2022
DOI: 10.3390/a15070247
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges

Abstract: In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a source of privacy-aware risks. Application of the federated learning paradigm for training attack and anomaly detection models may significantly decrease such risks as the data generated locally are not transferred to any party, and training is performed mainly loca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(7 citation statements)
references
References 70 publications
0
7
0
Order By: Relevance
“…A blockchainenabled intrusion detection and prevention system is proposed which enhances ZTA onto endpoints. Fedorchenko et al [41] reviewed existing federated learning-based IDS solutions and studied their advantages as well as the open challenges they still face. The architecture of the proposed intrusion detection system and the method used to model data partitioning across clients are analyzed with emphasis.…”
Section: Related Workmentioning
confidence: 99%
“…A blockchainenabled intrusion detection and prevention system is proposed which enhances ZTA onto endpoints. Fedorchenko et al [41] reviewed existing federated learning-based IDS solutions and studied their advantages as well as the open challenges they still face. The architecture of the proposed intrusion detection system and the method used to model data partitioning across clients are analyzed with emphasis.…”
Section: Related Workmentioning
confidence: 99%
“…After completing local training, the device transmits model changes-specifically weights and gradients-to a central server, rather than sending raw data [16]. This approach ensures that confidential information remains in its original location, effectively mitigating various privacy risks commonly associated with traditional data centralization [25]. The model updates from all participating devices are consolidated on the central server to create an enhanced global model that incorporates insights derived from all the decentralized data sources.…”
Section: Typical Federated Training Processmentioning
confidence: 99%
“…The analysis examined evaluation variables related to IoT, particularly concerning FL, and identified and dis-cussed prospects and unresolved issues pertaining to FL-based IoT. The authors of [25] also provided an overview and comparison of six studies that use FL to enhance IDS effectiveness for IoT. In the absence of specific datasets for assessing FL, the authors emphasized data partitioning modeling among clients.…”
Section: Related Surveysmentioning
confidence: 99%
“…The test statistic H follows a chi-square distribution with degrees of freedom equal to the number of groups minus 1(df = k-1), where k is the number of groups being compared. The significance of the test can be determined by comparing the obtained test statistic with the crit ical value fro m the chi-square distribution with the appropriate degrees of freedom [24].…”
Section: Kruskal -Wallis Testmentioning
confidence: 99%