Abstract
In the evolving world, the drastic expansion of the internet and the use of smart devices demands a change in existing infrastructure. These rapid changes in the structural level also open new dimensions that are susceptible to cyber-attacks. One of the efficient methods to tackle these situations is to apply intelligence to the systems and detect abnormal behaviours. As privacy plays a vital role, here Federated Learning method is used to detect cyber attacks by analysing the data logs and compared with the non-federated learning techniques on the same data. It is very evident from the experiment that Federated Learning is very effective in detecting these attacks by preserving the privacy of the victim organisations/systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bhattacharya, S., et al.: A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPU. Electronics 9, 219 (2020)
Alazab, M., Broadhurst, R.: Spam and criminal activity. Trends Issues Crime Crim. Justice 1–20 (2016)
Hindy, H., et al.: A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 8, 104650–104675 (2020). https://doi.org/10.1109/ACCESS.2020.3000179
Kilincer, I.F., Ertam, F., Sengur, A.: Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput. Netw. 188, 107840 (2021). https://www.sciencedirect.com/science/article/pii/S1389128621000141
Sudhina Kumar, G.K., Krishna Prakasha, K., Muniyal, B.: ACH reference model-a model of architecture to handle advanced cyberattacks. In: 2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp. 1–6 (2022). https://doi.org/10.1109/ICAECT54875.2022.9808076
Konecný, J., McMahan, H.B., Yu, F.X., Richtarik, P., Suresh, A.T., Bacon, D.: Federated learning: strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)
Taheri, R., Shojafar, M., Alazab, M., Tafazolli, R.: FED-IIoT: a robust federated malware detection architecture in industrial IoT. IEEE Trans. Ind. Inform. 17(12), 8442–8452 (2020)
Cheng, Y., Liu, Y., Chen, T., Yang, Q.: Federated learning for privacy-preserving AI. Commun. ACM 63(12), 33–36 (2020)
Mothukuri, V., Khare, P., Parizi, R.M., Pouriyeh, S., Dehghantanha, A., Srivastava, G.: Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 9(4), 2545–2554 (2021)
Gadekallu, T.R., Pham, Q.-V., Huynh-The, T., Bhattacharya, S., Maddikunta, P.K.R., Liyanage, M.: Federated learning for big data: a survey on opportunities, applications, and future directions. arXiv preprint arXiv:2110.04160 (2021)
Alazab, M., Swarna Priya, R.M., Parimala, M., Maddikunta, P.K.R., Gadekallu, T.R., Pham, Q.-V.: Federated learning for cybersecurity: concepts, challenges, and future directions. IEEE Trans. Ind. Inform. 18(5), 3501–3509 (2021)
Wang, W., et al.: Secure-enhanced federated learning for AI-empowered electric vehicle energy prediction. IEEE Consum. Electron. Mag. 12(2), 27–34 (2023)
Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1–19 (2019)
Liu, Y., Kang, Y., Xing, C., Chen, T., Yang, Q.: A secure federated transfer learning framework. IEEE Intell. Syst. 35(4), 70–82 (2020)
Naveed, K.: N-BaIoT dataset to detect IoT botnet attacks (2020). https://www.kaggle.com/mkashifn/nbaiot-dataset
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sudhina Kumar, G.K., Krishna Prakasha, K., Muniyal, B. (2023). Intrusion Detection Using Federated Learning. In: Prabhu, S., Pokhrel, S.R., Li, G. (eds) Applications and Techniques in Information Security . ATIS 2022. Communications in Computer and Information Science, vol 1804. Springer, Singapore. https://doi.org/10.1007/978-981-99-2264-2_12
Download citation
DOI: https://doi.org/10.1007/978-981-99-2264-2_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-2263-5
Online ISBN: 978-981-99-2264-2
eBook Packages: Computer ScienceComputer Science (R0)