Abstract
With the networking of industrially deployed facilities in distributed environments, industrial control systems (ICS) are facing an escalating number of attacks, emphasizing the criticality of intrusion detection systems. Currently, machine learning-based intrusion detection systems have been extensively researched. However, the sensitivity of ICS data poses a challenge of scarce labeled data for these systems. Additionally, distributed ICS necessitate privacy-preserving collaborative detection. To address these challenges, some solutions combining federated learning and transfer learning have been proposed. Nonetheless, these solutions often overlook the clustering characteristics of factory equipment and the constraints posed by limited computational and communication resources. Therefore, we propose GC-FADA, a chained cross-domain collaborative intrusion detection framework, to effectively address the interplay between labeled data scarcity, privacy protection, and resource constraints in ICS intrusion detection techniques. Firstly, GC-FADA used the adversarial domain adaptation scheme to train the local model to alleviate the performance limitation of intrusion detection model caused by labeled data scarcity. Then, to reduce the communication overhead between the nodes in the factory communication network and protect client privacy, GC-FADA utilizes the geographical clustering characteristics of the factory devices and proposes a FL-based grouped chain learning structure to achieve collaborative training. Finally, GC-FADA achieves privacy protection with low computational overhead by utilizing patterns from lightweight pseudo-random generators instead of complex cryptographic primitives. Extensive experiments conducted on real industrial SCADA datasets validate the effectiveness and rationality of the proposed approach, proving that GC-FADA outperforms major domain adaptation methods in terms of accuracy while reducing computation and communication costs. In the cross-domain learning task on the two data sets, the detection accuracy of our GC-FADA reaches 88.7% and 98.29% respectively, and the detection accuracy of various network attacks is mostly more than 90%.














Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data Availability
The data of our prototype is available via https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets
References
Kaouk M, Flaus JM, Potet ML, Groz R (2019) A review of intrusion detection systems for industrial control systems. In: 2019 6th International Conference on Control, Decision and Information Technologies, pp 1699–1704
Mrabet ZE, Kaabouch N, Ghazi HE, Ghazi HE (2018) Cyber-security in smart grid: Survey and challenges. Comput Electr Eng 67:469–482
Guan S, Zhuang Z, Tao H, Chen Y, Stojanovic V, Paszke W (2023) Feedback-aided pd-type iterative learning control for time-varying systems with non-uniform trial lengths. Trans Inst Meas Control 45(11):2015–2026
Tao H, Zheng J, Wei J, Paszke W, Rogers E, Stojanovic V (2023) Repetitive process based indirect-type iterative learning control for batch processes with model uncertainty and input delay. J Process Control 132:103112
Araujo-Filho PF, Kaddoum G, Campelo DR, Gondim Santos A, Macêdo D, Zanchettin C (2021) Intrusion detection for cyber–physical systems using generative adversarial networks in fog environment. IEEE Internet Things J 8(8):6247–6256
Sun M, Lai Y, Wang Y, Liu J, Mao B, Gu H (2023) Intrusion detection system based on in-depth understandings of industrial control logic. IEEE Trans Ind Inf 19(3):2295–2306
Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: Concept and applications. ACM Trans Intell Syst Technol 10(2):1–19
Huong TT, Bac TP, Long DM, Luong TD, Dan NM, Quang LA, Cong LT, Thang BD, Tran KP (2021) Detecting cyberattacks using anomaly detection in industrial control systems: A federated learning approach. Computers in Industry 132:103509
Zhang Z, Wu L, He D, Wang Q, Wu D, Shi X, Ma C (2022) G-vcfl: Grouped verifiable chained privacy-preserving federated learning. IEEE Trans Netw Serv Manag 19(4):4219–4231
