Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Non-stationary Distribution Attack in Federated Intrusion Detection Systems: Formal Definition, Convergence Analysis, and Empirical Evaluation

View through CrossRef
Abstract Federated learning has emerged as the dominant paradigm for privacy-preserving intrusion detection across distributed networks, yet its vulnerability to adversarial manipulation of the training process remains incompletely characterised. Existing attack formulations—Byzantine poisoning, label flipping, and gradient inversion—treat the local data distribution of a malicious client as fixed across training rounds. We identify and formalise a fundamentally different threat: the Non-stationary Distribution Attack (NDA), in which a single adversarial client strategically rotates its local attack-traffic family across rounds to deliberately amplify gradient divergence induced by non-independent and identically distributed (non-IID) data partitioning. We prove formally (Theorem 1) that NDA degrades FedAvg convergence whenever the Dirichlet heterogeneity parameter α falls below a dataset-dependent critical threshold α*, and we show constructively (Theorem 2) that NDA evades Krum-style aggregation filters by design. We further derive a KL drift-based detection criterion (Proposition 1) and establish that NDA requires Ω(1/ε²) observation rounds to distinguish from natural concept drift (Theorem 3). Comprehensive experiments on three benchmark datasets—CICIDS2017, TON_IoT, and NSL-KDD—across three aggregation schemes (FedAvg, FedProx, SCAFFOLD) demonstrate that NDA's primary operational impact is silent Area Under the ROC Curve (AUC) degradation: up to 4.84 percentage points on TON_IoT under SCAFFOLD at α = 0.05, while accuracy decreases by only 1.65 percentage points. This stealth ratio of 2.9× renders NDA invisible to accuracy-based monitoring yet highly damaging to the model's attack-ranking capability. Our results motivate a rethinking of non-IID heterogeneity as an actively exploitable attack surface rather than a passive statistical inconvenience.
Springer Science and Business Media LLC
Title: Non-stationary Distribution Attack in Federated Intrusion Detection Systems: Formal Definition, Convergence Analysis, and Empirical Evaluation
Description:
Abstract Federated learning has emerged as the dominant paradigm for privacy-preserving intrusion detection across distributed networks, yet its vulnerability to adversarial manipulation of the training process remains incompletely characterised.
Existing attack formulations—Byzantine poisoning, label flipping, and gradient inversion—treat the local data distribution of a malicious client as fixed across training rounds.
We identify and formalise a fundamentally different threat: the Non-stationary Distribution Attack (NDA), in which a single adversarial client strategically rotates its local attack-traffic family across rounds to deliberately amplify gradient divergence induced by non-independent and identically distributed (non-IID) data partitioning.
We prove formally (Theorem 1) that NDA degrades FedAvg convergence whenever the Dirichlet heterogeneity parameter α falls below a dataset-dependent critical threshold α*, and we show constructively (Theorem 2) that NDA evades Krum-style aggregation filters by design.
We further derive a KL drift-based detection criterion (Proposition 1) and establish that NDA requires Ω(1/ε²) observation rounds to distinguish from natural concept drift (Theorem 3).
Comprehensive experiments on three benchmark datasets—CICIDS2017, TON_IoT, and NSL-KDD—across three aggregation schemes (FedAvg, FedProx, SCAFFOLD) demonstrate that NDA's primary operational impact is silent Area Under the ROC Curve (AUC) degradation: up to 4.
84 percentage points on TON_IoT under SCAFFOLD at α = 0.
05, while accuracy decreases by only 1.
65 percentage points.
This stealth ratio of 2.
9× renders NDA invisible to accuracy-based monitoring yet highly damaging to the model's attack-ranking capability.
Our results motivate a rethinking of non-IID heterogeneity as an actively exploitable attack surface rather than a passive statistical inconvenience.

Related Results

Non-Recommended Publishing Lists: Strategies for Detecting Deceitful Journals
Non-Recommended Publishing Lists: Strategies for Detecting Deceitful Journals
Abstract The rapid growth of open access publishing (OAP) has significantly improved the accessibility and dissemination of scientific knowledge. However, this expansion has also c...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Unbounded Star Convergence in Lattices
Unbounded Star Convergence in Lattices
Let L be a vector lattice, "(" x_α ") " be a L-valued net, and x∈L . If |x_α-x|∧u→┴o 0 for every u ∈〖 L〗_+ then it is said that the net "(" x_α ")" unbounded order converges ...
Federated Data Linkage in Practice
Federated Data Linkage in Practice
In recent years, great strides have been made towards the deployment of federated systems for data research, including exploring federated trusted research environments (TREs). The...
Cyber Security Intrusion Detection Scheme for Malicious Traffic in IoT using Federated Learning
Cyber Security Intrusion Detection Scheme for Malicious Traffic in IoT using Federated Learning
With the rise in cyberattacks, Internet of Things (IoT) devices are increasingly vulnerable to malware, security threats, and suspicious activities. Traditional research has mainly...
Enhancing analog circuit security through obfuscation
Enhancing analog circuit security through obfuscation
The focus of this dissertation is the safeguarding of analog circuits against IP piracy attacks, which includes the development of a novel method to secure analog IP, the assessmen...
One box to search them all
One box to search them all
PurposeThe purpose of this paper is to present how, in May 2008, the Ad Hoc Committee on Federated Search was formed to prepare a preliminary report on federated searching for a sp...

Back to Top