Federated Learning Augmented Cybersecurity for SDN-Based Aeronautical Communication Network
Abstract
:1. Introduction
1.1. Amalgamation of SDN and Federated Learning in Avionics Networks
- SDN offers centralized control and flexible network management, while traditional avionics communication networks are rigid and difficult to update or secure dynamically. Integrating SDN into avionics communication networks allows:
- ○
- Dynamic reconfiguration of communication paths and protocols in response to threats.
- ○
- Real-time monitoring of traffic for anomalies or malicious activities.
- ○
- Enhanced scalability and adaptability to emerging threats.
- Federated Learning addresses the challenges of data privacy and distributed learning. Instead of centralizing data, FL enables aircraft and ground stations to collaboratively train machine learning models while keeping data local, thereby improving:
- ○
- Data privacy by preventing raw data transfer between aircraft and control centers
- ○
- Model robustness through distributed training, as each aircraft can contribute to a collective understanding of cyber threats without sharing sensitive information
1.2. Integration with FCI Architecture
- The Future Communications Infrastructure is a planned architecture designed to support high-speed, secure, and resilient communication in the aerospace sector. By embedding SDN and FL within the FCI framework, this paper presents a novel holistic approach to secure avionics communication, enhancing:
- ○
- Interoperability between different communication systems used by aircraft, air traffic control, and ground systems
- ○
- Scalability and futureproofing, since the architecture can adapt to the increasing complexity and cybersecurity demands of future avionics networks
1.3. Unique Contribution to Avionics Cybersecurity
- This approach introduces a cyber-resilient avionics network that combines the programmability of SDN and decentralized learning of FL to create an adaptive defense system. This is particularly significant in the high-stakes domain of avionics, where cybersecurity is critical for safety and network reliability is paramount.
- It provides a forward-looking solution aligned with next-generation air traffic management systems that require robust, secure, and scalable communications
2. Related Work
2.1. Federated Learning
2.2. Applications of Federated Learning
2.3. Cyber Security with Federated Learning
3. SDN-Based Communication Network Architecture
3.1. SDN-Basic Controller Modules
- The data plane is the lowest layer of the SDN architecture and deals with data based on the configurations from the control plane. Normally, the data plane consists of network infrastructure, such as switches, access points, and routers.
- The control plane uses software to define and manage traffic routing and network topology.
- The application plane is the topmost layer and consists of a variety of software applications with tasks ranging from control to management.
3.2. Target Network Functional Architecture
3.3. Target Network Security Functional Architecture
4. Federated Learning in Target Network
4.1. Cybersecurity Design Goals for Target Network
- Effectiveness: The NIDS should be able to achieve a high accuracy score in detecting different classes of cyberattacks.
- Privacy Preserving: The NIDS should be able to protect owners’ data privacy.
- Scalability: NIDs should be scalable for different cyberattack detection tasks with little modification of the target network system architecture and ML model structures.
4.2. Machine Learning Model
Neural Network Model
- No hidden layers for linearly separable data
- 1–2 hidden layers for less complex data with a low number of input parameters
- 3–5 for the dataset with a high number of input parameters
- More hidden layers can be considered based on the complexity of the dataset in terms of vase features or input parameters, and how comprehensive the dataset is
- The number of neurons in the hidden layer should be less than twice the input layer
- The number of neurons in the hidden layer should be between the input and output layer neurons
4.3. Federated Learning Models
4.3.1. Horizontal Federated Learning
4.3.2. Vertical Federated Learning
4.4. Set up of Federated Learning
4.4.1. FL Training Rounds
- The number of neurons in hidden layer i.
- The local weights of client i in local training round t
- The weights of the global model in training round t.
- The total number of hidden layers.
- The learning rates.
4.4.2. FL Training Process
4.4.3. Loss Function
5. Simulation Results
5.1. Datasets
- Basic features: These are TCP/IP-related properties from the packet header, such as service flags and protocol type. In the NSL-KDD dataset, the first nine features are basic.