Zhang J, Cheng X, Wang C, Wang Y, Shi Z, Jin J, Song A, Zhao W, Wen L, Zhang T (2022) Fedada: Fast-convergent adaptive federated learning in heterogeneous mobile edge computing environment. World Wide Web 25(5):1971–1998
Wang R, Huang W, Shi M, Wang J, Shen C, Zhu Z (2022) Federated adversarial domain generalization network: A novel machinery fault diagnosis method with data privacy. Knowl-Based Syst 256:109880
Sharma S, Xing C, Liu Y, Kang Y (2019) Secure and efficient federated transfer learning. In: 2019 IEEE International Conference on Big Data, pp 2569–2576
Zhang Z, Wu L, Ma C, Li J, Wang J, Wang Q, Yu S (2023) Lsfl: A lightweight and secure federated learning scheme for edge computing. IEEE Trans Inf Forensic Secur 18:365–379
Yuan J, Yu S (2014) Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans Parallel Distrib Syst 25(1):212–221
Zeng LL, Fan Z, Su J, Gan M, Peng L, Shen H, Hu D (2022) Gradient matching federated domain adaptation for brain image classification. IEEE Trans Neural Netw Learn Syst 35(6):1–15
Zhang Z, Wu L, He D, Li J, Cao S, Wu X (2023) Communication-efficient and byzantine-robust federated learning for mobile edge computing networks. IEEE Netw 37(4):112–119
Cui J, Zong L, Xie J, Tang M (2023) A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl Intell 53(1):272–288
Hou J, Liu F, Zhuang X (2019) A new intrusion detection model based on gru and salient feature approach. In: Dependability in sensor, cloud, and big data systems and applications: 5th international conference, pp 405–415
Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: 2016 international conference on wireless networks and mobile communications, pp 258–263
Xun Y, Liu J, Kato N, Fang Y, Zhang Y (2020) Automobile driver fingerprinting: A new machine learning based authentication scheme. IEEE Trans Ind Inf 16(2):1417–1426
Lohiya R, Thakkar A (2021) A review on machine learning and deep learning perspectives of ids for iot: Recent updates, security issues, and challenges. Arch Comput Methods Eng 28(7):3211–3243
Beaver JM, Borges-Hink RC, Buckner MA (2013) An evaluation of machine learning methods to detect malicious scada communications. In: 2013 12th international conference on machine learning and applications, vol 2, pp 54–59
Zoppi T, Gharib M, Atif M, Bondavalli A (2021) Meta-learning to improve unsupervised intrusion detection in cyber-physical systems. ACM Trans Cyber-Phys Syst 5:1–27
Tao H, Shi H, Qiu J, Jin G, Stojanovic V (2023) Planetary gearbox fault diagnosis based on fdknn-dgat with few labeled data. Meas Sci Technol 35(2):025036
Li W, Huang R, Li J, Liao Y, Chen Z, He G, Yan R, Gryllias K (2022) A perspective survey on deep transfer learning for fault diagnosis in industrial scenarios: Theories, applications and challenges. Mech Syst Signal Process 167:108487
Mehedi ST, Anwar A, Rahman Z, Ahmed K, Islam R (2023) Dependable intrusion detection system for iot: A deep transfer learning based approach. IEEE Trans Ind Inf 19(1):1006–1017
Liu R, Ma W, Guo J (2024) A multi-constraint transfer approach with additional auxiliary domains for iot intrusion detection under unbalanced samples distribution. Appl Intell 54(1):1179–1217
Singla A, Bertino E, Verma D (2020) Preparing network intrusion detection deep learning models with minimal data using adversarial domain adaptation. In: Proceedings of the 15th ACM Asia conference on computer and communications security, pp 127–140
Singh NB, Singh MM, Sarkar A, Mandal JK (2021) A novel wide & deep transfer learning stacked gru framework for network intrusion detection. J Inf Secur Appl 61:102899
Ning J, Gui G, Wang Y, Yang J, Adebisi B, Ci S, Gacanin H, Adachi F (2022) Malware traffic classification using domain adaptation and ladder network for secure industrial internet of things. IEEE Internet Things J 9(18):17058–17069
Lan J, Liu X, Li B, Zhao J (2023) A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection. Appl Intell 53(10):11705–11726
Wu J, Dai H, Wang Y, Ye K, Xu C (2023) Heterogeneous domain adaptation for iot intrusion detection: A geometric graph alignment approach. IEEE Internet Things J 10(12):10764–10777
