated Learning for IoT Intrusion Detection
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As ...
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
“CYBER SECURITY UNVEILED: PROTECTING THE DIGITAL FRONTIER” is a comprehensive guide designed to illuminate the multifaceted world of cyber security, offering both novices and exper...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
Detection of Malicious Flows in the Software-Defined Networks by Using Statistical Flow Analysis-Based Intrusion Detection System
Detection of Malicious Flows in the Software-Defined Networks by Using Statistical Flow Analysis-Based Intrusion Detection System
Abstract Specifically, in the past few years, internet traffic has grown rapidly, evolving modern network technologies with hybrid telecommunication systems and conventiona...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...

Back to Top