- Content features: These are suspicious data in a TCP packet, such as the number of unsuccessful login attempts. Features 10–22 are grouped as content features in the NSL-KDD dataset.
- Traffic features: These are the information related to how the data are transferred to identify the same service and host features. In the NSL-KDD dataset, features 23–31 are classified as service-based features. The remaining features are classified as host-based features.
- The 29K samples in the dataset were initially processed to remove any redundant records. The dataset was pre-processed using horizontal FL data division, as the feature space was common among all parties.
- The dataset is grouped as follows:
- ○
- 40% for FL client1 training
- ○
- 40% for FL client 2 training
- ○
- 20% for testing and validation
5.2. Simulation Process
5.3. Results and Discussions
5.3.1. Accuracy
5.3.2. Precision
5.3.3. True Positive Rate (TPR)
5.3.4. F1-Score
5.3.5. False Negative Rate, False Positive Rate, and Error Rate
5.3.6. True Negative Rate (TNR)
5.4. Comparison with Non-FL Methods
6. Conclusions and Future Works
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Ukwandu, E.; Ben-Farah, M.A.; Hindy, H.; Bures, M.; Atkinson, R.; Tachtatzis, C.; Andonovic, I.; Bellekens, X. Cyber-Security challenges in Aviation Industry: A Review of Current and Future Trends. Information 2022, 13, 146. [Google Scholar] [CrossRef]
- Eurocontrol EATM CERT Services. Aviation Under Attack: Faced with a Rising Tide of Cybercrime, Is Our Industry Resilient Enough to Cope. Think Paper #12. 5 July 2021. Available online: https://www.eurocontrol.int/sites/default/files/2021-07/eurocontrol-think-paper-12-aviation-under-cyber-attack.pdf (accessed on 3 April 2025).
- Xia, W.; Wen, Y.; Foh, C.H.; Niyato, D.; Xie, H. A Survey on Software-Defined Networking. IEEE Commun. Surv. Tutor. 2015, 17, 27–51. [Google Scholar] [CrossRef]
- Benson, T.; Akella, A.; Maltz, D. Unraveling the complexity of network management. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, USA, 22–24 April 2009; pp. 335–348. [Google Scholar]
- Zhao, Y.; Li, Y.; Zhang, X.; Geng, G.; Zhang, W.; Sun, Y. A Survey of Networking Applications Applying the Software Defined Networking Concept Based on Machine Learning. IEEE Access 2019, 7, 95397–95417. [Google Scholar] [CrossRef]
- Konečný, J.; McMahan, H.B.; Yu, F.X.; Richtárik, P.; Suresh, A.T.; Bacon, D. Federated learning: Strategies for improving communication efficiency. In Proceedings of the NIPS Workshop Private Multi-Party Machine Learning for Complex Systems, Barcelona, Spain, 9 December 2016; pp. 1–10. [Google Scholar] [CrossRef]
- Sarker, I.H.; Kayes, A.S.M.; Badsha, S.; Alqahtani, H.; Watters, P.; Ng, A. Cybersecurity data science: An overview from machine learning perspective. J. Big Data 2020, 7, 1–29. [Google Scholar] [CrossRef]
- Hu, Y.-F.; Abdo, K.; BenSlama, F.; Ali, M.; Cormbe, Q.; Benamrane, F.; Luong, D.; Barossi, R.; Cormbe, O. A SDN-based Aeronautical Communications Network Architecture. In Proceedings of the 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), London, UK, 23–27 September 2018; pp. 1–10. [Google Scholar] [CrossRef]
- Konecn, J.; McMahan, H.B.; Ramage, D.; Richtárik, P. Federated optimization: Distributed optimization beyond the datacenter. arXiv 2015, arXiv:1610.02527. [Google Scholar] [CrossRef]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; y Arcas, B.A. Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv 2016, arXiv:1602.05629. [Google Scholar]
