Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges
Abstract
:1. Introduction
- Edge device heterogeneity that may result in different data formats and attributes, and may require customizing local models.
- Non-IID (identically and independently distributed) data. It is a natural case that clients could have different features and/or label distribution as the data sources may be located in different geographical locations or time zones. The non-IID data also correspond to the cases with concept shift and/or drift, and skew in data amount held by different clients.
- Bias introduced by data owners’ behavior, as the availability of the devices may change during the training process, and clients with more stable behavior may have a stronger impact on the results of training.
- FL system parameters tuning such as resource use on clients, learning throughput (number of clients, model complexity, etc).
- The review of the architectures of the federated learning systems, including supported data partitions and requirements to the clients’ availability and their computational resources.
- The review of the datasets that were used to evaluate the system and approaches to model federated settings.
- Comparative analysis of the proposed systems.
2. Federated Learning Systems
- Clients that own data and train local model;
- Server that coordinates the whole training process and computes the global model;
- Communication environment.
- Communication scheme or FL topology [18];
- Computational and network resources available to collaborating clients;
- Type of the data partition.
- Mechanisms based on differential privacy (DP);
- Data and model encryption techniques that include multi-party secure computations (MPC), homomorphic and functional encryption;
- Trusted execution environment (TEE).
3. Intrusion Detection Systems
4. Intrusion Detection Systems Based on Federated Learning
- RQ1.
- Which FL architectures are used for the intrusion detection systems?
- RQ2.
- Which data partitions and datasets are used to test the proposed solutions?
- RQ3.
- Which types of attacks can be detected using the developed solutions?
- RQ4.
- Which ML methods are used to detect attacks and/or anomalies?
- RQ5.
- How do the authors implement their solutions?
- RQ6.
- How do the authors test their solutions?
- RQ7.
- What metrics do the authors use to validate their solutions?
- FL architecture, i.e., what communication topology (centralized or decentralized) is used;
- Data partition and dataset used;
- Attacks detected;
- ML method used to detect attacks and/or anomalies;
- Software implementation, including FL frameworks used;
- Conducted experiments;
- Used metrics and advantages.
4.1. Comparative Analysis of Federated-Learning-Based Intrusion Detection Systems
4.1.1. The Federated Learning-Based Intrusion Detection Systems for Smart Home Settings
- Accuracy, which is calculated as ratio of (true positives + true negatives) to the (true positives + false positives + false negatives + true negatives);
- Precision, which is calculated as ratio of true positives to the (true positives + false positives);
- Recall, which is calculated as ratio of (true positives) to the (true positives + false negatives);
- F1-score, which is calculated as ratio of (recall precision) to (recall+precision) multiplied on 2;
- False positive rate (FPR), which is calculated as ratio of false positives to the (false positives + true negatives).
- The impact of non-independent and identically distributed data is considered;
- Different aggregation methods are considered;
- Different data distributions are considered;
- Different training rounds are considered;
- The attacks detection is considered to deploy the most effective countermeasures dynamically;
- The Fed+ is used firstly for the FL-enabled IDS for IoT.
- The research is only focused on the impact of different data distributions;
- The network traffic from IoT_ToN dataset is used without consideration of the IoT devices telemetry.
- Gated recurrent unit (GRU) network—the Keras [67] library with Tensorflow backend;
- False positive and true positive rate;
- Average detection time: 257 ± 194 ms;
- Processing performance of GRU—average processing time per symbol (packet) for prediction—0.081 (±0.001) ms for the desktop utilizing its GPU and 0.592 (±0.001) ms when executed on the laptop with CPU;
- On average, training a GRU model for one device type took 26 min on the desktop and 71 min on the laptop hardware.
- Implemented;
- Collected dataset of network traffic of test IoT devices communication behavior (33 devices, 23 types), dataset of consumer IoT devices (14 devices), dataset of infected with Mirai malware (5 devices) [3];
- Experiments with real IoT devices;
- For Mirai malware: 95.6% detection rate and ≈257 ms at detecting compromised devices;
- No false alarms;
- Does not require any human intervention or labeled data to operate;
- Learns anomaly detection models autonomously, using unlabeled crowdsourced data captured in client IoT networks.
- True positive rate, which is calculated as ratio of true positives to the (true positives + false negatives);
- True negative rate, which is calculated as ratio of true negatives to the (true negatives + false positives);
- Accuracy, which is calculated as ratio of (true positives + true negatives) to the (true positives + false positives + false negatives + true negatives);
- F1-score, which is calculated as ratio of true positives to the (true positives + 1/2 of (false positives + false negatives)).