Rahman SA, Tout H, Talhi C, Mourad A (2020) Internet of things intrusion detection: Centralized, on-device, or federated learning? IEEE Netw 34(6):310–317
Agrawal S, Sarkar S, Aouedi O, Yenduri G, Piamrat K, Alazab M, Bhattacharya S, Maddikunta PKR, Gadekallu TR (2022) Federated learning for intrusion detection system: Concepts, challenges and future directions. Comput Commun 195:346–361
Huang X, Liu J, Lai Y, Mao B, Lyu H (2023) Eefed: Personalized federated learning of execution &evaluation dual network for cps intrusion detection. IEEE Trans Inf Forensic Secur 18:41–56
Wang KIK, Zhou X, Liang W, Yan Z, She J (2022) Federated transfer learning based cross-domain prediction for smart manufacturing. IEEE Trans Ind Inf 18(6):4088–4096
Otoum Y, Yadlapalli SK, Nayak A (2022) Ftliot: A federated transfer learning framework for securing iot. In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference, pp 1146–1151
Fan Y, Li Y, Zhan M, Cui H, Zhang Y (2020) Iotdefender: A federated transfer learning intrusion detection framework for 5g iot. In: 2020 IEEE 14th international conference on big data science and engineering, pp 88–95
Ma J, Du M, Zheng H, Feng X (2021) Unsupervised federated adversarial domain adaptation for heterogeneous internet of things. In: 2021 17th international conference on mobility, sensing and networking, pp 520–5270
Liu Y, Kang Y, Xing C, Chen T, Yang Q (2020) A secure federated transfer learning framework. IEEE Intell Syst 35(4):70–82
Zhang W, Li X (2022) Federated transfer learning for intelligent fault diagnostics using deep adversarial networks with data privacy. IEEE/ASME Trans Mechatron 27(1):430–439
Vela M, Saxena N, Irizarry M (2011) Efficient neighbor list creation for cellular networks. Google Patents. US Patent 8,086,237
Zhao H, Wang C, Zhu Y, Lin W (2019) P2p network based on neighbor-neighbor lists. J Phys Conf Ser 1168:032072
McMahan B, Moore E, Ramage D, Hampson S, Y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, pp 1273–1282
Morris T, Gao W (2014) Industrial control system traffic data sets for intrusion detection research. In: Critical Infrastructure Protection VIII: 8th IFIP WG 11.10 International Conference, pp 65–78
Chen Y, Su S, Yu D, He H, Wang X, Ma Y, Guo H (2022) Cross-domain industrial intrusion detection deep model trained with imbalanced data. IEEE Internet Things J 10(1):584–596
Ganin Y, Ustinova E, Ajakan H, Germain P, Larochelle H, Laviolette F, Marchand M, Lempitsky V (2016) Domain-adversarial training of neural networks. J Mach Learn Res 17(1):2096–2030
Pei Z, Cao Z, Long M, Wang J (2018) Multi-adversarial domain adaptation. In: Proceedings of the AAAI conference on artificial intelligence, vol 32
Schneble W, Thamilarasu G (2019) Attack detection using federated learning in medical cyber-physical systems. Proceedings - international conference on computer communications and networks 29:1–8
Breiman L (2001) Random forests. Mach learn 45:5–32
Acknowledgements
The authors would like to thank the Editor-in-Chief, the Associate Editor, and the reviewers for their insightful comments and suggestions.
Funding
The work described in this paper is supported by the Primary Research & Development Plan of Hubei Province (No.2020BAA003).
Author information
Authors and Affiliations
Contributions
Lingzi Zhu proposed the concept of this study, wrote the original draft preparation, methodology and software. Bo Zhao provided the methodology. Jiabao Guo implemented the visualization. Minzhi Ji and Junru Peng contributed to the discussion of this study.
Corresponding authors
Ethics declarations
Conflict of interest:
The authors declare that they have no conflict of interest.
Ethics approval:
Not applicable.
Human Participants and/or Animals:
Not applicable.
Consent for publication:
All authors reviewed and provided consents for publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhu, L., Zhao, B., Guo, J. et al. A cutting-edge framework for industrial intrusion detection: Privacy-preserving, cost-friendly, and powered by federated learning. Appl Intell 55, 611 (2025). https://doi.org/10.1007/s10489-025-06404-6
Accepted:
Published:
DOI: https://doi.org/10.1007/s10489-025-06404-6