- Abdulrahman, S.; Tout, H.; Ould-Slimane, H.; Mourad, A.; Talhi, C.; Guizani, M. A survey on federated learning: The journey from centralized to distributed on-site learning and beyond. IEEE Internet Things J. 2021, 8, 5476–5497. [Google Scholar] [CrossRef]
- Yin, X.; Zhu, Y.; Hu, J. A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions. ACM Comput. Surv. 2022, 54, 1–36. [Google Scholar] [CrossRef]
- Zhang, C.; Xie, Y.; Bai, H.; Yu, B.; Li, W.; Gao, Y. A survey on federated learning. Knowl.-Based Syst. 2021, 216, 106775. [Google Scholar] [CrossRef]
- Li, Q.; Wen, Z.; Wu, Z.; Hu, S.; Wang, N.; Li, Y.; Liu, X.; He, B. A survey on federated learning systems: Vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. 2021, 35, 3347–3366. [Google Scholar] [CrossRef]
- Li, L.; Fan, Y.; Tse, M.; Lin, K.-Y. A review of applications in federated learning. Comput. Ind. Eng. 2020, 149, 106854. [Google Scholar] [CrossRef]
- Li, T.; Sahu, A.K.; Talwalkar, A.; Smith, V. Federated learning: Challenges, methods, and future directions. IEEE Signal Process. Mag. 2020, 37, 50–60. [Google Scholar] [CrossRef]
- Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 2019, 10, 1–19. [Google Scholar] [CrossRef]
- Li, Q.; Wen, Z.; He, B. Practical federated gradient boosting decision trees. Proc. AAAI Conf. Artif. Intell. 2020, 34, 4642–4649. [Google Scholar] [CrossRef]
- Smith, V.; Chiang, C.-K.; Sanjabi, M.; Talwalkar, A.S. Federated multi-task learning. In Proceedings of the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA, 4–9 December 2017; Available online: http://papers.nips.cc/paper/7029-federated-multi-task-learning.pdf (accessed on 3 April 2025).
- Lin, Y.; Han, S.; Mao, H.; Wang, Y.; Dally, W.J. Deep gradient compression: Reducing the communication bandwidth for distributed training. In Proceedings of the Sixth International Conference on Learning Representations, Vancouver, BC, Canda, 30 April–3 May 2018. [Google Scholar] [CrossRef]
- Liu, Y.; Kang, Y.; Xing, C.; Chen, T.; Yang, Q. Secure federated transfer learning. arXiv 2018, arXiv:1812.03337. [Google Scholar]
- Li, T.; Sahu, A.K.; Zaheer, M.; Sanjabi, M.; Talwalkar, A.; Smith, V. Federated optimization in heterogeneous networks. arXiv 2018, arXiv:1812.06127. [Google Scholar]
- Cheng, K.; Fan, T.; Jin, Y.; Liu, Y.; Chen, T.; Papadopoulos, D.; Yang, Q. Secureboost: A lossless federated learning framework. arXiv 2019, arXiv:1901.08755. [Google Scholar]
- Yin, F.; Lin, Z.; Kong, Q.; Xu, Y.; Li, D.; Theodoridis, S.; Cui, S.R. FedLoc: Federated Learning Framework for Data-Driven Cooperative Localization and Location Data Processing. IEEE Open J. Signal Process. 2020, 1, 187–215. [Google Scholar] [CrossRef]
- Du, W.; Han, Y.S.; Chen, S. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In Proceedings of the 2004 SIAM International Conference on Data Mining (SDM), Lake Buena Vista, FL, USA, 22–24 April 2004. [Google Scholar] [CrossRef]
- Vaidya, J.; Clifton, C. Privacy preserving association rule mining in vertically partitioned data. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’02), Edmonton, AB, Canada, 23–26 July 2002; ACM: New York, NY, USA, 2002; pp. 639–644. [Google Scholar] [CrossRef]
- Wan, L.; Ng, W.K.; Han, S.; Lee, V.C.S. Privacy-preservation for gradient descent methods. In Proceedings of the 13th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD’07), San Jose, CA, USA, 12–15 August 2007; ACM: New York, NY, USA, 2007; pp. 775–783. [Google Scholar] [CrossRef]