- Implemented (code is available at [69]);
- The N-BaIoT dataset was used for the experiments;
- Preserves the security and privacy of the model;
- Obtained results for FL methods are close to the results obtained using centralized models while preserving the privacy;
- The malware threats are considered;
- The cyberthreats against federated learning framework are considered;
- Different data partitions are investigated.
- Complexity of the algorithms;
- The training time performance (the time of reading data for the training phase);
- Accuracy (the total number of correctly predicted samples in all tests);
- Detection rate (DR) (the number of the actual positives that are predicted as positive);
- Precision (the ratio of true positives to the (true positive + false positive);
- Recall (the ratio of true positives to the (true positive + false negative);
- F1-score (2 multiplied by the ratio of (precision * recall) to the (precision + recall);
- CPU and RAM usage.
- Novel attack detection mechanism LocKedge is introduced; the experiments show the higher performance of the proposed mechanism compared to other ML methods;
- The real traffic BoT-IoT dataset is used;
- The edge computing capacity is evaluated.
- Accuracy;
- Detection rate;
- False alarm rate (FAR)—the percentage of benign data samples incorrectly classified;
- F1-measure.
- Hierarchical FL-based IDS supports large-scale deployments and solves the problem of aggregation of large number of local updates from the numerous IoT endpoints.
- Some types of the “unseen” attacks are reliably detected. However, this is true only for DDoS and DoS attacks.
- Application of the blockchain smart contracts provides a defense mechanism against data/model poisoning attacks.
- TP, FN, FP, and TN;
- Accuracy;
- Precision;
- Recall;
- F1-score;
- AUC (area under curve)—the area of ROC curve;
- Time.
- Implemented;
- Preserves the security and privacy of the model;
- Describes and analyzes privacy-preserving mechanism;
- Discusses the optimal block file segmentation size in the fabric storage scheme (64 KB);
- Outperforms other models selected for comparison considering the selected metrics;
- The following threats are considered: DoS, Probe, R2L, and U2R.
4.1.2. The Federated-Learning-Based Intrusion Detection Systems for Industrial Cyber-Physical Systems
- Accuracy = 99.20% for three industrial agents, 99.20% for five industrial agents, and 99.20% for seven industrial agents;
- Precision = 98.86% for three industrial agents, 98.85% for five industrial agents, and 98.85% for seven industrial agents;
- Recall = 97.34% for three industrial agents, 97.45% for five industrial agents, and 97.47% for seven industrial agents;
- F-score = 98.08% for three industrial agents, 98.13% for five industrial agents, and 98.14% for five industrial agents.
- Implemented;
- Preserves the security and privacy of the model;
- The experiments are performed on a real industrial cyber-physical systems (CPS) dataset;
- Outperforms other models selected for comparison considering the selected metrics;
- The following threats are considered: DoS, DDoS, command injection, response injection attacks, reconnaissance attacks, response injection attacks, and command injection attack;
- The cyberthreats against a federated learning framework are considered: eavesdropping of data resources, eavesdropping of model parameters.
- True positive (), true negative (), false positive (), and false negative ().
- Accuracy (), which is calculated as follows:
- Privacy.
- Time.
- Implemented;
- Preserves the security and privacy of the model;
- Outperforms other models selected for comparison considering the selected metrics;
- Anomaly-based and thus can detect attacks of various types;
- The performance in terms of accuracy, privacy, and time is evaluated.
- Accuracy;
- Time of the training and inference time.
- Preserves the security and privacy of the model as the additional homomorphic encryption is implemented to secure clients inputs;
- The accuracy of GBDT in FL mode is comparable with GBDT in centralized mode, reaching 99% of the accuracy;
- The performance in terms of accuracy, privacy, and time is evaluated.
- Major limitation of the approach is the duration of the inference—it takes approximately 40 min, which is unacceptable for intrusion detection;
- The choice of the metrics assessing the models are limited by the FATE framework;
- The aggregation algorithm does not tolerate clients’ dropouts.
4.1.3. The Federated-Learning-Based Intrusion Detection Systems for Specific Areas
- Time complexity;
- Power consumption;
- True positive (the number of correctly classified as attacks attack samples);
- False positive (the number of wrongly classified as attacks benign samples);
- True negative (the number of correctly classified benign samples);
- False negative (the number of wrongly classified as benign attacks samples).
- Accuracy (the ratio of correct classifications number to the total input number), which is calculated as the ratio of (true positive + true negative) to the (true positive + true negative + false positive + false negative);
- Precision (the ratio of correct attack classifications to the total number of attack results predicted), which is calculated as the ratio of true positive to the (true positive + false positive);
- Recall (the ratio of correct attack classifications to the total number of all samples that should have been identified as attacks), which is calculated as the ratio of true positive to the (true positive + false negative);
- F1-score (the harmonic mean between precision and recall), which is calculated as the ratio of (precision × recall) to the (precision + recall) multiplied by two.
