4.6 Article

A Novel Federated Edge Learning Approach for Detecting Cyberattacks in IoT Infrastructures

期刊

IEEE ACCESS
卷 11, 期 -, 页码 112189-112198

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2023.3318866

关键词

Internet of Things; Servers; Security; Data models; Artificial neural networks; Training; Federated learning; Privacy; Deep learning; Internet of Things (IoT); networks attacks; privacy; preservational deep learning; federated learning

向作者/读者索取更多资源

The rise of the Internet of Things (IoT) has increased the importance of cybersecurity research. This study proposes a novel approach using federated learning and the CIC_IoT 2023 dataset to identify large attacks on IoT devices, achieving impressive accuracy.
The advancement of the communications system has resulted in the rise of the Internet of Things (IoT), which has increased the importance of cybersecurity research. IoT, which incorporates a range of devices into networks to offer complex and intelligent services, must maintain user privacy and deal with attacks such as spoofing, denial of service (DoS), jamming, and eavesdropping. Attacks change with time, and new ones develop every day. Numerous researchers look into IoT system attack models and evaluate machine, deep, and federated learning-based IoT security approaches. However, existing methods do not produce reliable and encouraging performance. Therefore, this study proposes a novel approach for leveraging federated learning to identify large attacks on IoT devices using the novel CIC_IoT 2023 dataset. The approach uses a federated deep neural network to achieve precise categorization. Before model training, the data was preprocessed using various data preparation techniques to guarantee the creation of a trustworthy dataset for categorization. The suggested approach involves feature normalization, data balancing, and model prediction utilizing federated learning. The experimental findings show that the proposed approach attained an exceptional accuracy of 99.00%, endorsing it for attack detection.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据