Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection (2306.13029v2)
Abstract: Cyberattacks are increasingly threatening networked systems, often with the emergence of new types of unknown (zero-day) attacks and the rise of vulnerable devices. Such attacks can also target multiple components of a Supply Chain, which can be protected via Machine Learning (ML)-based Intrusion Detection Systems (IDSs). However, the need to learn large amounts of labelled data often limits the applicability of ML-based IDSs to cybersystems that only have access to private local data, while distributed systems such as Supply Chains have multiple components, each of which must preserve its private data while being targeted by the same attack To address this issue, this paper proposes a novel Decentralized and Online Federated Learning Intrusion Detection (DOF-ID) architecture based on the G-Network model with collaborative learning, that allows each IDS used by a specific component to learn from the experience gained in other components, in addition to its own local data, without violating the data privacy of other components. The performance evaluation results using public Kitsune and Bot-IoT datasets show that DOF-ID significantly improves the intrusion detection performance in all of the collaborating components, with acceptable computation time for online learning.
- A. Levi, E. Çetintaş, M. Aydos, Ç. K. Koç, and M. U. Çağlayan, “Relay attacks on bluetooth authentication and solutions,” in 2004 International Symposium on Computer and Information Sciences, LNCS 3280. Springer Cham, 2004, pp. 278–288.
- M. Akgün and M. U. Çağlayan, “Providing destructive privacy and scalability in RFID systems using PUFs,” Ad Hoc Networks, vol. 32, pp. 32–42, 2015.
- E. Gelenbe and F.-J. Wu, “Future research on cyber-physical emergency management systems,” Future Internet, vol. 5, no. 3, pp. 336–354, 2013.
- A. F. Skarmeta, J. L. Hernandez-Ramos, and M. V. Moreno, “A decentralized approach for security and privacy challenges in the internet of things,” in 2014 IEEE world forum on Internet of Things (WF-IoT), 2014, pp. 67–72.
- M. U. Çağayan, “Review of some recent European Cybersecurity Research and Innovation Projects,” Infocommunications Journal, vol. 14, no. 4, pp. 70–78, 2022. [Online]. Available: https://doi.org/10.36244/ICJ.2022.4.10
- M. A. Alsoufi, S. Razak, M. M. Siraj, I. Nafea, F. A. Ghaleb, F. Saeed, and M. Nasser, “Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review,” Applied sciences, vol. 11, no. 18, p. 8383, 2021.
- P. Maniriho, E. Niyigaba, Z. Bizimana, V. Twiringiyimana, L. J. Mahoro, and T. Ahmad, “Anomaly-based intrusion detection approach for iot networks using machine learning,” in 2020 international conference on computer engineering, network, and intelligent multimedia (CENIM). IEEE, 2020, pp. 303–308.
- E. Gelenbe and M. Nakıp, “Traffic based sequential learning during botnet attacks to identify compromised IoT devices,” IEEE Access, vol. 10, pp. 126 536–126 549, 2022.
- A. Nisioti, A. Mylonas, P. D. Yoo, and V. Katos, “From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods,” IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3369–3388, 2018.
- I. H. Sarker, “Cyberlearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks,” Internet of Things, vol. 14, p. 100393, 2021.
- P. Kairouz, et al., “Advances and open problems in federated learning,” 2019. [Online]. Available: https://arxiv.org/pdf/1912.04977.pdf
- N. M. Gökhan, “Development of a simultaneous design for supply chain process for the optimization of the product design and supply chain configuration problem,” Engineering Management Journal, vol. 2, no. 4, p. 20–30, 2010.
- R. J. Bowman, “Seven Best Practices for Supply Chains in 2025,” SupplyChainBrain, 2014. [Online]. Available: https://www.supplychainbrain.com/blogs/1-think-tank/post/19530-seven-best-practices-for-supply-chains-in-2025
- A. Frötscher, B. Monschiebl, A. Drosou, E. Gelenbe, M. J. Reed, and M. Al-Naday, “Improve cybersecurity of c-its road side infrastructure installations: the seriot-secure and safe iot approach,” in 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2019, pp. 1–5.
- S. R. Pokhrel and J. Choi, “Federated learning with blockchain for autonomous vehicles: Analysis and design challenges,” EEE Transactions on Communications, vol. 68, no. 8, p. 4734–4746, 2020.
- S. Savazzi, M. Nicoli, and V. Rampa, “Federated learning with cooperating devices: A consensus approach for massive iot networks,” IEEE Internet of Things Journal, no. 5, p. 4641–4654, 2020.
- Z. Xu, F. Yu, J. Xiong, and X. Chen, “Helios: Heterogeneity-aware federated learning with dynamically balanced collaboration,” in 2021 58th ACM/IEEE Design Automation Conference (DAC), 2021, p. 997–1002.