- Implemented;
- The MQTTset dataset that contains MQTT-protocol-based communications between IoT devices is used for the experiments;
- The time complexity and power consumption are calculated;
- The time complexity and power consumption are evaluated on the experiments;
- Two data partition cases are considered;
- The results are close to the centralized model’s accuracy while preserving data privacy.
5. Discussion and Conclusions
- The majority of the research papers are devoted to the design of network-based intrusion detection systems. The datasets that are used to evaluate the suggested approaches are represented either by PCAP packets or features extracted from them. Thus, while in [28] the authors used the ToN_IoT dataset, they do not consider the IoT telemetry data. Only in [52] is the MQTTset dataset that contains MQTT protocol-based communications between IoT devices used for the experiments. As it was stated in Section 3, this case corresponds to the horizontally partitioned data. The explanation of this fact is closely related to the current state of FL frameworks and libraries, the training time of the FL algorithms for vertically partitioned data, and the requirements to the computational and memory resources are extremely high. In [4], it was shown that inference time for decision trees in case of vertically partitioned data takes approximately 40 min.
- The typical experimental scenario includes splitting one dataset across n clients in such a way that clients have datasets with different types of the attacks. In major cases, the class distribution in a client’s dataset is balanced, and balancing dataset allows achieving higher results in intrusion detection efficiency. Only few works study the problem of the accuracy degradation due to imbalance in training data [22,28,52].
- The typical metrics that are used to evaluate the efficiency of the FL-based IDS systems are machine learning metrics that characterize the analysis model efficiency: accuracy, precision, recall, and F-measure. Only few research papers analyze the impact of the FL on the computational performance, impact on network traffic, and CPU load. Namely, in [52], the proposed FL-based algorithm is evaluated in terms of time and power consumption, and in [23], the complexity of the algorithms and the training time performance are considered. Thus, it is almost impossible to evaluate practical feasibility of the FL for intrusion detection.
- A few works study the privacy issues in FL-based IDS, and propose novel algorithms with differential privacy mechanisms to increase the security of the data inputs. In this case, the authors focus on the evaluation of the analysis model efficiency, the issues relating to practical recommendations on how to select parameters of the differential privacy mechanisms in case the client’s data imbalances are not discussed.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
DP | Differential Privacy |
TEE | Trusted Execution Environment |
FL | Federated Learning |
ML | Machine Learning |
IDS | Intrusion Detection System |
NIDS | Network Intrusion Detection System |
IoT | Internet of Things |
GBDT | Gradient Boosting Decision Trees |
References
- McMahan, H.B.; Moore, E.; Ramage, D.; Hampson, S.; y Arcas, B.A. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the AISTATS, Fort Lauderdale, FL, USA, 20–22 April 2017. [Google Scholar]
- Lwakatare, L.E.; Raj, A.; Bosch, J.; Olsson, H.H.; Crnkovic, I. A Taxonomy of Software Engineering Challenges for Machine Learning Systems: An Empirical Investigation. In Proceedings of the Agile Processes in Software Engineering and Extreme Programming, Montreal, QC, Canada, 21–25 May 2019; Kruchten, P., Fraser, S., Coallier, F., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 227–243. [Google Scholar]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canada, 16–18 August 2017; USENIX Association: Vancouver, BC, Canada, 2017; pp. 1093–1110. [Google Scholar]
- Novikova, E.; Doynikova, E.; Golubev, S. Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case. Algorithms 2022, 15, 104. [Google Scholar] [CrossRef]
