Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3605098.3636183acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Improving Privacy in Federated Learning-Based Intrusion Detection for IoT Networks

Published: 21 May 2024 Publication History

Abstract

Federated learning has emerged as a leading machine learning paradigm, promising to preserve data privacy while collaboratively training models. This approach is increasingly finding applications in the Internet of Things, particularly in the context of intrusion detection. However, most federated learning-based intrusion detection systems focus on detecting attacks that target or originate from network devices. Regrettably, federated learning systems are not immune to attacks by adversaries aimed at inferring information about device data. During model updates, learning processes and aggregation, malicious aggregators have the potential to infer information about client data. Secure aggregation is used to collect and consolidate model updates from various devices, ensuring privacy in individual contributions. However, current protocols face challenges such as high number of communication rounds, communication overhead and computation costs, all of which negatively impact model performance. This work aims to find the best balance between cost, privacy and effectiveness by studying different secure aggregation methods (multi-party computation, differential privacy and homomorphic encryption) to reach the best approach to improve privacy in intrusion detection systems based on federated learning for the Internet of Things, without affecting performance.

References

[1]
Shaashwat Agrawal, Sagnik Sarkar, Ons Aouedi, Gokul Yenduri, Kandaraj Piamrat, Mamoun Alazab, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, and Thippa Reddy Gadekallu. 2022. Federated Learning for intrusion detection system: Concepts, challenges and future directions. Computer Communications 195 (2022), 346--361.
[2]
Turki Aljrees, Ankit Kumar, Kamred Udham Singh, and Teekam Singh. 2023. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm. Sensors 23, 19 (2023), 8090.
[3]
Ronald Cramer, Ivan Bjerre Damgård, and Jesper Buus Nielsen. 2015. Secure Multiparty Computation and Secret Sharing. Cambridge University Press, Cambridge.
[4]
Damien Desfontaines. 2018. Differential Privacy formal definition. Tumult Labs. Retrieved Oct 11, 2023 from https://desfontain.es/privacy/differential-privacy-in-more-detail.html
[5]
Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering andThien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi andThomas Schneider, Hossein Yalame, and Shaza Zeitouni. 2021. SAFELearn: Secure Aggregation for private FEderated Learning. In IEEE Security and Privacy Workshops (SPW). IEEE Computer Society, Los Alamitos, CA, USA, 56--62.
[6]
Brendan McMahan and Daniel Ramage. 2017. Federated learning: Collaborative machine learning without centralized training data. Google Research Blog 3 (2017).
[7]
Jed Mills, Jia Hu, and Geyong Min. 2019. Communication-efficient federated learning for wireless edge intelligence in IoT. IEEE Internet of Things Journal 7, 7 (2019), 5986--5994.
[8]
Viraaji Mothukuri, Prachi Khare, Reza M Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, and Gautam Srivastava. 2021. Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet of Things Journal 9, 4 (2021), 2545--2554.
[9]
Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, Nadarajah Asokan, and Ahmad-Reza Sadeghi. 2019. DÏoT: A Federated Self-learning Anomaly Detection System for IoT. In IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE Computer Society, Los Alamitos, CA, USA, 756--767.
[10]
Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H Yang, Farhad Farokhi, Shi Jin, Tony QS Quek, and H Vincent Poor. 2020. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security 15 (2020), 3454--3469.
[11]
Elisa Bertino Xun Yi, Russell Paulet. 2014. Homomorphic Encryption and Applications. Springer Cham, Switzerland AG.

Index Terms

  1. Improving Privacy in Federated Learning-Based Intrusion Detection for IoT Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing
      April 2024
      1898 pages
      ISBN:9798400702433
      DOI:10.1145/3605098
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 May 2024

      Check for updates

      Author Tags

      1. federated learning
      2. internet of things
      3. intrusion detection
      4. privacy-preserving
      5. secure aggregation

      Qualifiers

      • Poster

      Funding Sources

      • MCIN/AEI/10.13039/501100011033/FEDER, EU

      Conference

      SAC '24
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 26
        Total Downloads
      • Downloads (Last 12 months)26
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 15 Oct 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media