Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Stacking Ensemble and Federated Learning for IoT Intrusion Detection

View through CrossRef
The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to network security, intrusion detection systems (IDS) have acquired a key role as they attempt to detect malicious activities promptly and efficiently. In this thesis, an investigation on the use of ensemble learning and federated learning as methods to develop IDS in IoT environment is proposed. Three main contributions are offered, which were evaluated on two open-source datasets, namely ToN IoT and CICIDS2017. The first contribution is a novel method based on a combination of ensemble models. The method uses ensemble stacking and boosting to detect anomalies in IoT traffic. Three machine learning models, namely kNN, Decision Tree and Logistic Regression, are used as the base learners for the stacking model. The XGBoost model is used as the meta learner. Results show that the proposed model is capable of high accuracy, precision, recall and F1-Score in both datasets in binary and multi-class classification. Secondly, this thesis proposes another novel IDS approach based on a stacking ensemble of deep learning (DL) models. This approach is named Deep Integrated Stacking for the IoT (DIS-IoT), as it combines four different DL models into a fully connected DL layer, creating a standalone ensemble stacking model. Results demonstrate that DIS-IoT is capable of a high level of accuracy with a very low False Positive rate (FPR) in both datasets improving on other standard, standalone, DL methods. Results from this set of experiments were also compared against results available in the literature, which were obtained from similar approaches on the ToN IoT dataset. DIS-IoT achieves comparable performance with others in binary classification, but outperforms them in multi-class classification. The third contribution uses Federated Learning (FL) as an alternative, distributed, method to a centralized intrusion detection model. The FL model is composed of four clients and one server. Data analysis was performed at the client side, each using their own portion of the dataset. No data sharing between participants occurred, hence maintaining data privacy. The results from the experiments demonstrated that a collaborative federated system using horizontal data partitioning and the FedAvg aggregation algorithm, can have a comparable performance with a centralized model, making it a viable option for an IoT IDS. Moreover, several other federated averaging algorithms were evaluated in order to verify their efficacy in this setting. These were FedAvgM, FedAdam and FedAdagrad. The experiments demonstrated that FedAvg and FedAvgM were the most efficient options in the given scenario. However, further research in alternative, larger, settings are required to evaluate FedAdam and FedAdagrad more accurately.
Glasgow Caledonian University
Title: Stacking Ensemble and Federated Learning for IoT Intrusion Detection
Description:
The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure.
As part of a defense in depth approach to network security, intrusion detection systems (IDS) have acquired a key role as they attempt to detect malicious activities promptly and efficiently.
In this thesis, an investigation on the use of ensemble learning and federated learning as methods to develop IDS in IoT environment is proposed.
Three main contributions are offered, which were evaluated on two open-source datasets, namely ToN IoT and CICIDS2017.
The first contribution is a novel method based on a combination of ensemble models.
The method uses ensemble stacking and boosting to detect anomalies in IoT traffic.
Three machine learning models, namely kNN, Decision Tree and Logistic Regression, are used as the base learners for the stacking model.
The XGBoost model is used as the meta learner.
Results show that the proposed model is capable of high accuracy, precision, recall and F1-Score in both datasets in binary and multi-class classification.
Secondly, this thesis proposes another novel IDS approach based on a stacking ensemble of deep learning (DL) models.
This approach is named Deep Integrated Stacking for the IoT (DIS-IoT), as it combines four different DL models into a fully connected DL layer, creating a standalone ensemble stacking model.
Results demonstrate that DIS-IoT is capable of a high level of accuracy with a very low False Positive rate (FPR) in both datasets improving on other standard, standalone, DL methods.
Results from this set of experiments were also compared against results available in the literature, which were obtained from similar approaches on the ToN IoT dataset.
DIS-IoT achieves comparable performance with others in binary classification, but outperforms them in multi-class classification.
The third contribution uses Federated Learning (FL) as an alternative, distributed, method to a centralized intrusion detection model.
The FL model is composed of four clients and one server.
Data analysis was performed at the client side, each using their own portion of the dataset.
No data sharing between participants occurred, hence maintaining data privacy.
The results from the experiments demonstrated that a collaborative federated system using horizontal data partitioning and the FedAvg aggregation algorithm, can have a comparable performance with a centralized model, making it a viable option for an IoT IDS.
Moreover, several other federated averaging algorithms were evaluated in order to verify their efficacy in this setting.
These were FedAvgM, FedAdam and FedAdagrad.
The experiments demonstrated that FedAvg and FedAvgM were the most efficient options in the given scenario.
However, further research in alternative, larger, settings are required to evaluate FedAdam and FedAdagrad more accurately.

Related Results

Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
An Enhanced Security Framework for IoT Devices through Federated Learning
An Enhanced Security Framework for IoT Devices through Federated Learning
The increasing deployment of Internet of Things (IoT) devices across diverse environments has introduced significant security challenges, particularly due to the distributed nature...
An enhanced federated machine learning for secure DDOS detection in IOT network
An enhanced federated machine learning for secure DDOS detection in IOT network
The rapid growth of Internet of Things (IoT) devices has created new opportunities for automation and connectivity, but it has also increased exposure to cyber-attacks especially D...
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for suc...
Cyber Security Intrusion Detection Scheme for Malicious Traffic in IoT using Federated Learning
Cyber Security Intrusion Detection Scheme for Malicious Traffic in IoT using Federated Learning
With the rise in cyberattacks, Internet of Things (IoT) devices are increasingly vulnerable to malware, security threats, and suspicious activities. Traditional research has mainly...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Internet Of Things Intrusion Detection Based on Deep Learning
Internet Of Things Intrusion Detection Based on Deep Learning
The fast-growing Internet of Things (IoT) has exposed more attack vectors of the connected devices and heightened the necessity of effective intrusion detection systems (IDS). Neve...

Back to Top