- Ludwig, H.; Baracaldo, N.; Thomas, G.; Zhou, Y.; Anwar, A.; Rajamoni, S.; Ong, Y.J.; Radhakrishnan, J.K.; Verma, A.; Sinn, M.; et al. IBM Federated Learning: An Enterprise Framework White Paper V0.1. arXiv 2020, arXiv:2007.10987. [Google Scholar]
- Lo, S.K.; Lu, Q.; Zhu, L.; Paik, H.-Y.; Xu, X.; Wang, C. Architectural Patterns for the Design of Federated Learning Systems. arXiv 2021, arXiv:2101.02373. [Google Scholar] [CrossRef]
- Ek, S.; Portet, F.; Lalanda, P.; Vega, G. A Federated Learning Aggregation Algorithm for Pervasive Computing: Evaluation and Comparison. In Proceedings of the 2021 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kassel, Germany, 22–26 March 2021; pp. 1–10. [Google Scholar] [CrossRef]
- Yurochkin, M.; Agarwal, M.; Ghosh, S.S.; Greenewald, K.H.; Hoang, T.N.; Khazaeni, Y. Bayesian Nonparametric Federated Learning of Neural Networks. In Proceedings of the ICML, Long Beach, CA, USA, 9–15 June 2019. [Google Scholar]
- Mansour, A.B.; Carenini, G.; Duplessis, A.; Naccache, D. Federated Learning Aggregation: New Robust Algorithms with Guarantees. arXiv 2022, arXiv:2205.10864. [Google Scholar]
- Li, Q.; He, B.; Song, D. Model-Contrastive Federated Learning. arXiv 2021, arXiv:2103.16257. [Google Scholar]
- Lopez-Martin, M.; Sanchez-Esguevillas, A.; Arribas, J.I.; Carro, B. Supervised contrastive learning over prototype-label embeddings for network intrusion detection. Inf. Fusion 2022, 79, 200–228. [Google Scholar] [CrossRef]
- Shahid, O.; Pouriyeh, S.; Parizi, R.M.; Sheng, Q.Z.; Srivastava, G.; Zhao, L. Communication Efficiency in Federated Learning: Achievements and Challenges. arXiv 2021, arXiv:2107.10996. [Google Scholar]
- Juvekar, C.; Vaikuntanathan, V.; Chandrakasan, A. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In Proceedings of the 27th USENIX Conference on Security Symposium (SEC’18), Baltimore, MD, USA, 15–17 August 2018; USENIX Association: Boston, MA, USA, 2018; pp. 1651–1668. [Google Scholar]
- Zhang, C.; Li, S.; Xia, J.; Wang, W.; Yan, F.; Liu, Y. BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference, Virtual Event, 15–17 July 2020; USENIX Association: Boston, MA, USA, 2020. [Google Scholar]
- Kairouz, P.; McMahan, H.B.; Avent, B.; Bellet, A.; Bennis, M.; Bhagoji, A.N.; Bonawit, K.; Charles, Z.; Cormode, G.; Cummings, R.; et al. Advances and Open Problems in Federated Learning. In Foundations and Trends in Machine Learning; Now Publishers: Boston, MA, USA, 2021. [Google Scholar]
- Truex, S.; Liu, L.; Chow, K.H.; Gursoy, M.E.; Wei, W. LDP-Fed: Federated learning with local differential privacy. In Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, Heraklion, Greece, 27 April 2020. [Google Scholar]
- Shokri, R.; Shmatikov, V. Privacy-preserving deep learning. In Proceedings of the 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 29 September–2 October 2015; pp. 909–910. [Google Scholar] [CrossRef]
- Rieke, N.; Hancox, J.; Li, W.; Milletarì, F.; Roth, H.R.; Albarqouni, S.; Bakas, S.; Galtier, M.N.; Landman, B.A.; Maier-Hein, K.; et al. The future of digital health with federated learning. NPJ Digit. Med. 2020, 3, 119. [Google Scholar] [CrossRef]
- Antunes, R.S.; André da Costa, C.; Küderle, A.; Yari, I.A.; Eskofier, B. Federated Learning for Healthcare: Systematic Review and Architecture Proposal. ACM Trans. Intell. Syst. Technol. 2022, 13, 1–23. [Google Scholar] [CrossRef]
- Nguyen, T.D.; Marchal, S.; Miettinen, M.; Fereidooni, H.; Asokan, N.; Sadeghi, A.R. DÏoT: A Federated Self-learning Anomaly Detection System for IoT. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–9 July 2019; pp. 756–767. [Google Scholar]
- Li, B.; Wu, Y.; Song, J.; Lu, R.; Li, T.; Zhao, L. DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems. IEEE Trans. Ind. Inform. 2021, 17, 5615–5624. [Google Scholar] [CrossRef]
- Rey, V.; Sánchez Sánchez, P.M.; Huertas Celdrán, A.; Bovet, G. Federated learning for malware detection in IoT devices. Comput. Netw. 2022, 204, 108693. [Google Scholar] [CrossRef]
- Huong, T.T.; Bac, T.P.; Long, D.M.; Thang, B.D.; Binh, N.T.; Luong, T.D.; Phuc, T.K. LocKedge: Low-Complexity Cyberattack Detection in IoT Edge Computing. IEEE Access 2021, 9, 29696–29710. [Google Scholar] [CrossRef]