- Gascón, A.; Schoppmann, P.; Balle, B.; Raykova, M.; Doerner, J.; Zahur, S.; Evans, D. Privacy-preserving distributed linear regression on high-dimensional data. Proc. Priv. Enhancing Technol. 2017, 2017, 345–364. [Google Scholar] [CrossRef]
- Saha, S.; Ahmad, T. Federated Transfer Learning: Concept and applications. arXiv 2020, arXiv:2010.15561. [Google Scholar]
- Yang, H.; He, H.; Zhang, W.; Cao, X. FedSteg: A federated transfer learning framework for secure image steganalysis. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1084–1094. [Google Scholar] [CrossRef]
- Gao, D.; Liu, Y.; Huang, A.; Ju, C.; Yu, H.; Yang, Q. Privacy-preserving heterogeneous federated transfer learning. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 2552–2559. [Google Scholar] [CrossRef]
- Sharma, S.; Xing, C.; Liu, Y.; Kang, Y. Secure and efficient federated transfer learning. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 2569–2576. [Google Scholar] [CrossRef]
- Pan, S.J.; Yang, Q. A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 2010, 22, 1345–1359. [Google Scholar] [CrossRef]
- Yang, T.; Andrew, G.; Eichner, H.; Sun, H.; Li, W.; Kong, N.; Beaufays, F. Applied federated learning: Improving google keyboard query suggestions. arXiv 2018, arXiv:1812.02903. [Google Scholar]
- Chen, M.; Mathews, R.; Ouyang, T.; Beaufays, F. Federated learning of out-of-vocabulary words. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, Florence, Italy, 28 July–2 August 2019; pp. 4102–4112. [Google Scholar] [CrossRef]
- Leroy, D.; Coucke, A.; Lavril, T.; Gisselbrecht, T.; Dureau, J. Federated learning for keyword spotting. In Proceedings of the ICASSP 2019–2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 6341–6345. [Google Scholar] [CrossRef]
- Ramaswamy, S.; Mathews, R.; Rao, K.; Beaufays, F. Federated learning for emoji prediction in a mobile keyboard. arXiv 2019, arXiv:1906.04329. [Google Scholar]
- Zaw, C.W.; Pandey, S.R.; Kim, K.; Hong, C.S. Energy-aware resource management for federated learning in multi-access edge computing systems. IEEE Access 2021, 9, 34938–34950. [Google Scholar] [CrossRef]
- Wang, S.; Tuor, T.; Salonidis, T.; Leung, K.K.; Makaya, C.; He, T.; Chan, K. Adaptive federated learning in resource constrained edge computing systems. IEEE J. Sel. Areas Commun. 2019, 37, 1205–1221. [Google Scholar] [CrossRef]
- Yang, Z.; Chen, M.; Wong, K.-K.; Poor, H.V.; Cui, S. Federated Learning for 6G: Applications, Challenges, and Opportunities. Engineering 2022, 8, 33–41. [Google Scholar] [CrossRef]
- Hu, B.; Gao, Y.; Liu, L.; Ma, H. Federated region-learning: An edge computing based framework for urban environment sensing. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Han, X.; Yu, H.; Gu, H. Visual inspection with federated learning. In Proceedings of the International Conference on Image Analysis and Recognition (ICIAR 2019), Waterloo, ON, Canada, 27–29 August 2019; pp. 52–64. [Google Scholar] [CrossRef]
- Mowla, N.I.; Tran, N.H.; Doh, I.; Chae, K. Federated learning-based cognitive detection of jamming attack in flying Ad-Hoc network. IEEE Access 2019, 8, 4338–4350. [Google Scholar] [CrossRef]
- Saputra, Y.M.; Hoang, D.T.; Nguyen, D.N.; Dutkiewicz, E.; Mueck, M.D.; Srikanteswara, S. Energy demand prediction with federated learning for electric vehicle networks. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Suvarna, R.; Kowshaly, A.M. Credit card fraud detection using federated learning techniques. Int. J. Sci. Res. Sci. Eng. Technol. 2020, 7, 356–367. [Google Scholar] [CrossRef]
