Loading…

Federated Deep Learning Approaches for the Privacy and Security of IoT Systems

Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself....

Full description

Saved in:
Bibliographic Details
Published in:Wireless communications and mobile computing 2022-04, Vol.2022, p.1-7
Main Authors: Alazzam, Malik Bader, Alassery, Fawaz, Almulihi, Ahmed
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073
cites cdi_FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073
container_end_page 7
container_issue
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2022
creator Alazzam, Malik Bader
Alassery, Fawaz
Almulihi, Ahmed
description Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis.
doi_str_mv 10.1155/2022/1522179
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2648811143</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2648811143</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073</originalsourceid><addsrcrecordid>eNp9kE1LAzEURYMoWKs7f0DApY7N5yRZlmq1MKjQug4heWOn2JkxmSrz753S4tLVu4vDvY-D0DUl95RKOWGEsQmVjFFlTtCISk4ynSt1-pdzc44uUtoQQjhhdIRe5hAgug4CfgBocQEu1lX9gadtGxvn15Bw2UTcrQG_xerb-R67OuAl-F2suh43JV40K7zsUwfbdInOSveZ4Op4x-h9_riaPWfF69NiNi0yz7nqMqogSG94cEpCCcoFlQvjOM21EcSDIsEwooFzoYUxTFESNJeBC-ecJ4qP0c2hd3jyaweps5tmF-th0rJcaE0pFXyg7g6Uj01KEUrbxmrrYm8psXtjdm_MHo0N-O0BX1d1cD_V__Qvl-po0Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2648811143</pqid></control><display><type>article</type><title>Federated Deep Learning Approaches for the Privacy and Security of IoT Systems</title><source>Publicly Available Content Database</source><source>Wiley Open Access Journals</source><creator>Alazzam, Malik Bader ; Alassery, Fawaz ; Almulihi, Ahmed</creator><contributor>Rani, Shalli ; Shalli Rani</contributor><creatorcontrib>Alazzam, Malik Bader ; Alassery, Fawaz ; Almulihi, Ahmed ; Rani, Shalli ; Shalli Rani</creatorcontrib><description>Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/1522179</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Accuracy ; Anomalies ; Costs ; Deep learning ; Internet of Things ; IP (Internet Protocol) ; Machine learning ; Malware ; Neural networks ; Personal information ; Privacy ; Security ; Security systems ; Servers ; Training</subject><ispartof>Wireless communications and mobile computing, 2022-04, Vol.2022, p.1-7</ispartof><rights>Copyright © 2022 Malik Bader Alazzam et al.</rights><rights>Copyright © 2022 Malik Bader Alazzam et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073</citedby><cites>FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073</cites><orcidid>0000-0002-8187-2286 ; 0000-0003-0916-678X ; 0000-0001-7964-1051</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2648811143/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2648811143?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,777,781,25734,27905,27906,36993,44571,74875</link.rule.ids></links><search><contributor>Rani, Shalli</contributor><contributor>Shalli Rani</contributor><creatorcontrib>Alazzam, Malik Bader</creatorcontrib><creatorcontrib>Alassery, Fawaz</creatorcontrib><creatorcontrib>Almulihi, Ahmed</creatorcontrib><title>Federated Deep Learning Approaches for the Privacy and Security of IoT Systems</title><title>Wireless communications and mobile computing</title><description>Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis.</description><subject>Accuracy</subject><subject>Anomalies</subject><subject>Costs</subject><subject>Deep learning</subject><subject>Internet of Things</subject><subject>IP (Internet Protocol)</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Neural networks</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Security</subject><subject>Security systems</subject><subject>Servers</subject><subject>Training</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kE1LAzEURYMoWKs7f0DApY7N5yRZlmq1MKjQug4heWOn2JkxmSrz753S4tLVu4vDvY-D0DUl95RKOWGEsQmVjFFlTtCISk4ynSt1-pdzc44uUtoQQjhhdIRe5hAgug4CfgBocQEu1lX9gadtGxvn15Bw2UTcrQG_xerb-R67OuAl-F2suh43JV40K7zsUwfbdInOSveZ4Op4x-h9_riaPWfF69NiNi0yz7nqMqogSG94cEpCCcoFlQvjOM21EcSDIsEwooFzoYUxTFESNJeBC-ecJ4qP0c2hd3jyaweps5tmF-th0rJcaE0pFXyg7g6Uj01KEUrbxmrrYm8psXtjdm_MHo0N-O0BX1d1cD_V__Qvl-po0Q</recordid><startdate>20220401</startdate><enddate>20220401</enddate><creator>Alazzam, Malik