- Khoa, T.V.; Saputra, Y.M.; Hoang, D.T.; Trung, N.L.; Nguyen, D.; Ha, N.V.; Dutkiewicz, E. Collaborative Learning Model for Cyberattack Detection Systems in IoT Industry 4.0. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea, 25–28 May 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Long, G.; Tan, Y.; Jiang, J.; Zhang, C. Federated Learning for Open Banking. arXiv 2020, arXiv:2108.10749. [Google Scholar]
- Ahmed, U.; Srivastava, G.; Lin, J.C.W. Reliable customer analysis using federated learning and exploring deep-attention edge intelligence. Future Gener. Comput. Syst. 2022, 127, 70–79. [Google Scholar] [CrossRef]
- Li, J.; Cui, T.; Yang, K.; Yuan, R.; He, L.; Li, M. Demand Forecasting of E-Commerce Enterprises Based on Horizontal Federated Learning from the Perspective of Sustainable Development. Sustainability 2021, 13, 13050. [Google Scholar] [CrossRef]
- Campos, E.M.; Saura, P.F.; González-Vidal, A.; Hernández-Ramos, J.L.; Bernabé, J.B.; Baldini, G.; Skarmeta, A. Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges. Comput. Netw. 2022, 203, 108661. [Google Scholar] [CrossRef]
- Novikova, E.; Fomichov, D.; Kholod, I.; Filippov, E. Analysis of Privacy-Enhancing Technologies in Open-Source Federated Learning Frameworks for Driver Activity Recognition. Sensors 2022, 22, 2983. [Google Scholar] [CrossRef]
- Lyu, L.; Yu, H.; Yang, Q. Threats to Federated Learning: A Survey. arXiv 2020, arXiv:2003.02133. [Google Scholar]
- Agrawal, S.; Sarkar, S.; Aouedi, O.; Yenduri, G.; Piamrat, K.; Bhattacharya, S.; Maddikunta, P.K.R.; Gadekallu, T.R. Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions. arXiv 2021, arXiv:2106.09527. [Google Scholar]
- Bellatreche, L.; Boukhalfa, K.; Richard, P. Data Partitioning in Data Warehouses: Hardness Study, Heuristics and ORACLE Validation. In Proceedings of the 10th International Conference on Data Warehousing and Knowledge Discovery (DaWaK ’08), Turin, Italy, 2–5 September 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 87–96. [Google Scholar] [CrossRef]
- Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical Secure Aggregation for Privacy-Preserving Machine Learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS ’17), Dallas, TX, USA, 30 October–3 November 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 1175–1191. [Google Scholar] [CrossRef] [Green Version]
- Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecur 2019, 2, 20. [Google Scholar] [CrossRef]
- Bukhanov, D.G.; Polyakov, V.M. Detection of network attacks based on adaptive resonance theory. J. Phys. Conf. Ser. 2018, 1015, 042007. [Google Scholar] [CrossRef]
- Yunwu, W. Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System. In Proceedings of the 2009 International Forum on Information Technology and Applications, Chengdu, China, 15–17 May 2009; Volume 2, pp. 221–224. [Google Scholar] [CrossRef]
- Dave, M.H.; Sharma, S.D. Improved Algorithm for Intrusion Detection Using Genetic Algorithm and SNORT. Int. J. Emerg. Technol. Adv. Eng. 2014, 4, 273–276. [Google Scholar]
- Ranjan, R.; Sahoo, G. A New Clustering Approach for Anomaly Intrusion Detection. Int. J. Data Min. Knowl. Manag. Process. (IJDKP) 2014, 4, 29–38. [Google Scholar] [CrossRef] [Green Version]
- Li, Z.; Qin, Z.; Huang, K.; Yang, X.; Ye, S. Intrusion Detection Using Convolutional Neural Networks for Representation Learning. In Proceedings of the International Conference on Neural Information Processing (ICONIP), Guangzhou, China, 14–18 November 2017; Springer: Cham, Switzerland, 2017; Volume 10638. [Google Scholar] [CrossRef]
- Jianwei, H.; Chenshuo, L.; Yanpeng, C. An Improved CNN Approach for Network Intrusion Detection System. Int. J. Netw. Secur. 2021, 23, 569–575. [Google Scholar] [CrossRef]
- Vinayakumar, R.; Soman, K.; Poornachandran, P. Evaluation of Recurrent Neural Network and Its Variants for Intrusion Detection System IDS. Int. J. Inf. Syst. Model. Des. 2017, 8, 43–63. [Google Scholar] [CrossRef]
- Song, Y.; Hyun, S.; Cheong, Y.G. Analysis of Autoencoders for Network Intrusion Detection. Sensors 2021, 21, 4294. [Google Scholar] [CrossRef] [PubMed]