- Yu, B.; Mao, W.; Lv, Y.; Zhang, C.; Xie, Y. A survey on federated learning in data mining. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2022, 12, e1443. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Pham, Q.-V.; Pathirana, P.N.; Ding, M.; Seneviratne, A.; Lin, Z.; Dobre, O.; Hwang, W.-J. Federated learning for smart healthcare: A survey. ACM Comput. Surv. 2023, 55, 1–37. [Google Scholar] [CrossRef]
- Kim, Y.; Sun, J.; Yu, H.; Jiang, X. Federated tensor factorization for computational phenotyping. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, 13–17 August 2017; pp. 887–895. [Google Scholar] [CrossRef]
- Huang, L.; Shea, A.L.; Qian, H.; Masurkar, A.; Deng, H.; Liu, D. Patient clustering improves efficiency of federated machine learning to predict mortality and hospital stay time using distributed electronic medical records. J. Biomed. Inform. 2019, 99, 103291. [Google Scholar] [CrossRef] [PubMed]
- Theodora, S.B.; Chen, R.; Theofanie, M.; Olshevsky, A.; Paschalidis, I.C.; Shi, W. Federated learning of predictive models from federated electronic health records. Int. J. Med. Inform. 2018, 112, 59–67. [Google Scholar] [CrossRef]
- Ghimire, B.; Rawat, D.B. Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet Things J. 2022, 9, 8229–8249. [Google Scholar] [CrossRef]
- Al Mallah, R.; Badu-Marfo, G.; Farooq, B. Cybersecurity threats in connected and automated vehicles based federated learning systems. In Proceedings of the 2021 IEEE Intelligent Vehicles Symposium Workshops (IV Workshops), Nagoya, Japan, 11–17 July 2021; pp. 13–18. [Google Scholar] [CrossRef]
- Mothukuri, V.; Khare, P.; Parizi, R.M.; Pouriyeh, S.; Dehghantanha, A.; Srivastava, G. Federated-Learning-Based Anomaly Detection for IoT Security Attacks. IEEE Internet Things J. 2022, 9, 2545–2554. [Google Scholar] [CrossRef]
- Alazab, M.; RM, S.P.; M, P.; Maddikunta, P.K.R.; Gadekallu, T.R.; Pham, Q.-V. Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions. IEEE Trans. Ind. Inform. 2022, 18, 3501–3509. [Google Scholar] [CrossRef]
- Raza, M.; Saeed, M.J.; Riaz, M.B.; Sattar, M.A. Federated Learning for Privacy-Preserving Intrusion Detection in Software-Defined Networks. IEEE Access 2024, 12, 69551–69567. [Google Scholar] [CrossRef]
- Babbar, H.; Rani, S.; Singh, A.; Gianini, G. Detecting Cyberattacks to Federated Learning on Software-Defined Networks. In Proceedings of the International Conference on Management of Digital, Heraklion, Greece, 5–7 May 2023; Springer Nature: Cham, Switzerland, 2023. [Google Scholar]
- Duy, P.T.; Van Hung, T.; Ha, N.H.; Hoang, H.D.; Pham, V.-H. Federated learning-based intrusion detection in SDN-enabled IIoT networks. In Proceedings of the 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam, 21–22 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 424–429. [Google Scholar]
- Benmalek, M.; Benrekia, M.A.; Challal, Y. Security of Federated Learning: Attacks, Defensive Mechanisms, and Challenges. Rev. D’intelligence Artif. 2022, 36, 49–59. [Google Scholar] [CrossRef]
- Luo, X.; Qin, W.; Dong, A.; Sedraoui, K.; Zhou, M. Efficient and High-quality Recommendations via Momentum-incorporated Parallel Stochastic Gradient Descent-Based Learning. IEEE/CAA J. Autom. Sin. 2020, 8, 402–411. [Google Scholar] [CrossRef]
- AICHAIN SESAR Joint Undertaking Project—A Platform for Privacy-Preserving Federated Machine Learning Using Blockchain to Enable Operational Improvements in ATM, 2020/2022. Available online: https://cordis.europa.eu/project/id/894162/reporting (accessed on 3 April 2025).
