Loading…
Federated Deep Learning Approaches for the Privacy and Security of IoT Systems
Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself....
Saved in:
Published in: | Wireless communications and mobile computing 2022-04, Vol.2022, p.1-7 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073 |
---|---|
cites | cdi_FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073 |
container_end_page | 7 |
container_issue | |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2022 |
creator | Alazzam, Malik Bader Alassery, Fawaz Almulihi, Ahmed |
description | Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis. |
doi_str_mv | 10.1155/2022/1522179 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2648811143</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2648811143</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073</originalsourceid><addsrcrecordid>eNp9kE1LAzEURYMoWKs7f0DApY7N5yRZlmq1MKjQug4heWOn2JkxmSrz753S4tLVu4vDvY-D0DUl95RKOWGEsQmVjFFlTtCISk4ynSt1-pdzc44uUtoQQjhhdIRe5hAgug4CfgBocQEu1lX9gadtGxvn15Bw2UTcrQG_xerb-R67OuAl-F2suh43JV40K7zsUwfbdInOSveZ4Op4x-h9_riaPWfF69NiNi0yz7nqMqogSG94cEpCCcoFlQvjOM21EcSDIsEwooFzoYUxTFESNJeBC-ecJ4qP0c2hd3jyaweps5tmF-th0rJcaE0pFXyg7g6Uj01KEUrbxmrrYm8psXtjdm_MHo0N-O0BX1d1cD_V__Qvl-po0Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2648811143</pqid></control><display><type>article</type><title>Federated Deep Learning Approaches for the Privacy and Security of IoT Systems</title><source>Publicly Available Content Database</source><source>Wiley Open Access Journals</source><creator>Alazzam, Malik Bader ; Alassery, Fawaz ; Almulihi, Ahmed</creator><contributor>Rani, Shalli ; Shalli Rani</contributor><creatorcontrib>Alazzam, Malik Bader ; Alassery, Fawaz ; Almulihi, Ahmed ; Rani, Shalli ; Shalli Rani</creatorcontrib><description>Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/1522179</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Accuracy ; Anomalies ; Costs ; Deep learning ; Internet of Things ; IP (Internet Protocol) ; Machine learning ; Malware ; Neural networks ; Personal information ; Privacy ; Security ; Security systems ; Servers ; Training</subject><ispartof>Wireless communications and mobile computing, 2022-04, Vol.2022, p.1-7</ispartof><rights>Copyright © 2022 Malik Bader Alazzam et al.</rights><rights>Copyright © 2022 Malik Bader Alazzam et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073</citedby><cites>FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073</cites><orcidid>0000-0002-8187-2286 ; 0000-0003-0916-678X ; 0000-0001-7964-1051</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2648811143/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2648811143?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,777,781,25734,27905,27906,36993,44571,74875</link.rule.ids></links><search><contributor>Rani, Shalli</contributor><contributor>Shalli Rani</contributor><creatorcontrib>Alazzam, Malik Bader</creatorcontrib><creatorcontrib>Alassery, Fawaz</creatorcontrib><creatorcontrib>Almulihi, Ahmed</creatorcontrib><title>Federated Deep Learning Approaches for the Privacy and Security of IoT Systems</title><title>Wireless communications and mobile computing</title><description>Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis.</description><subject>Accuracy</subject><subject>Anomalies</subject><subject>Costs</subject><subject>Deep learning</subject><subject>Internet of Things</subject><subject>IP (Internet Protocol)</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Neural networks</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Security</subject><subject>Security systems</subject><subject>Servers</subject><subject>Training</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kE1LAzEURYMoWKs7f0DApY7N5yRZlmq1MKjQug4heWOn2JkxmSrz753S4tLVu4vDvY-D0DUl95RKOWGEsQmVjFFlTtCISk4ynSt1-pdzc44uUtoQQjhhdIRe5hAgug4CfgBocQEu1lX9gadtGxvn15Bw2UTcrQG_xerb-R67OuAl-F2suh43JV40K7zsUwfbdInOSveZ4Op4x-h9_riaPWfF69NiNi0yz7nqMqogSG94cEpCCcoFlQvjOM21EcSDIsEwooFzoYUxTFESNJeBC-ecJ4qP0c2hd3jyaweps5tmF-th0rJcaE0pFXyg7g6Uj01KEUrbxmrrYm8psXtjdm_MHo0N-O0BX1d1cD_V__Qvl-po0Q</recordid><startdate>20220401</startdate><enddate>20220401</enddate><creator>Alazzam, Malik Bader</creator><creator>Alassery, Fawaz</creator><creator>Almulihi, Ahmed</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-8187-2286</orcidid><orcidid>https://orcid.org/0000-0003-0916-678X</orcidid><orcidid>https://orcid.org/0000-0001-7964-1051</orcidid></search><sort><creationdate>20220401</creationdate><title>Federated Deep Learning Approaches for the Privacy and Security of IoT Systems</title><author>Alazzam, Malik Bader ; Alassery, Fawaz ; Almulihi, Ahmed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Anomalies</topic><topic>Costs</topic><topic>Deep learning</topic><topic>Internet of Things</topic><topic>IP (Internet Protocol)</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Neural networks</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Security</topic><topic>Security systems</topic><topic>Servers</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alazzam, Malik Bader</creatorcontrib><creatorcontrib>Alassery, Fawaz</creatorcontrib><creatorcontrib>Almulihi, Ahmed</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Databases</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alazzam, Malik Bader</au><au>Alassery, Fawaz</au><au>Almulihi, Ahmed</au><au>Rani, Shalli</au><au>Shalli Rani</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Federated Deep Learning Approaches for the Privacy and Security of IoT Systems</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-04-01</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>7</epage><pages>1-7</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/1522179</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0002-8187-2286</orcidid><orcidid>https://orcid.org/0000-0003-0916-678X</orcidid><orcidid>https://orcid.org/0000-0001-7964-1051</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2022-04, Vol.2022, p.1-7 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2648811143 |
source | Publicly Available Content Database; Wiley Open Access Journals |
subjects | Accuracy Anomalies Costs Deep learning Internet of Things IP (Internet Protocol) Machine learning Malware Neural networks Personal information Privacy Security Security systems Servers Training |
title | Federated Deep Learning Approaches for the Privacy and Security of IoT Systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T06%3A42%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Federated%20Deep%20Learning%20Approaches%20for%20the%20Privacy%20and%20Security%20of%20IoT%20Systems&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Alazzam,%20Malik%20Bader&rft.date=2022-04-01&rft.volume=2022&rft.spage=1&rft.epage=7&rft.pages=1-7&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/1522179&rft_dat=%3Cproquest_cross%3E2648811143%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2648811143&rft_id=info:pmid/&rfr_iscdi=true |