- Gajewski, M.; Batalla, J.M.; Mastorakis, G.; Mavromoustakis, C.X. A distributed IDS architecture model for Smart Home systems. Clust. Comput. 2017, 22, 1739–1749. [Google Scholar] [CrossRef] [Green Version]
- Shterenberg, S.I.; Poltavtseva, M.A. A Distributed Intrusion Detection System with Protection from an Internal Intruder. Autom. Control Comput. Sci. 2018, 52, 945–953. [Google Scholar] [CrossRef]
- Schueller, Q.; Basu, K.; Younas, M.; Patel, M.; Ball, F. A Hierarchical Intrusion Detection System using Support Vector Machine for SDN Network in Cloud Data Center. In Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 21–23 November 2018; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Saghezchi, F.B.; Mantas, G.; Ribeiro, J.; Al-Rawi, M.; Mumtaz, S.; Rodriguez, J. Towards a secure network architecture for smart grids in 5G era. In Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; pp. 121–126. [Google Scholar] [CrossRef]
- Zhang, Y.; Wang, L.; Sun, W.; Green, R.C., II; Alam, M. Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE Trans. Smart Grid 2011, 2, 796–808. [Google Scholar] [CrossRef] [Green Version]
- Javed, Y.; Felemban, M.; Shawly, T.; Kobes, J.; Ghafoor, A. A Partition-Driven Integrated Security Architecture for Cyberphysical Systems. Computer 2020, 53, 47–56. [Google Scholar] [CrossRef] [Green Version]
- Kholod, I.; Yanaki, E.; Fomichev, D.; Shalugin, E.; Novikova, E.; Filippov, E.; Nordlund, M. Open-Source Federated Learning Frameworks for IoT: A Comparative Review and Analysis. Sensors 2021, 21, 167. [Google Scholar] [CrossRef] [PubMed]
- Zhang, Z.; Zhang, Y.; Guo, D.; Yao, L.; Li, Z. SecFedNIDS: Robust defense for poisoning attack against federated learning-based network intrusion detection system. Future Gener. Comput. Syst. 2022, 134, 154–169. [Google Scholar] [CrossRef]
- Ibitoye, O.; Shafiq, M.O.; Matrawy, A. Differentially private self-normalizing neural networks for adversarial robustness in federated learning. Comput. Secur. 2022, 116, 102631. [Google Scholar] [CrossRef]
- Friha, O.; Ferrag, M.A.; Shu, L.; Maglaras, L.; Choo, K.K.R.; Nafaa, M. FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J. Parallel Distrib. Comput. 2022, 165, 17–31. [Google Scholar] [CrossRef]
- Hei, X.; Yin, X.; Wang, Y.; Ren, J.; Zhu, L. A trusted feature aggregator federated learning for distributed malicious attack detection. Comput. Secur. 2020, 99, 102033. [Google Scholar] [CrossRef]
- Zhao, R.; Yin, Y.; Shi, Y.; Xue, Z. Intelligent intrusion detection based on federated learning aided long short-term memory. Phys. Commun. 2020, 42, 101157. [Google Scholar] [CrossRef]
- Kumar, K.S.; Nair, S.A.H.; Guha Roy, D.; Rajalingam, B.; Kumar, R.S. Security and privacy-aware Artificial Intrusion Detection System using Federated Machine Learning. Comput. Electr. Eng. 2021, 96, 107440. [Google Scholar] [CrossRef]
- Astillo, P.V.; Duguma, D.G.; Park, H.; Kim, J.; Kim, B.; You, I. Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System. Future Gener. Comput. Syst. 2022, 128, 395–405. [Google Scholar] [CrossRef]
- Sarhan, M.; Lo, W.W.; Layeghy, S.; Portmann, M. HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection. arXiv 2022, arXiv:2204.04254. [Google Scholar]
- Dankmar, B. Multinomial logistic regression algorithm. Ann. Inst. Stat. Math. 1992, 44, 197–200. [Google Scholar]
- Li, X.; Huang, K.; Yang, W.; Wang, S.; Zhang, Z. On the Convergence of FedAvg on Non-IID Data. In Proceedings of the 8th International Conference on Learning Representations, Addis Ababa, Ethiopia, 26–30 April 2020. [Google Scholar]
- Yu, P.; Wynter, L.; Lim, S.H. Fed+: A Family of Fusion Algorithms for Federated Learning. arXiv 2020, arXiv:2009.06303. [Google Scholar]
- Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 2020, 8, 165130–165150. [Google Scholar] [CrossRef]
- Evaluating-FL-for-Intrusion-Detection-in-IoT-Review-and-Challenges Datasets (2021). Available online: https://github.com/Enrique-Marmol/Evaluating-FL-for-Intrusion-Detection-in-IoT-review-and-challenges (accessed on 15 March 2022).
- A Micro Web Framework Written in Python. Available online: https://flask.palletsprojects.com/en/2.1.x/ (accessed on 15 March 2022).
