FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system

M. Nivaashini, E. Suganya, S. Sountharrajan, M. Prabu

Tóm tắt

AbstractOver the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet. Wi-Fi network security is severely questioned since there is no physical barrier separating a wireless network from a wired network, and the security procedures in place are defenseless against a wide range of threats. This study set out to assess federated learning, a new technique, as a possible remedy for privacy issues and the high expense of data collecting in network attack detection. To detect and identify cyber threats, especially in Wi-Fi networks, the research presents FEDDBN-IDS, a revolutionary intrusion detection system (IDS) that makes use of deep belief networks (DBNs) inside a federated deep learning (FDL) framework. Every device has a pre-trained DBN with stacking restricted Boltzmann machines (RBM) to learn low-dimensional characteristics from unlabelled local and private data. Later, these models are combined by a central server using federated learning (FL) to create a global model. The whole model is then enhanced by the central server with fully linked SoftMax layers to form a supervised neural network, which is then trained using publicly accessible labeled AWID datasets. Our federated technique produces a high degree of classification accuracy, ranging from 88% to 98%, according to the results of our studies.

Từ khóa


Tài liệu tham khảo

C. Kolias, G. Kambourakis, A. Stavrou, S. Gritzalis, Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 18(1), 184–208 (2016)

S. Wang, B. Li, M. Yang, and Z. Yan, “Intrusion detection for Wi-Fi network: A deep learning approach,” in Wireless Internet. Springer International Publishing, 2019, pp. 95–104.

H. Brendan McMahan, E. Moore, D. Ramage, S. Hampson, and B. Ag¨uera y Arcas, “Communication-efficient learning of deep networks from decentralized data,” Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, vol. 54, 2017.

J. Yang, T. Li, G. Liang, W. He, Y. Zhao, A simple recurrent unit model-based intrusion detection system with dcgan. IEEE Access 7, 83286–83296 (2019)

R. Abdulhammed, H. Musafer, A. Alessa, M. Faezipour, A. Abuzneid, Features dimensionality reduction approaches for machine learning-based network intrusion detection. Electronics 8(3), 322 (2019)

B. Liao, Y. Ali, S. Nazir, L. He, H.U. Khan, Security analysis of IoT devices by using mobile computing: a systematic literature review. IEEE Access 8, 120331–120350 (2020)

M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A detailed analysis of the KDD CUP 99 dataset,” in Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6, Ottawa, ON, Canada, July 2009.

N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive dataset for network intrusion detection systems (UNSW-NB15 network dataset),” in Proceedings of the 2015 Military Communications and Information Systems Conference (Mil-CIS), pp. 1–6, IEEE, Canberra, ACT, Australia, 2015 November.

N. Koroniotis, N. Moustafa, E. Sitnikova, B. Turnbull, Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: bot-IoT dataset. Future Generation Comput. Syst. 100, 779–796 (2019)

M.F. Elrawy, A.I. Awad, H.F.A. Hamed, Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. 7(1), 21 (2018)

A.A. Hamad, G.N. Nguyen, D.-N. Le, Efficient dual cooperative bait detection scheme for collaborative attackers on mobile ad hoc networks. IEEE Access 8, 227962–227969 (2020)

M.K. Shahoodh, The adjacency matrix of the compatible action graph for finite cyclic groups of p-power order. Tikrit J. Pure Sci. 26(1), 123–127 (2021)

F.J. Suhae, A.I. Hussain, Suitability evaluation of mudstone of Injana formation for dam filling materials in Taq Taq area/Erbil/Iraq. Tikrit J.Pure Sci. 25(3), 49–56 (2020)

M.L. Thivagar, A.A. Hamad, A theoretical implementation for a proposed hypercomplex chaotic system. J. Intell. Fuzzy Syst. 38(3), 2585–2590 (2020)

S.R. Thanoon, A comparison between Bayes estimation and the estimation of the minimal unbiased quadratic standard of the bidivision variance analysis model in the presence of interaction. Tikrit J. Pure Sci. 25(2), 116–123 (2020)

S.A. Wuhaib, N.F. Abd, Control of prey disease in stage structure model. Tikrit J. Pure Sci. 25(2), 129–135 (2020)

