A Novel Federated Learning-Based IDS for Enhancing UAVs Privacy and Security (2312.04135v3)
Abstract: Unmanned aerial vehicles (UAVs) operating within Flying Ad-hoc Networks (FANETs) encounter security challenges due to the dynamic and distributed nature of these networks. Previous studies focused predominantly on centralized intrusion detection, assuming a central entity responsible for storing and analyzing data from all devices. However, these approaches face challenges including computation and storage costs, along with a single point of failure risk, threatening data privacy and availability. The widespread dispersion of data across interconnected devices underscores the need for decentralized approaches. This paper introduces the Federated Learning-based Intrusion Detection System (FL-IDS), addressing challenges encountered by centralized systems in FANETs. FL-IDS reduces computation and storage costs for both clients and the central server, which is crucial for resource-constrained UAVs. Operating in a decentralized manner, FL-IDS enables UAVs to collaboratively train a global intrusion detection model without sharing raw data, thus avoiding delay in decisions based on collected data, as is often the case with traditional methods. Experimental results demonstrate FL-IDS's competitive performance with Central IDS (C-IDS) while mitigating privacy concerns, with the Bias Towards Specific Clients (BTSC) method further enhancing FL-IDS performance even at lower attacker ratios. Comparative analysis with traditional intrusion detection methods, including Local IDS (L-IDS), sheds light on the strengths of FL-IDS. This study significantly contributes to UAV security by introducing a privacy-aware, decentralized intrusion detection approach tailored to UAV networks. Moreover, by introducing a realistic dataset for FANETs and federated learning, our approach differs from others lacking high dynamism and 3D node movements or accurate federated data federations.
- I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying ad-hoc networks (fanets): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013.
- A. D. Boursianis, M. S. Papadopoulou, P. Diamantoulakis, A. Liopa-Tsakalidi, P. Barouchas, G. Salahas, G. Karagiannidis, S. Wan, and S. K. Goudos, “Internet of things (iot) and agricultural unmanned aerial vehicles (uavs) in smart farming: A comprehensive review,” Internet of Things, vol. 18, p. 100187, 2022.
- G. A. Kakamoukas, P. G. Sarigiannidis, and A. A. Economides, “Fanets in agriculture-a routing protocol survey,” Internet of Things, vol. 18, p. 100183, 2022.
- J.-P. Yaacoub, H. Noura, O. Salman, and A. Chehab, “Security analysis of drones systems: Attacks, limitations, and recommendations,” Internet of Things, vol. 11, p. 100218, 2020.
- J. Sharma and P. S. Mehra, “Secure communication in iot-based uav networks: A systematic survey,” Internet of Things, p. 100883, 2023.
- K.-Y. Tsao, T. Girdler, and V. G. Vassilakis, “A survey of cyber security threats and solutions for uav communications and flying ad-hoc networks,” Ad Hoc Networks, vol. 133, p. 102894, 2022.
- A. Chriki, H. Touati, H. Snoussi, and F. Kamoun, “Fanet: Communication, mobility models and security issues,” Computer Networks, vol. 163, p. 106877, 2019.
- G. Amponis, T. Lagkas, P. Sarigiannidis, V. Vitsas, P. Fouliras, and S. Wan, “A survey on fanet routing from a cross-layer design perspective,” Journal of Systems Architecture, vol. 120, p. 102281, 2021.
- O. Ceviz, P. Sadioglu, and S. Sen, “Analysis of routing attacks in fanets,” in Ad Hoc Networks and Tools for IT. Springer, 2021, pp. 3–17.
- M. Nayfeh, Y. Li, K. Al Shamaileh, V. Devabhaktuni, and N. Kaabouch, “Machine learning modeling of gps features with applications to uav location spoofing detection and classification,” Computers & Security, vol. 126, p. 103085, 2023.
- S. Ouiazzane, F. Barramou, and M. Addou, “Towards a Multi-Agent based Network Intrusion Detection System for a Fleet of Drones,” Int. J. Adv. Comput. Sci. Appl., vol. 11, no. 10, pp. 351–362, 2020.