- Flask Socketio. Available online: https://flask-socketio.readthedocs.io/en/latest/ (accessed on 15 March 2022).
- Flask Socketio Client. Available online: https://github.com/socketio/socket.io-client (accessed on 15 March 2022).
- Gevent Asynchronous Framework. Available online: https://github.com/gevent/gevent (accessed on 15 March 2022).
- Keras Deep Learning Library. Available online: https://faroit.github.io/keras-docs/2.0.2/ (accessed on 15 March 2022).
- Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [Google Scholar] [CrossRef] [Green Version]
- Fed_IoT_Guard. 2021. Available online: https://github.com/ValerianRey/fed_iot_guard (accessed on 30 March 2022).
- Moustafa, N. The Bot-IoT Dataset. 2019. Available online: https://research.unsw.edu.au/projects/bot-iot-dataset (accessed on 13 July 2022).
- Chai, H.; Leng, S.; Chen, Y.; Zhang, K. A Hierarchical Blockchain-Enabled Federated Learning Algorithm for Knowledge Sharing in Internet of Vehicles. Trans. Intell. Transport. Sys. 2021, 22, 3975–3986. [Google Scholar] [CrossRef]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef] [Green Version]
- Keras: Python Deep Learning Library. Available online: http://keras.io/ (accessed on 26 March 2022).
- Morris, T.; Gao, W. Industrial Control System Traffic Datasets for Intrusion Detection Research. In Proceedings of the International Conference on Critical Infrastructure Protection, Arlington, VA, USA, 17–19 March 2014; Volume 441, pp. 65–78. [Google Scholar] [CrossRef] [Green Version]
- Schneble, W.; Thamilarasu, G. Attack Detection Using Federated Learning in Medical Cyber-Physical Systems. In Proceedings of the 28th International Conference on Computer Communications and Networks, Valencia, Spain, 29 July–1 August 2019. [Google Scholar]
- Chen, Y.; Qin, X.; Wang, J.; Yu, C.; Gao, W. FedHealth: A Federated Transfer Learning Framework for Wearable Healthcare. IEEE Intell. Syst. 2020, 35, 83–93. [Google Scholar] [CrossRef] [Green Version]
- KDD Dataset. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 15 March 2022).
- University of New Brunswick Dataset. Available online: https://www.unb.ca/cic/datasets/nsl.html (accessed on 15 March 2022).
- Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive dataset for network intrusion detection systems (UNSW-NB15 network dataset). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 10–12 November 2015; pp. 1–6. [Google Scholar] [CrossRef]
- FATE. An Industrial Grade Federated Learning Framework. Available online: https://fate.fedai.org/ (accessed on 25 June 2022).
- Secure Water Treatment (SWaT). Available online: https://itrust.sutd.edu.sg/itrust-labs_datasets/dataset_info/ (accessed on 25 June 2022).
- Google Colaboratory. 2021. Available online: https://colab.research.google.com/ (accessed on 30 March 2022).
- Rodríguez-Barroso, N.; Stipcich, G.; Jiménez-López, D.; Ruiz-Millán, J.A.; Martínez-Cámara, E.; González-Seco, G.; Luzón, M.V.; Veganzones, M.A.; Herrera, F. Federated Learning and Differential Privacy: Software tools analysis, the Sherpa.ai FL framework and methodological guidelines for preserving data privacy. Inf. Fusion 2020, 64, 270–292. [Google Scholar] [CrossRef]
- Anthony, L.F.W.; Kanding, B.; Selvan, R. Carbontracker: Tracking and predicting the carbon footprint of training deep learning models. arXiv 2020, arXiv:2007.03051. [Google Scholar]
Ref. | FL Architecture | Dataset | Attacks | Data Partition | ML Method | Implemen-Tation | Conducted Experiments and Best Accuracy | Used Metrics |
---|---|---|---|---|---|---|---|---|
[20] | centralized | generated Smart Home dataset | Mirai malware | by device type | language analysis techniques, GRU | flask, flask_ socketio, socketIO-client libraries, gevent asynchronous framework, Keras library with Tensorflow backend | FL-scenario anomaly detection performance and time, 95.6% detection rate | FP, TP, average detection time, processing performance of GRU |
[28] | centralized (10 clients) | ToN_IoT | Backdoor, DoS, DDoS, Injection, MITM, Password, Ransomware, Scanning, XSS | by IP address, balanced considering the attacks, hybrid approach | multinomial logistic regression (scikit-learn SGDClassifier) | IBMFL, FedAvg and Fed+ | centralized mode (0.724), three FL-based scenarios (basic—0.8725, balanced—0.9039, hybrid—0.8869) and distributed method (basic—0.8718, balanced—0.9065, hybrid—0.9065) | accuracy, precision, recall, F1-score, FPR |