M.A. Ferrag, O. Friha, L. Maglaras, H. Janicke, L. Shu, Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access 9, 138509–138542 (2021). https://doi.org/10.1109/ACCESS.2021.3118642

A.R. Khan, Facial emotion recognition using conventional machine learning and deep learning methods: current achievements, analysis and remaining challenges. Information 13(6), 268 (2022)

S. Sengan, R. H. Jhaveri, V. Varadarajan, R. Setiawan, and L. Ravi, “A secure recommendation system for providing context-aware physical activity classification for users,” Security and Communication Networks, vol. 2021, 2021.

R. H. Jhaveri, N. M. Patel, Y. Zhong, and A. K. Sangaiah, “Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad hoc networks in industrial IoT,” in Proceedings of the IEEE Access, vol. 6, pp. 20085–20103, IEEE, April 2018.

T. Saba, K. Haseeb, I. Ahmed, A. Rehman, Secure and energy-efficient framework using Internet of Medical Things or e-healthcare. J. Infect. Public Health 13(10), 1567–1575 (2020)

F.A. Khan, A. Gumaei, A. Derhab, A. Hussain, TSDL: a two-stage deep learning model for efficient network intrusion detection. IEEE Access 7, 30373–30385 (2019)

A. Andalib and V. T. Vakili, “An autonomous intrusion detection system using an ensemble of advanced learners,” in Proceedings of the 2020 28th Iranian Conference on Electrical Engineering (ICEE), pp. 1–5, IEEE, Tabriz, Iran, 2020.

S. Agrawal, J. Agrawal, Survey on anomaly detection using data mining techniques. Proc. Comput. Sci. 60, 708–713 (2015)

M. Ahmed, A. Naser Mahmood, J. Hu, A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)

J. Ran, Y. Ji, and B. Tang, “A Semi-Supervised learning approach to IEEE 802.11 network anomaly detection,” in 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Apr. 2019, pp. 1– 5.

V. L. L. Thing, “IEEE 802.11 network anomaly detection and attack classification: A deep learning approach,” in 2017 IEEE Wireless Communications and Networking Conference (WCNC). ieeexplore.ieee.org, Mar. 2017, pp. 1–6.

I. Abunadi, A.A. Albraikan, J.S. Alzahrani et al., An automated glow worm swarm optimization with an inception based deep convolutional neural network for COVID-19 diagnosis and classification. Healthcare 10(4), 697 (2022)

A. R. Gupta and J. Agrawal, “A comprehensive survey on various machine learning methods used for intrusion detection system,” in Proceedings of the 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), pp. 282–289, IEEE, Gwalior, India, 2020.

K. Farhana, M. Rahman, M.T. Ahmed, An intrusion detection system for packet and flow-based networks using deep neural network approach. Int. J. Electr. Comput. Eng. 10(5), 5514 (2020)

W. Y. B. Lim, N. C. Luong, D. T. Hoang, Y. Jiao, Y.-C. Liang, Q. Yang, D. Niyato, and C. Miao, ``Federated learning in mobile edge networks: A comprehensive survey,'' IEEE Commun. Surveys Tuts., vol. 22, no. 3, pp. 2031_2063, 3rd Quart., 2020.

P. Pu Liang, T. Liu, L. Ziyin, N. B. Allen, R. P. Auerbach, D. Brent, R. Salakhutdinov, and L.-P. Morency, ``Think locally, act globally: Federated learning with local and global representations,'' 2020, arXiv:2001.01523. [Online]. Available: http://arxiv.org/abs/2001.01523

B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. Y. Arcas, ``Communication-efficient learning of deep networks from decentralized data,'' in Proc. Artif. Intell. Statist., 2017, pp. 1273_1282.