- E. Gelenbe and Y. Wang, “Supply chains for perishable goods and g-networks,” in 2019 14th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2019, pp. 167–172.
- R. Setzler, “The eu’s new supply chain law – what you should know,” July 2021.
- A. S. Patrucco, G. Marzi, and D. Trabucchi, “The role of absorptive capacity and big data analytics in strategic purchasing and supply chain management decisions,” Technovation, vol. 126, p. 102814, 2023.
- E. Gelenbe, “G-networks with instantaneous customer movement,” Journal of Applied Probability, vol. 30, no. 3, pp. 742–748, 1993.
- ——, “Random neural networks with negative and positive signals and product form solution,” Neural Computation, vol. 1, no. 4, pp. 502–510, 1989.
- O. Brun, Y. Yin, and E. Gelenbe, “Deep learning with dense random neural network for detecting attacks against iot-connected home environments,” Procedia Computer Science, vol. 134, pp. 458–463, 2018.
- E. Gelenbe and M. Nakıp, “G-networks can detect different types of cyberattacks,” in 2022 30th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). IEEE, 2022, pp. 9–16.
- R. Taheri, M. Shojafar, M. Alazab, and R. Tafazolli, “Fed-iiot: A robust federated malware detection architecture in industrial iot,” IEEE Transactions on Industrial Informatics, vol. 17, no. 12, pp. 8442–8452, 2020.
- Z. Li, X. Wu, and C. Jiang, “Efficient poisoning attacks and defenses for unlabeled data in ddos prediction of intelligent transportation systems,” Security and Safety, vol. 1, p. 2022003, Jun 2022.
- E. M. Campos, P. F. Saura, A. González-Vidal, J. L. Hernández-Ramos, J. B. Bernabé, G. Baldini, and A. Skarmeta, “Evaluating federated learning for intrusion detection in internet of things: Review and challenges,” Computer Networks, vol. 203, p. 108661, 2022.
- T. D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, and A.-R. Sadeghi, “Dïot: A federated self-learning anomaly detection system for iot,” in 2019 IEEE 39th International conference on distributed computing systems (ICDCS). IEEE, 2019, pp. 756–767.
- V. Mothukuri, P. Khare, R. M. Parizi, S. Pouriyeh, A. Dehghantanha, and G. Srivastava, “Federated-learning-based anomaly detection for iot security attacks,” IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2545–2554, 2021.
- J. Li, L. Lyu, X. Liu, X. Zhang, and X. Lyu, “Fleam: A federated learning empowered architecture to mitigate ddos in industrial iot,” IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 4059–4068, 2021.
- G. Lu, Z. Xiong, R. Li, N. Mohammad, Y. Li, and W. Li, “Defeat: A decentralized federated learning against gradient attacks,” High-Confidence Computing, p. 100128, 2023.
- Z. Lian and C. Su, “Decentralized federated learning for internet of things anomaly detection,” in Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 2022, pp. 1249–1251.
- R. Al Mallah and D. López, “Blockchain-based monitoring for poison attack detection in decentralized federated learning,” in 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). IEEE, 2022, pp. 1–6.
- E. Gelenbe and Y. Yin, “Deep learning with random neural networks,” in 2016 International Joint Conference on Neural Networks (IJCNN), 2016, pp. 1633–1638.
- Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, “Kitsune: An ensemble of autoencoders for online network intrusion detection,” in The Network and Distributed System Security Symposium (NDSS) 2018, 2018.
- “Kitsune Network Attack Dataset,” August 2020. [Online]. Available: https://www.kaggle.com/ymirsky/network-attack-dataset-kitsune
- N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset,” Future Generation Computer Systems, vol. 100, pp. 779–796, 2019.
- E. Gelenbe, “Energy packet networks: Ict based energy allocation and storage,” in International Conference on Green Communications and Networking. Springer, Cham, 2011, pp. 186–195.
- B. Pernici, et al., “What is can do for environmental sustainability: a report from caise’11 panel on green and sustainable is,” Communications of the Association for Information Systems, vol. 30, no. 1, p. 18, 2012.
- G. S. Kuaban, E. Gelenbe, T. Czachórski, P. Czekalski, and J. K. Tangka, “Modelling of the energy depletion process and battery depletion attacks for battery-powered internet of things (iot) devices,” Sensors, vol. 23, no. 13, p. 6183, 2023.
- P. Liu, X. Xu, and W. Wang, “Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives,” Cybersecurity, vol. 5, no. 4, 2022. [Online]. Available: https://doi.org/10.1186/s42400-021-00105-6
- Mert Nakıp (8 papers)
- Baran Can Gül (2 papers)
- Erol Gelenbe (31 papers)