Bader</creator><creator>Alassery, Fawaz</creator><creator>Almulihi, Ahmed</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-8187-2286</orcidid><orcidid>https://orcid.org/0000-0003-0916-678X</orcidid><orcidid>https://orcid.org/0000-0001-7964-1051</orcidid></search><sort><creationdate>20220401</creationdate><title>Federated Deep Learning Approaches for the Privacy and Security of IoT Systems</title><author>Alazzam, Malik Bader ; Alassery, Fawaz ; Almulihi, Ahmed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Anomalies</topic><topic>Costs</topic><topic>Deep learning</topic><topic>Internet of Things</topic><topic>IP (Internet Protocol)</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Neural networks</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Security</topic><topic>Security systems</topic><topic>Servers</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alazzam, Malik Bader</creatorcontrib><creatorcontrib>Alassery, Fawaz</creatorcontrib><creatorcontrib>Almulihi, Ahmed</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Databases</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alazzam, Malik Bader</au><au>Alassery, Fawaz</au><au>Almulihi, Ahmed</au><au>Rani, Shalli</au><au>Shalli Rani</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Federated Deep Learning Approaches for the Privacy and Security of IoT Systems</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-04-01</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>7</epage><pages>1-7</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Using federated learning, which is a distributed machine learning approach, a machine learning model can train on a distributed data set without having to transfer any data between computers. Instead of using a centralised server for training, the model uses data stored locally on the device itself. After that, the server uses this model to create a jointly trained model. Federated learning asserts that privacy is preserved because no data is sent. Botnet attacks are detected using on-device decentralised traffic statistics and a deep autoencoder. This proposed federated learning approach addresses privacy and security concerns about data privacy and security rather than allowing data to be transferred or relocated off the network edge. In order to get the intended results of a previously centralised machine learning technique while also increasing data security, computation will be shifted to the edge layer. Up to 98% accuracy is achieved in anomaly detection with our proposed model using features like MAC IP and source/destination/IP for training. Our solution outperforms a standard centrally managed system in terms of attack detection accuracy, according to our comparative performance analysis.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/1522179</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0002-8187-2286</orcidid><orcidid>https://orcid.org/0000-0003-0916-678X</orcidid><orcidid>https://orcid.org/0000-0001-7964-1051</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2022-04, Vol.2022, p.1-7
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2648811143
source Publicly Available Content Database; Wiley Open Access Journals
subjects Accuracy
Anomalies
Costs
Deep learning
Internet of Things
IP (Internet Protocol)
Machine learning
Malware
Neural networks
Personal information
Privacy
Security
Security systems
Servers
Training
title Federated Deep Learning Approaches for the Privacy and Security of IoT Systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T06%3A42%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Federated%20Deep%20Learning%20Approaches%20for%20the%20Privacy%20and%20Security%20of%20IoT%20Systems&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Alazzam,%20Malik%20Bader&rft.date=2022-04-01&rft.volume=2022&rft.spage=1&rft.epage=7&rft.pages=1-7&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/1522179&rft_dat=%3Cproquest_cross%3E2648811143%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c337t-17ed5c93da75efe7ad7649a3168940ce70d9208e33484992710d835d34aaac073%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2648811143&rft_id=info:pmid/&rfr_iscdi=true