- Hu, H.; Salcic, Z.; Sun, L.; Dobbie, G.; Zhang, X. Source Inference Attacks in Federated Learning. In Proceedings of the 2021 IEEE International Conference on Data Mining (ICDM), Auckland, New Zealand, 7–10 December 2021; pp. 1102–1107. [Google Scholar] [CrossRef]
- Canetti, R.; Feige, U.; Goldreich, O.; Naor, M. Adaptively secure multi-party computation. In Proceedings of the Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; pp. 639–648. [Google Scholar]
- Dwork, C.; McSherry, F.; Nissim, K.; Smith, A. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Theory of Cryptography Conference, New York, NY, USA, 4–7 March 2006; pp. 265–284. [Google Scholar] [CrossRef]
- Dwork, C. Differential privacy: A survey of results. In Proceedings of the International Conference on Theory and Applications of Models of Computation, Xi’an, China, 25–29 April 2008; pp. 1–19. [Google Scholar] [CrossRef]
- SINAPSE Project–Sesar Joint Undertaking. Available online: https://www.sesarju.eu/projects/sinapse (accessed on 4 April 2025).
- Dwork, C.; Roth, A. The Algorithmic Foundations of Differential Privacy; Now Publishers Inc.: Hanover, MA, USA, 2014. [Google Scholar]
- NSL-KDD Dataset on Kaggle. Available online: https://www.kaggle.com/code/eneskosar19/intrusion-detection-system-nsl-kdd (accessed on 4 April 2025).
Attack Type | Year | Incident | Location |
---|---|---|---|
A | 2022 | DoS attack choked airline operation | India |
A | 2022 | Check-in software compromised | Canada |
A | 2022 | Server compromised lost 65TB of data | Russia |
C | 2021 | SITA data servers compromised | USA |
I | 2021 | Software error | Birmingham, UK |
C | 2020 | Ransomware attack | San Antonio, USA |
C | 2020 | Ransomware attack | Denver, USA |
C | 2019 | Phishing attack | New Zealand |
C | 2019 | Crypto-mining malware infection | Europe |
C | 2019 | Ransomware attack | Albany, USA |
C | 2019 | Cyber attack | Toulouse, France |
A | 2019 | Bot attack | Ben Gurion airport, Israel |
A | 2018 | Cyber attack | Sweden |
C | 2018 | Ransomware attack | Chicago, USA |
C | 2018 | Data breach | Washington DC, USA |
C | 2018 | Mobile App data breach | Air Canada, Canada |
A | 2018 | Ransomware attack | Bristol, UK |
C | 2018 | Data breach | Delta Air, USA |
C | 2018 | Data breach | British Airways, UK |
C | 2018 | Data breach | Hong Kong, China |
I | 2016 | Phishing attacks | Ho chi Minh, Veitnam |
A | 2016 | Cyber attack | Boryspil, Ukraine |
Research Work | Dataset | SDN | FL | DL | Avionics (Heterogenous) Wireless Networks | Detailed Integration of SDN, FL and Intrusions Detection with Target Architecture |
---|---|---|---|---|---|---|
Proposed work | NSL-KDD | ✓ | ✓ | ✓ | ✓ | ✓ |
[9] | Synthetic | × | ✓ | × | × | × |
[53] | N-BaIoT | × | ✓ | ✓ | × | ✓ |
[55] | EdgeIIoTset | ✓ | ✓ | ✓ | × | × |
[56] | N-BaIoT | ✓ | ✓ | × | × | × |
[57] | CICDDoS2019 | ✓ | ✓ | ✓ | × | × |
[3] | Multiple | ✓ | × | × | × | × |
[60] | Synthetic | × | ✓ | × | ✓ | × |
[58] | Synthetic | × | ✓ | × | × | × |
[62] | Synthetic | × | ✓ | × | × | × |
[64] | CIFAR-100 | × | ✓ | ✓ | × | × |
# | Feature Name | Feature Description |
---|---|---|
1 | duration | Length of connection in seconds |
2 | protocol type | Type of protocol i.e., TCP, UDP, ICMP etc. |
3 | service | Network service on the destination e.g., http |
4 | flag | Normal or error status of the connection |
