Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning
Abstract
:1. Introduction
- (1)
- Development of a novel deep learning intrusion detection model: A deep learning model based on deep variational autoencoders and convolutional neural networks with attention mechanisms (DVACNNs) is designed specifically for network intrusion detection in IIoT environments. The model can effectively process and analyze complex data from IIoT systems, improve the accuracy of identifying various network attacks, and incorporate deep variational autoencoders to enhance data privacy protection further.
- (2)
- Construction and implementation of a federated learning framework: A FL framework is developed to allow multiple IIoT nodes to jointly train and optimize an intrusion detection model while preserving data privacy. This distributed learning approach not only enhances the generalization capability of the model but also provides a new approach to addressing data silos and strengthening data privacy protection.
- (3)
- Adoption of data augmentation techniques to mitigate the problem of low precision caused by data imbalance.
2. Related Work
2.1. Deep Learning-Based Intrusion Detection Methods
2.2. Deep Learning and Federated Learning-Based Intrusion Detection Methods
3. Proposed Method
3.1. Workflow of the DVACNN-Fed Framework
- (1)
- Cloud server initializes parameters: The cloud server sets a set of initial DVACNN model parameters w0, and other parameters related to model training, such as the learning rate η, loss function L, and batch size B.
- (2)
- Industrial local client model training: Each client obtains the initial model parameters w0 and η, L, and B from the cloud server and trains the DVACNN model locally using its private data resources Di (where i ∈ N = {1, 2, …, n}).
- (3)
- Industrial local client model parameters upload: After completing local training, each client processes the updated model parameters using differential privacy protection measures and then uploads them to the cloud server.
- (4)
- Cloud server model parameter aggregation: The server collects the parameters uploaded by each client and aggregates these parameters to update the global model.
- (5)
- Industrial local client model parameter update: Clients receive the updated global model parameters from the cloud and apply them to their local models.
- (6)
- Iterative optimization: Clients conduct new rounds of local training based on the global model parameters. This iterative process continues until the model performance reaches the expected standard or meets the stopping conditions, such as reaching a set threshold for the number of iterations or no longer achieving significant performance gains. Consequently, the final global model is formed and can be deployed in practical application scenarios for tasks such as prediction and classification.
3.2. The DVACNN-Based Intrusion Detection Model
4. Experiment
4.1. Datasets
4.2. Experimental Environment
4.3. Experimental Setup
4.4. Evaluation Metrics
5. Experimental Results
5.1. Comparative Experiment Introduction
5.2. Performance Comparison with State-of-the-Art Studies
5.3. Performance Comparison with Local and Ideal Models
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Peter, O.; Pradhan, A.; Mbohwa, C. Industrial Internet of Things (IIoT): Opportunities, Challenges, and Requirements in Manufacturing Businesses in Emerging Economies. Procedia Comput. Sci. 2023, 217, 856–865. [Google Scholar] [CrossRef]
- Qi, Q.; Xu, Z.; Rani, P. Big Data Analytics Challenges to Implementing the Intelligent Industrial Internet of Things (IIoT) Systems in Sustainable Manufacturing Operations. Technol. Forecast. Soc. Chang. 2023, 190, 122401. [Google Scholar] [CrossRef]
- Kaya, S.K. Industrial Internet of Things: How Industrial Internet of Things Impacts the Supply Chain. In Internet of Things (IoT) Applications for Enterprise Productivity; IGI Global: Hershey, PA, USA, 2020; pp. 134–155. ISBN 978-1-79983-175-4. [Google Scholar]
- Kumar, R.; Kandpal, B.; Ahmad, V. Industrial IoT (IIOT): Security Threats and Countermeasures. In Proceedings of the 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA), Uttarakhand, India, 14–16 March 2023; pp. 829–833. [Google Scholar]
- Demertzi, V.; Demertzis, S.; Demertzis, K. An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT). Algorithms 2023, 16, 378. [Google Scholar] [CrossRef]
- Abdulganiyu, O.H.; Ait Tchakoucht, T.; Saheed, Y.K. A Systematic Literature Review for Network Intrusion Detection System (IDS). Int. J. Inf. Secur. 2023, 22, 1125–1162. [Google Scholar] [CrossRef]
- Wang, Y.; Bao, Q.; Wang, J.; Su, G.; Xu, X. Cloud Computing for Large-Scale Resource Computation and Storage in Machine Learning. J. Theory Pract. Eng. Sci. 2024, 4, 163–171. [Google Scholar] [CrossRef]
- Thakkar, A.; Lohiya, R. A Review on Challenges and Future Research Directions for Machine Learning-Based Intrusion Detection System. Arch. Computat. Methods Eng. 2023, 30, 4245–4269. [Google Scholar] [CrossRef]
- Muneer, S.; Farooq, U.; Athar, A.; Ahsan Raza, M.; Ghazal, T.M.; Sakib, S. A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis. J. Eng. 2024, 2024, 3909173. [Google Scholar] [CrossRef]
- Sharma, H.S.; Singh, M.M.; Sarkar, A. Machine Learning-Based DoS Attack Detection Techniques in Wireless Sensor Network: A Review. In Proceedings of the International Conference on Cognitive and Intelligent Computing; Kumar, A., Ghinea, G., Merugu, S., Hashimoto, T., Eds.; Springer Nature: Singapore, 2023; pp. 583–591. [Google Scholar]
- Electronics|Free Full-Text|A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Available online: https://www.mdpi.com/2079-9292/12/6/1333 (accessed on 27 April 2024).
