期刊论文详细信息
Mathematics
Federated Learning-Inspired Technique for Attack Classification in IoT Networks
Muhammad Yousufudin1  Abdulaziz Aldaej1  Imdad Ullah1  Tariq Ahamed Ahanger1  Mohammed Atiquzzaman2 
[1] College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia;School of Computer Science, University of Oklahoma, Norman, OK 73019, USA;
关键词: federated learning;    security;    DDoS attack;    Internet of Things;   
DOI  :  10.3390/math10122141
来源: DOAJ
【 摘 要 】

More than 10-billion physical items are being linked to the internet to conduct activities more independently and with less human involvement owing to the Internet of Things (IoT) technology. IoT networks are considered a source of identifiable data for vicious attackers to carry out criminal actions using automated processes. Machine learning (ML)-assisted methods for IoT security have gained much attention in recent years. However, the ML-training procedure incorporates large data which is transferable to the central server since data are created continually by IoT devices at the edge. In other words, conventional ML relies on a single server to store all of its data, which makes it a less desirable option for domains concerned about user privacy. The Federated Learning (FL)-based anomaly detection technique, which utilizes decentralized on-device data to identify IoT network intrusions, represents the proposed solution to the aforementioned problem. By exchanging updated weights with the centralized FL-server, the data are kept on local IoT devices while federating training cycles over GRUs (Gated Recurrent Units) models. The ensemble module of the technique assesses updates from several sources for improving the accuracy of the global ML technique. Experiments have shown that the proposed method surpasses the state-of-the-art techniques in protecting user data by registering enhanced performance measures of Statistical Analysis, Energy Efficiency, Memory Utilization, Attack Classification, and Client Accuracy Analysis for the identification of attacks.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次