- C. Zhang, Y. Xie, H. Bai, B. Yu, W. Li, and Y. Gao, “A survey on federated learning,” Knowledge-Based Systems, vol. 216, p. 106775, 2021.
- Z. Baig, N. Syed, and N. Mohammad, “Securing the smart city airspace: Drone cyber attack detection through machine learning,” Future Internet, vol. 14, no. 7, p. 205, 2022.
- Labs, “V. drone forensics,” 2020. [Online]. Available: https://www.vtolabs.com/drone-forensics(accessedon15April2022)
- L. M. da Silva, H. B. d. B. Menezes, M. d. S. Luccas, C. Mailer, A. S. R. Pinto, A. Boava, M. Rodrigues, I. G. Ferrão, J. C. Estrella, and K. R. L. J. C. Branco, “Development of an efficiency platform based on mqtt for uav controlling and dos attack detection,” Sensors, vol. 22, no. 17, p. 6567, 2022.
- C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, “Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 184–208, 2015.
- R. Shrestha, A. Omidkar, S. A. Roudi, R. Abbas, and S. Kim, “Machine-learning-enabled intrusion detection system for cellular connected uav networks,” Electronics, vol. 10, no. 13, p. 1549, 2021.
- D. Chulerttiyawong and A. Jamalipour, “Sybil attack detection in internet of flying things-ioft: A machine learning approach,” IEEE Internet of Things Journal, 2023.
- A. Varga, “Omnet++,” in Modeling and tools for network simulation. Springer, 2010, pp. 35–59.
- W. Zhai, L. Liu, Y. Ding, S. Sun, and Y. Gu, “Etd: An efficient time delay attack detection framework for uav networks,” IEEE Transactions on Information Forensics and Security, 2023.
- A. Keränen, J. Ott, and T. Kärkkäinen, “The one simulator for dtn protocol evaluation,” in Proceedings of the 2nd international conference on simulation tools and techniques, 2009, pp. 1–10.
- Q. Abu Al-Haija and A. Al Badawi, “High-performance intrusion detection system for networked uavs via deep learning,” Neural Computing and Applications, vol. 34, no. 13, pp. 10 885–10 900, 2022.
- L. Zhao, A. Alipour-Fanid, M. Slawski, and K. Zeng, “Prediction-time efficient classification using feature computational dependencies,” in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018, pp. 2787–2796.
- R. A. Ramadan, A. H. Emara, M. Al-Sarem, and M. Elhamahmy, “Internet of drones intrusion detection using deep learning,” Electron., vol. 10, no. 21, 2021.
- KDD Cup 1999, “Kdd cup 1999,” http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, October 2007.
- M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009, pp. 1–6.
- O. Bouhamed, O. Bouachir, M. Aloqaily, and I. Al Ridhawi, “Lightweight ids for uav networks: A periodic deep reinforcement learning-based approach,” in 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 2021, pp. 1032–1037.
- R. Panigrahi and S. Borah, “A detailed analysis of cicids2017 dataset for designing intrusion detection systems,” International Journal of Engineering & Technology, vol. 7, no. 3.24, pp. 479–482, 2018.
- M. P. Arthur, “Detecting signal spoofing and jamming attacks in uav networks using a lightweight ids,” in 2019 international conference on computer, information and telecommunication systems (CITS). IEEE, 2019, pp. 1–5.
- H. Sedjelmaci, S. M. Senouci, and N. Ansari, “A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks,” IEEE Trans. Syst. Man, Cybern. Syst., vol. 48, no. 9, pp. 1594–1606, 2018.
- N. I. Mowla, N. H. Tran, I. Doh, and K. Chae, “Federated learning-based cognitive detection of jamming attack in flying ad-hoc network,” IEEE Access, vol. 8, pp. 4338–4350, 2019.
- ——, “Afrl: Adaptive federated reinforcement learning for intelligent jamming defense in fanet,” Journal of Communications and Networks, vol. 22, no. 3, pp. 244–258, 2020.
- L. M. Da Silva, I. G. Ferrão, C. Dezan, D. Espes, and K. R. Branco, “Anomaly-based intrusion detection system for in-flight and network security in uav swarm,” in 2023 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 2023, pp. 812–819.
