skip to main content
10.1145/3638682.3638685acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvsipConference Proceedingsconference-collections
research-article

Network Intrusion Detection Based on Federated Learning with Inherited Private Models

Published: 22 May 2024 Publication History

Abstract

To solve the problem of insufficient and imbalanced data in Network Intrusion Detection (NID) in practical scenarios, which leads to low detection accuracy of the model. We propose a network intrusion algorithm based on the Federated Learning with Inheritance Private Model (FedPHP), which applies Federation Learning (FL) to the field of NID to obtain a well-performing NID model in a privacy-preserving manner in scenarios with unbalanced small samples and multiple participants. This method uses oversampling to preprocess the data, and adds Inheritance Private Model (HPM), knowledge transfer and the matrix Adaptive motion estimation (Adam) algorithm in the training process. The experimental results show that each participant can still get a personalized model with high accuracy and strong robustness under the condition of providing limited data and not infringing the privacy of other parties. The average classification accuracy is 0.9874, and the performance is better than the traditional Deep Learning (DL) and FL network models.

References

[1]
Swimpy Pahuja and Anita Singhrova, " Preventive Alternate Path Routing Algorithm against Intrusion in Sensor Area Network," international journal of computer theory and engineering vol. 5, no. 2, pp. 188-191, 2013.
[2]
D. Zaripova “Network security issues and effective protection against network attacks,” International Journal on Integrated Education, vol. 4, no. 2, pp. 79–85, 2021
[3]
Sasanka Potluri and Christian Diedrich, "Deep Feature Extraction for multi-Class Intrusion Detection in Industrial Control Systems," International Journal of Computer Theory and Engineering vol. 9, no.5, pp. 374-379, 2017.
[4]
M. Mahboubian and Nor I. Udzir, "A Naturally Inspired Statistical Intrusion Detection Model," International Journal of Computer Theory and Engineering vol. 5, no. 3, pp. 578-581, 2013.
[5]
Bhargavi R. and V. Vaidehi, "Complex Event Processing for Object Tracking and Intrusion Detection in Wireless Sensor Networks," International Journal of Computer Theory and Engineering vol. 3, no. 3, pp. 435-439, 2011.
[6]
Karthikeyan K. R. and A. Indra, "Intrusion Detection Tools and Techniques –A Survey," International Journal of Computer Theory and Engineering vol. 2, no. 6, pp. 901-906, 2010.
[7]
LI Hui, GUAN Xiao-Hong, ZAN Xin, Network Intrusion Detection Based on Support Vector Machine [J]. Journal of computer research and development, 2003 (06):799-807.
[8]
U. Fiore, F. Palmieri, A. Castiglione, Network anomaly detection with the restricted Boltzmann machine [J]. Neurocomputing, 2013, 122:13-23.
[9]
MULAY S A, DEVALE P, GARJE G. Intrusion detection system using support vector machine and decision tree [J]. International journal of computer applications, 2010, 3(3):40-43.2.
[10]
Zhu Y, Gaba G, Almansour F, Application of data mining technology in detecting network intrusion and security maintenance. Journal of Intelligent Systems, 2021, 30(1):664-676.
[11]
Imrana Y, Xiang Y, Ali L, A bidirectional LSTM deep learning approach for intrusion detection [J].Expert Systems with Applications, 2021, 185(8):115524.
[12]
Lopez-Martin M, Carro B, Sanchez-Esguevillas A. Application of deep reinforcement learning to intrusion detection for supervised problems [J].Expert Systems with Application, 2020, 141(Mar.):112963.1-112963.15.
[13]
Maheyzah Md Siraj, Mohd Aizaini Maarof and Siti Zaiton Mohd Hashim, "A Hybrid Intelligent Approach for Automated Alert Clustering and Filtering in Intrusion Alert Analysis," International Journal of Computer Theory and Engineering vol. 1, no. 5, pp. 539-545, 2009.
[14]
Dai, Rong, Li Shen, Fengxiang He, Dispfl: Towards communication-efficient personalized federated learning via decentralized sparse training [J]. International Conference on Machine Learning (2022).
[15]
Hinton G, Vinyals O, Dean J. Distilling the knowledge in a neural network [J]. Computer Science, 2015,14(7):38-39.
[16]
Geiping J, Bauermeister H, Dröge H, Inverting gradients-how easy is it to break privacy in federated learning? [J]. Advances in Neural Information Processing Systems, 2020,33:16937-16947.
[17]
Zhu L, Liu Z, Han S. Deep leakage from gradients [J]. Advances in neural information processing systems, 2019,32.
[18]
Yang Qiang, Liu Yang, Cheng Yong, etc. Federated learning [M]. Beijing: Electronic Industry Press, 2020:18-33
[19]
Wang Jianzong. Principles and Algorithms of Federated learning [M]. Beijing: People's Posts and Telecommunications Press, 2021:28-32
[20]
Xiao Y H, Xing C, Zhang T N, An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks[J]. IEEE Access, 2019, 7:42210-42219.
[21]
Chaibi N, Atmani B, Mokaddem M. "Deep Learning Approaches to Intrusion Detection: A new Performance of ANN and RNN on NSL-KDD." ISPR '20: The international conference on Intelligent systems and Pattern recognition 2020.
[22]
McMahan, H.B., Moore, E., Ramage, D., “Communication-Efficient Learning of Deep Networks from Decentralized Data.” International Conference on Artificial Intelligence and Statistics (2016).
[23]
Li, T., Sahu, A.K., Zaheer, M., Sanjabi, Federated optimization in heterogeneous networks. Proceedings of Machine Learning and Systems (2020)
[24]
Yao X., Huang C., Sun L. “Two-Stream Federated Learning: Reduce the Communication Costs.” 2018 IEEE Visual Communications and Image Processing (VCIP) (2018): 1-4.
[25]
Karimireddy, S.P., Kale, S., Mohri, M., SCAFFOLD: Stochastic Controlled Averaging for Federated Learning. International Conference on Machine Learning (2020)
[26]
Li, Q., He, B., Song, D.X. “Model-Contrastive Federated Learning.” 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2021): 10708-10717.

Index Terms

  1. Network Intrusion Detection Based on Federated Learning with Inherited Private Models

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    VSIP '23: Proceedings of the 2023 5th International Conference on Video, Signal and Image Processing
    November 2023
    237 pages
    ISBN:9798400709272
    DOI:10.1145/3638682
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 May 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Federated Learning
    2. Network Intrusion Detection
    3. Privacy Protection

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    VSIP 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 38
      Total Downloads
    • Downloads (Last 12 months)38
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media