[22] | centralized (8 clients), cross-silo FL | N-BaIoT | Mirai or BASHLITE | chronologically; original, balanced by attacks, 5% attack traffic | multilayer perceptron and autoencoder | FedAVG, 30 rounds of training | 4 epochs of training for supervised solution and 120 epochs for unsupervised, close results to the centralized method | TP, TN, accuracy, F1-score |
[23] | hierarchical architecture in the cloud | BoT-IoT | DDoS (HTTP, TCP, UDP), DoS (HTTP, TCP, UDP), OS Fingerprinting, Server Scanning, Keylogging, Data exfiltration | by source IP address | LocKedge (NN based), PCA to extract features | Raspberry Pi 3B+ for the Edge gateway, Raspberry Pi OS, Python 3 | centralized LocKedge accuracy (about 0.999) and time, at the Edge—1000 rounds, DoS-HTTP, DDoS-HTTP and theft-data give worse results than in centralized mode, others—better; edge computing capacity: maximum attack rate is 9600 samples per second, memory—up to 1800 samples per second | complexity of the algorithms, the training time performance, accuracy, DR, precision, recall, F1-score, CPU and RAM usage |
[57] | hierarchical | NFBoT-IoT-v2 | DDoS, DoS, Reconnaissance, Theft | balanced by the attacks/by the selected party | DFF | Custom, FedAvg | collaborating entities and non-collaborating entity scenario | accuracy, detection rate, FAR, F1-measure |
[53] | centrilized, hyperledger fabric for privacy | KDD-Cup99 | DoS, Probe, R2L, U2R | - | decision tree and multilayer perceptron—local model, FedAvg—global model training | custom | compare local model with random forest and SVM (50 iterations); compare the global model with CNN and DNN (100 iterations), the average AUC is 0.908 | TP, FN, FP, TN, AUC, precision, recall, F1-score, time |
[21] | centralized, Paillier public-key crypto-system-based secure communication protocol | gas pipelining system’s dataset | DoS, DDoS, command injection, response injection, reconnaissance, command injection | even partitions | convolutional neural network and a gated recurrent unit | Keras API, Flask.2 | local models, centralized mode, FL mode (99.20 for 7 agents, close to centralized mode results); from 2 to 10 rounds | accuracy, precision, recall, F-score |
[24] | centralized (2 or 3 subnets) | KDD, NSLKDD, UNSW-NB15, N-BaIoT | anomalies, tested on DoS, R2L, U2R, probing attack, Mirai, BASHLITE | by subnets, not detailed | DNN to train local model, average gradient update algorithm for global model | Prototype, not detailed | for 2 and 3 subnets comparison with other methods; for 2 subnets the best ACC: KDD—97.52%, NSL-KDD—93.99%, UNSW—95.6%, N-BaIoT—99.84%; for 3 subnets: KDD—97.54%, NSL-KDD—93.37%, UNSW—95.67%, N-BaIoT—99.84% | time, privacy, TP, FP, TN, FN, ACC |
[52] | centralized, secure gRPC channel | CSE-CIC-IDS2018, MQTTset, InSDN | DoS, DDoS, brute force, web-based, infiltration, botnet, Malformed, SlowITe, Flood, password guessing, probes, U2R | IID, Non-IID | deep neural networks, convolutional neural networks, recurrent neural networks | Google Colaboratory, Python 3, NumPy, Pandas, TensorFlow, Keras, Scikit-learn, and SMOTE libraries, Sherpa.ai FL framework | for the centralized model; FL scenario (accuracy close to the centralized): 5, 10, and 15 clients, 50 communication rounds | time complexity, power consumption, TP, FP, TN, FN, accuracy, precision, recall, F1-Score |
[4] | centralized | SWAT 2015 | signal injection | vertical partition | GBDT with Pailllier HE | FATE framework | 2 scenarios: centralized scenario and FL scenario with 5 clients | accuracy, time complexity |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fedorchenko, E.; Novikova, E.; Shulepov, A. Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges. Algorithms 2022, 15, 247. https://doi.org/10.3390/a15070247
Fedorchenko E, Novikova E, Shulepov A. Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges. Algorithms. 2022; 15(7):247. https://doi.org/10.3390/a15070247
Chicago/Turabian StyleFedorchenko, Elena, Evgenia Novikova, and Anton Shulepov. 2022. "Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges" Algorithms 15, no. 7: 247. https://doi.org/10.3390/a15070247
APA StyleFedorchenko, E., Novikova, E., & Shulepov, A. (2022). Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges. Algorithms, 15(7), 247. https://doi.org/10.3390/a15070247