- “The ns-3 network simulator,” http://www.nsnam.org/.
- O. Puñal, C. Pereira, A. Aguiar, and J. Gross, “Crawdad dataset uportorwthaachen/vanetjamming2014 (v. 2014-05-12),” 2014.
- J. Whelan, T. Sangarapillai, O. Minawi, A. Almehmadi, and K. El-Khatib, “Novelty-based intrusion detection of sensor attacks on unmanned aerial vehicles,” in Proceedings of the 16th ACM symposium on QoS and security for wireless and mobile networks, 2020, pp. 23–28.
- B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial intelligence and statistics. PMLR, 2017, pp. 1273–1282.
- S. Reddi, Z. Charles, M. Zaheer, Z. Garrett, K. Rush, J. Konečnỳ, S. Kumar, and H. B. McMahan, “Adaptive federated optimization,” arXiv preprint arXiv:2003.00295, 2020.
- M. A. Ferrag, O. Friha, L. Maglaras, H. Janicke, and L. Shu, “Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis,” IEEE Access, vol. 9, pp. 138 509–138 542, 2021.
- S. A. Rahman, H. Tout, C. Talhi, and A. Mourad, “Internet of things intrusion detection: Centralized, on-device, or federated learning?” IEEE Network, vol. 34, no. 6, pp. 310–317, 2020.
- I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating a new intrusion detection dataset and intrusion traffic characterization.” ICISSp, vol. 1, pp. 108–116, 2018.
- N. Moustafa and J. Slay, “Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set),” in 2015 military communications and information systems conference (MilCIS). IEEE, 2015, pp. 1–6.
- I. Almomani, B. Al-Kasasbeh, M. Al-Akhras et al., “Wsn-ds: A dataset for intrusion detection systems in wireless sensor networks,” Journal of Sensors, vol. 2016, 2016.
- N. Moustafa, “New generations of internet of things datasets for cybersecurity applications based machine learning: Ton_iot datasets,” in Proceedings of the eResearch Australasia Conference, Brisbane, Australia, 2019, pp. 21–25.
- N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset,” Future Generation Computer Systems, vol. 100, pp. 779–796, 2019.
- I. Vaccari, G. Chiola, M. Aiello, M. Mongelli, and E. Cambiaso, “Mqttset, a new dataset for machine learning techniques on mqtt,” Sensors, vol. 20, no. 22, p. 6578, 2020.
- S. Agrawal, S. Sarkar, O. Aouedi, G. Yenduri, K. Piamrat, M. Alazab, S. Bhattacharya, P. K. R. Maddikunta, and T. R. Gadekallu, “Federated learning for intrusion detection system: Concepts, challenges and future directions,” Computer Communications, 2022.
- H. Ullah, M. Abu-Tair, S. McClean, P. Nixon, G. Parr, and C. Luo, “An unmanned aerial vehicle based wireless network for bridging communication,” in Proc. - 14th Int. Symp. Pervasive Syst. Algorithms Networks, I-SPAN 2017, 11th Int. Conf. Front. Comput. Sci. Technol. FCST 2017 3rd Int. Symp. Creat. Comput. ISCC 2017, 2017.
- L. Che, J. Wang, Y. Zhou, and F. Ma, “Multimodal federated learning: A survey,” Sensors, vol. 23, no. 15, p. 6986, 2023.
- A. Daniel, “A Survey on Detection of Sinkhole Attack in Wireless Sensor Networks,” vol. 91, no. 7, pp. 48–52, 2014.
- O. Ceviz, P. Sadioglu, and S. Sen, “A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions,” arXiv preprint arXiv:2306.14281, 2023.
- S. Sen and J. A. Clark, “Evolutionary computation techniques for intrusion detection in mobile ad hoc networks,” Computer Networks, vol. 55, no. 15, pp. 3441–3457, 2011.
- E. Canbalaban and S. Sen, “A cross-layer intrusion detection system for rpl-based internet of things,” in Ad-Hoc, Mobile, and Wireless Networks: 19th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020, Bari, Italy, October 19–21, 2020, Proceedings 19. Springer, 2020, pp. 214–227.