- Gupta, I.; Tiwari, A.; Agarwal, P.; Mittal, S.; Singh, A.K. Dodging Security Attacks and Data Leakage Prevention for Cloud and IoT Environments. In Intelligent Analytics for Industry 4.0 Applications; CRC Press: Boca Raton, FL, USA, 2023; ISBN 978-1-00-332114-9. [Google Scholar]
- De Keersmaeker, F.; Cao, Y.; Ndonda, G.K.; Sadre, R. A Survey of Public IoT Datasets for Network Security Research. IEEE Commun. Surv. Tutor. 2023, 25, 1808–1840. [Google Scholar] [CrossRef]
- Amarudin; Ferdiana, R.; Widyawan. A Systematic Literature Review of Intrusion Detection System for Network Security: Research Trends, Datasets and Methods. In Proceedings of the 2020 4th International Conference on Informatics and Computational Sciences (ICICoS), Semarang, Indonesia, 10–11 November 2020; pp. 1–6. [Google Scholar]
- Ismail, M.; Shaaban, M.F.; Naidu, M.; Serpedin, E. Deep Learning Detection of Electricity Theft Cyber-Attacks in Renewable Distributed Generation. IEEE Trans. Smart Grid 2020, 11, 3428–3437. [Google Scholar] [CrossRef]
- Keshk, M.; Turnbull, B.; Moustafa, N.; Vatsalan, D.; Choo, K.-K.R. A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks. IEEE Trans. Ind. Inf. 2020, 16, 5110–5118. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Shu, L.; Djallel, H.; Choo, K.-K.R. Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0. Electronics 2021, 10, 1257. [Google Scholar] [CrossRef]
- Kumar, P.; Kumar, R.; Gupta, G.P.; Tripathi, R.; Srivastava, G. P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT. IEEE Trans. Ind. Inf. 2022, 18, 6358–6367. [Google Scholar] [CrossRef]
- Tang, Z.; Hu, H.; Xu, C. A Federated Learning Method for Network Intrusion Detection. Concurr. Comput. Pract. Exp. 2022, 34, e6812. [Google Scholar] [CrossRef]
- Tabassum, A.; Erbad, A.; Lebda, W.; Mohamed, A.; Guizani, M. FEDGAN-IDS: Privacy-Preserving IDS Using GAN and Federated Learning. Comput. Commun. 2022, 192, 299–310. [Google Scholar] [CrossRef]
- Driss, M.; Almomani, I.; e Huma, Z.; Ahmad, J. A Federated Learning Framework for Cyberattack Detection in Vehicular Sensor Networks. Complex Intell. Syst. 2022, 8, 4221–4235. [Google Scholar] [CrossRef]
- He, X.; Peng, C.; Tan, W. Fast and Accurate Deep Leakage from Gradients Based on Wasserstein Distance. Int. J. Intell. Syst. 2023, 2023, 5510329. [Google Scholar] [CrossRef]
- Kusner, M.J.; Paige, B.; Hernández-Lobato, J.M. Grammar Variational Autoencoder. In Proceedings of the 34th International Conference on Machine Learning, PMLR, Sydney, Australia, 17 July 2017; pp. 1945–1954. [Google Scholar]
- Li, Z.; Liu, F.; Yang, W.; Peng, S.; Zhou, J. A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 6999–7019. [Google Scholar] [CrossRef] [PubMed]
- Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 2020, 8, 165130–165150. [Google Scholar] [CrossRef]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef]
- Keshk, M.; Sitnikova, E.; Moustafa, N.; Hu, J.; Khalil, I. An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems. IEEE Trans. Sustain. Comput. 2021, 6, 66–79. [Google Scholar] [CrossRef]
- Longadge, R.; Dongre, S. Class Imbalance Problem in Data Mining Review. arXiv 2013, arXiv:1305.1707. [Google Scholar]
- SMOTE: Synthetic Minority Over-Sampling Technique|Journal of Artificial Intelligence Research. Available online: https://www.jair.org/index.php/jair/article/view/10302 (accessed on 27 April 2024).
- The Balancing Trick: Optimized Sampling of Imbalanced Datasets—A Brief Survey of the Recent State of the Art—Susan—2021—Engineering Reports—Wiley Online Library. Available online: https://onlinelibrary.wiley.com/doi/full/10.1002/eng2.12298 (accessed on 27 April 2024).
- Smith, S.L.; Dherin, B.; Barrett, D.G.T.; De, S. On the Origin of Implicit Regularization in Stochastic Gradient Descent. arXiv 2021, arXiv:2101.12176. [Google Scholar]
- Chen, Y.; Wang, J.; Yu, C.; Gao, W.; Qin, X. FedHealth: A Federated Transfer Learning Framework for Wearable Healthcare. IEEE Intell. Syst. 2020, 35, 83–93. [Google Scholar] [CrossRef]
- Ilango, H.S.; Ma, M.; Su, R. A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT. Eng. Appl. Artif. Intell. 2022, 114, 105059. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Huang, J.; Chen, Z.; Liu, S.-Z.; Zhang, H.; Long, H.-X. Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning. Sensors 2024, 24, 4002. https://doi.org/10.3390/s24124002
Huang J, Chen Z, Liu S-Z, Zhang H, Long H-X. Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning. Sensors. 2024; 24(12):4002. https://doi.org/10.3390/s24124002
Chicago/Turabian StyleHuang, Jia, Zhen Chen, Sheng-Zheng Liu, Hao Zhang, and Hai-Xia Long. 2024. "Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning" Sensors 24, no. 12: 4002. https://doi.org/10.3390/s24124002