T. Li, A. Kumar Sahu, M. Zaheer, M. Sanjabi, A. Talwalkar, and V. Smith, ``Federated optimization in heterogeneous networks,'' 2018, arXiv:1812.06127. [Online]. Available: http://arxiv.org/abs/1812.06127

L. Huang, Y. Yin, Z. Fu, S. Zhang, H. Deng, and D. Liu, ``LoAdaBoost: Loss-based AdaBoost federated machine learning with reduced computational complexity on IID and non-IID intensive care data,'' 2018, arXiv:1811.12629. [Online]. Available: http://arxiv.org/abs/1811.12629

C. He, S. Li, J. Therefore, X. Zeng, M. Zhang, H. Wang, X. Wang, P. Vepakomma, A. Singh, H. Qiu, X. Zhu, J. Wang, L. Shen, P. Zhao, Y. Kang, Y. Liu, R. Raskar, Q. Yang, M. Annavaram, and S. Avestimehr, “Fedml: A research library and benchmark for federated machine learning,” 2020.

Q. Yang, Y. Liu, Y. Cheng, Y. Kang, T. Chen, and H. Yu, Federated Learning, ser. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan & Claypool Publishers, 2019. [Online]. Available: https://doi.org/10.2200/S00960ED2V01Y201910AIM043

Y. Ma, D. Yu, T. Wu, and H. Wang, “Paddlepaddle: An open-source deep learning platform from industrial practice,” Frontiers of Data and Domputing, vol. 1, no. 1, p. 105, 2019. [Online]. Available: http://www.jfdc.cnic.cn/EN/abstract/article 2.shtml

S. Caldas, P. Wu, T. Li, J. Koneˇcn´y, H. Brendan McMahan, V. Smith, and A. Talwalkar, “LEAF: A benchmark for federated settings,” 2018.

J. Schneible and A. Lu, “Anomaly detection on the edge,” in MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), Oct. 2017, pp. 678–682.

S. Xu, Y. Qian, and R. Q. Hu, “Data-driven edge intelligence for robust network anomaly detection,” IEEE Transactions on Network Science and Engineering, pp. 1–1, 2019.

S. A. Marhon, C. J. F. Cameron, and S. C. Kremer, Recurrent Neural Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 29–65. [Online]. Available: https://doi.org/10.1007/978-3-642-36657-4 2

F. Murtagh, “Multilayer perceptrons for classification and regression,” Neurocomputing, vol. 2, no. 5, pp. 183–197, 1991. [Online]. Available: https://www.sciencedirect.com/science/article/pii/0925231291900235

S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural Comput., vol. 9, no. 8, p. 1735–1780, nov 1997. [Online]. Available: https://doi.org/10.1162/neco.1997.9.8.1735

J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Empirical evaluation of gated recurrent neural networks on sequence modelling,” 2014.

D. Bank, N. Koenigstein, and R. Giryes, “Autoencoders,” 2021.

Y. Liu, S. Garg, J. Nie, Y. Zhang, Z. Xiong, J. Kang, M.S. Hossain, Deep Anomaly Detection for Time-Series Data in Industrial IoT: A Communication-Efficient On-Device Federated Learning Approach. IEEE Internet of Things Journal 8(8), 6348–6358 (2021)

R. Zhao, Y. Yin, Y. Shi, and Z. Xue, “Intelligent intrusion detection based on federated learning aided long short-term memory,” Physical Communication, vol. 42, p. 101157, 2020. [Online]. Available: https://doi.org/10.1016/j.phycom.2020.101157

K.Y. Lin, W.R. Huang, Using Federated Learning on Malware Classification. International Conference on Advanced Communication Technology, ICACT 2020, 585–589 (2020)

B. Li, Y. Wu, J. Song, R. Lu, T. Li, L. Zhao, DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Informatics 17(8), 5615–5624 (2021)

P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” vol. 5, 05 1999, pp. 223–238.

V. Mothukuri, P. Khare, R. M. Parizi, S. Pouriyeh, A. Dehghantanha, and G. Srivastava, “Federated Learning-based Anomaly Detection for IoT Security Attacks,” IEEE Internet of Things Journal, vol. 4662, no. c, pp. 1–10, 2021.

I. Fraz˜ao, P. Henriques Abreu, T. Cruz, H. Araujo, and P. Simoes, “Denial of service attacks: Detecting the frailties of machine learning algorithms in the classification process:” 12 2018, pp. 230–235.

