4.6 Article

A Novel Federated Edge Learning Approach for Detecting Cyberattacks in IoT Infrastructures

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives

Anichur Rahman et al.

Summary: The individual and integrated use of IoT, ICN, and FL in network-related scenarios has gained significant attention in the research community. FL addresses privacy and security issues in a decentralized manner, while ICN retrieves and stores content based on content names rather than addresses. The upcoming 6G networks are expected to support massive IoT devices, and this research highlights the potential of ICN for IoT applications. This study provides a comprehensive survey of FL, IoT, and ICN, and discusses their integration and future directions.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Automation & Control Systems

Intrusion Detection Based on Privacy-Preserving Federated Learning for the Industrial IoT

Pedro Ruzafa-Alcazar et al.

Summary: Federated learning (FL) has gained significant attention for its advantages and applicability, but sharing updated gradients/weights in the training process raises privacy concerns, especially in the context of IoT. Our work comprehensively evaluates differential privacy techniques applied to an FL-enabled intrusion detection system (IDS) for industrial IoT, considering nonindependent and identically distributed data. We compare the accuracy achieved with different privacy requirements and aggregation functions (FedAvg and Fed+), and find that using Fed+ yields similar results even with noise in the federated training process.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Electrical & Electronic

Federated-Learning-Empowered Semi-Supervised Active Learning Framework for Intrusion Detection in ZSM

Faisal Naeem et al.

Summary: The exponential growth of novel radical applications and services in sixth-generation (6G) networks is expected to increase the complexity of managing existing network infrastructures. The zero touch network and service management (ZSM) paradigm, which leverages AI, SDN, and NFV techniques, is seen as a promising solution to automatically manage and orchestrate network resources. However, the ZSM architecture, along with its potential benefits, is exposed to various security threats in a distributed 6G network.

IEEE COMMUNICATIONS MAGAZINE (2023)

Article Chemistry, Analytical

CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment

Euclides Carlos Pinto Neto et al.

SENSORS (2023)

Article Computer Science, Information Systems

Machine-Learning-Based Darknet Traffic Detection System for IoT Applications

Qasem Abu Al-Haija et al.

Summary: This paper develops, investigates, and evaluates machine-learning-based Darknet traffic detection systems in IoT networks. The study finds that bagging ensemble techniques offer better accuracy and lower error rates than other supervised learning techniques, and outperform the state-of-the-art models by (1.9~27%).

ELECTRONICS (2022)

Article Automation & Control Systems

Hybrid Malware Detection Based on Bi-LSTM and SPP-Net for Smart IoT

Jueun Jeon et al.

Summary: This article proposes a hybrid malware detection scheme called HyMalD, which uses bidirectional long short-term memory and spatial pyramid pooling network to protect IoT devices. By conducting static and dynamic analyses simultaneously, HyMalD can detect and classify IoT malware more accurately.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Theory & Methods

FELIDS: Federated learning-based intrusion detection system for Internet of

Othmane Friha et al.

Summary: This paper proposes a federated learning-based intrusion detection system, FELIDS, for securing agricultural-IoT infrastructures. The system protects data privacy through local learning and employs deep learning classifiers to achieve high accuracy in detecting attacks.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2022)

Article Computer Science, Information Systems

ShieldRNN: A Distributed Flow-Based DDoS Detection Solution for IoT Using Sequence Majority Voting

Faris Alasmary et al.

Summary: This paper presents a solution to protect IoT devices from DDoS attacks, consisting of an IoT node detector and a server detector. By utilizing ShieldRNN for training and prediction, an accurate server detector is developed and its superiority is demonstrated on the dataset.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Reinforcement-Learning-Enabled Partial Confident Information Coverage for IoT-Based Bridge Structural Health Monitoring

Lingzhi Yi et al.

Summary: This article addresses the problem of effectively prolonging the network lifetime of IoT-based bridge structural health monitoring systems while ensuring the desired coverage, proposing an energy-efficient sensor scheduling strategy and utilizing the LA model for adaptive learning of optimal scheduling strategy. The proposed scheme demonstrates significant improvements in network lifetime and energy efficiency through simulations using real data sets collected by a practical BSHM system.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Green & Sustainable Science & Technology

Distributed network security framework of energy internet based on internet of things

Jie Zhang

Summary: This paper argues that energy Internet is the future development direction of power system, focusing on solving the issues of clean energy compatibility and efficient control. The research mainly concentrates on the information security protection measures and system architecture analysis of distributed energy stations in the environment of energy Internet.

SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS (2021)

Article Computer Science, Information Systems

Malware detection employed by visualization and deep neural network

Anson Pinhero et al.

Summary: With the rapid growth of malware, automatic classification faces challenges, this study explores a new approach combining malware visualization and deep learning classification, successfully improving classification accuracy and efficiency.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Mohammed Ali Al-Garadi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning

Francisco Sales de Lima Filho et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Information Systems

Network Intrusion Detection for IoT Security Based on Learning Techniques

Nadia Chaabouni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Automation & Control Systems

Online False Data Injection Attack Detection With Wavelet Transform and Deep Neural Networks

James J. Q. Yu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Artificial Intelligence

SMOTE for Learning from Imbalanced Data: Progress and Challenges, Marking the 15-year Anniversary

Alberto Fernandez et al.

JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH (2018)