5 | src bytes | Number of data bytes from source to destination |
6 | dst bytes | Number of data bytes from destination to source |
7 | land | Represents connection endpoints. 1 if the connection is from same host/port otherwise 0 |
8 | wrong fragment | Number of wrong fragments |
9 | urgent | Number of urgent packets |
10 | hot | Number of hot indicators |
11 | num_failed_logins | Number of failed login attempts |
12 | logged in | 1 if successfully logged in, zero otherwise |
13 | num_compromised | Number of compromised conditions |
14 | root shell | 1 if root shell is obtained, zero otherwise |
15 | su_attempted | 1 if “su root” command is attempted, zero otherwise |
16 | num root | Number of root access |
17 | num_file_creations | Number of file creation operation |
18 | num shells | Number of shell prompts |
19 | num_access_files | Number of operations on access control files |
20 | num_outbound_cmds | Number of outbound commands in an ftp connection |
21 | is_host_login | 1 if the login belongs to the hot list otherwise 0 |
22 | is_guest login | 1 if the login is a guest login otherwise 0 |
23 | count | Number of connections to the same host |
24 | srv_count | Number of connection to the same service |
25 | serror_rate | % of SYN error on the same host connection |
26 | srv_serror rate | % of SYN error on the same service connection |
27 | rerror rate | % of REJ error on the same host connection |
28 | srv_rerror rate | % of REJ error on the same service connection |
29 | same_srv_rate | Number of same service connected to the same host |
30 | diff_srv_rate | Number of different services connected to the same host |
31 | srv_diff_host_rate | Number of different targeted host connected to the same service |
32 | dst_host_count | Number of connection to same host |
33 | dst_host_srv_count | Number of same host and same service |
34 | dst_host_same_srv_rate | Rate of same host and same service |
35 | dst_host_diff_srv rate | Rate of different service in different host |
36 | dst_host_same_src_port_rate | Rate of connecting host in same src port |
37 | dst_host_diff_src_port_rate | Rate of connecting host in different src port |
38 | dst_host_serror_rate | % of SYN error from the same host connection |
39 | dst_host_srv_serror_rate | % of SYN error from the same service connection |
40 | dst_host_rerror_rate | % of REJ error from the same host connection |
41 | dst_host_srv_rerror_rate | % of REJ error from the same service connection |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ali, M.; Hu, Y.-F.; Li, J.-P. Federated Learning Augmented Cybersecurity for SDN-Based Aeronautical Communication Network. Electronics 2025, 14, 1535. https://doi.org/10.3390/electronics14081535
Ali M, Hu Y-F, Li J-P. Federated Learning Augmented Cybersecurity for SDN-Based Aeronautical Communication Network. Electronics. 2025; 14(8):1535. https://doi.org/10.3390/electronics14081535
Chicago/Turabian StyleAli, Muhammad, Yim-Fun Hu, and Jian-Ping Li. 2025. "Federated Learning Augmented Cybersecurity for SDN-Based Aeronautical Communication Network" Electronics 14, no. 8: 1535. https://doi.org/10.3390/electronics14081535
APA StyleAli, M., Hu, Y.-F., & Li, J.-P. (2025). Federated Learning Augmented Cybersecurity for SDN-Based Aeronautical Communication Network. Electronics, 14(8), 1535. https://doi.org/10.3390/electronics14081535