Z. Chen, N. Lv, P. Liu, Y. Fang, K. Chen, and W. Pan, “Intrusion Detection for Wireless Edge Networks Based on Federated Learning,” IEEE Access, vol. 8, pp. 217 463–217 472, 2020.

Y. Qin and M. Kondo, “Federated Learning-Based Network Intrusion Detection with a Feature Selection Approach,” in 3rd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2021, 2021.

D. Preuveneers, V. Rimmer, I. Tsingenopoulos, J. Spooren, W. Joosen, and E. Ilie-Zudor, “Chained anomaly detection models for federated learning: An intrusion detection case study,” Applied Sciences (Switzer-land), vol. 8, no. 12, pp. 1–21, 2018.

A. Cholakoska, B. Pfitzner, H. Gjoreski, V. Rakovic, B. Arnrich, and M. Kalendar, “Differentially Private Federated Learningfor Anomaly Detection in eHealth Networks,” no. Ml, pp. 514–518, 2021.

B. Cetin, A. Lazar, J. Kim, A. Sim, and K. Wu, “Federated Wireless Network Intrusion Detection,” Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019, pp. 6004–6006, 2019.

P. Tian, Z. Chen, W. Yu, and W. Liao, “Towards asynchronous federated learning-based threat detection: A DC-Adam approach,” Computers and Security, vol. 108, p. 102344, 2021. [Online]. Available: https://doi.org/10.1016/j.cose.2021.102344

D. Preuveneers, V. Rimmer, I. Tsingenopoulos, J. Spooren, W. Joosen, E. Ilie-Zudor, “Chained anomaly detection models for federated learning: an intrusion detection case study”, NATO. Adv. Sci. Inst. Ser. E Appl. Sci. 8(12), 2663 (2018)

C. Cachin and M. Vukolic, “Blockchain consensus protocols in the wild,” in Proc. 31st Intl. Symposium on Distributed Computing (DISC 2017), 2017.

B. Weinger, J. Kim, A. Sim, M. Nakashima, N. Moustafa, and K. J. Wu, “Enhancing IoT anomaly detection performance for federated learning,” Proceedings - 2020 16th International Conference on Mobility, Sensing and Networking, MSN 2020, pp. 206–213, 2020.

N. A. Al-Athba Al-Marri, B. S. Ciftler, and M. M. Abdallah, “Federated Mimic Learning for Privacy Preserving Intrusion Detection,” 2020 IEEE International Black Sea Conference on Communications and Networking, Black SEACOM 2020, 2020.

Y. Zhao, J. Chen, D. Wu, J. Teng, and S. Yu, “Multitask network anomaly detection using federated learning,” Pervasive Health: Pervasive Computing Technologies for Healthcare, pp. 273–279, 2019.

Y. Ali, H. Ullah Khan, GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment. Computers & Industrial Engineering 168, 108119 (2022)

H.-Y. Chen, C.-H. Tu, Z. Li, H. W. Shen, and W.-L. Chao, “On the importance and applicability of pre-training for federated learning,” in International Conference on Learning Representations, 2023.

J. Nguyen, K. Malik, M. Sanjabi, M. Rabbat, Where to begin? exploring the impact of pre-training and initialization in federated learning (2022)

Anish Nath. Packet Analysis with Wireshark. Packt Publishing Ltd, 2015.

AWID, “Awid-wireless security datasets project dataset,” 2015. [Online]. Available: http://icsdweb.aegean.gr/awid/features.html

J.A. Bonachela, H. Hinrichsen, M.A. Munoz, Entropy estimates of small datasets. J. Phys. A 41(20), 202001 (2008)

Hinton GE, Simon O, Whye TY. A fast learning algorithm for deep belief nets. Neural Comput 18, 1527–1554 (2006)

B. Cetin, A. Lazar, J. Kim, A. Sim and K. Wu, "Federated Wireless Network Intrusion Detection," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 6004-6006, https://doi.org/10.1109/BigData47090.2019.9005507.

H. B. Desai, M. S. Ozdayi, and M. Kantarcioglu, “Blockfla: Accountable federated learning via hybrid blockchain architecture,” 2020.