Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of The 2021
DOI: 10.1145/3460418.3479365
|View full text |Cite
|
Sign up to set email alerts
|

Differentially Private Federated Learningfor Anomaly Detection in eHealth Networks

Abstract: Increasing number of ubiquitous devices are being used in the medical field to collect patient information. Those connected sensors can potentially be exploited by third parties who want to misuse personal information and compromise the security, which could ultimately result even in patient death. This paper addresses the security concerns in eHealth networks and suggests a new approach to dealing with anomalies. In particular we propose a concept for safe in-hospital learning from internet of health things (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…The reason for AEs being so common within FL-IDS architecture 7,11,38,39,44 is that their input reconstruction abilities suit themselves very nicely for intrusion detection based on anomaly detection. Once the usual network traffic patterns are learned, anomalies are translated into high reconstruction loss instances.…”
Section: Employing Fl In Idsmentioning
confidence: 99%
“…The reason for AEs being so common within FL-IDS architecture 7,11,38,39,44 is that their input reconstruction abilities suit themselves very nicely for intrusion detection based on anomaly detection. Once the usual network traffic patterns are learned, anomalies are translated into high reconstruction loss instances.…”
Section: Employing Fl In Idsmentioning
confidence: 99%
“…[91], [92], [93], [94] [95], [96], [97], [98] [99], [100], [101], [102], [103] [104], [105], [106], [107], [108] Fig. 2: Existing Deep Learning Federated Intrusion Detection Systems by model architecture.…”
Section: Mlp Ae Vanillamentioning
confidence: 99%
“…Moreover, autoencoder based FL-IDS could be extended to other areas of edge computing. For instance, Cholakoska et al [101] leverage FL to deal with anomalies in eHealth networks. Due to the sensitive nature of medical data, employing Differential Privacy gains special attention in this work.…”
Section: Autoencodersmentioning
confidence: 99%
“…As a novel technique, it was tested and found to outperform existing methods against relevant threat models. Machine learning approaches, such as in [ 189 ], are also beginning to come to the fore against security attacks in eHealth networks. For instance, in [ 189 ], the authors developed a differentially private federated learning method for anomaly detection in eHealth networks.…”
Section: Ehealth: Security and Privacy Concernsmentioning
confidence: 99%
“…Machine learning approaches, such as in [ 189 ], are also beginning to come to the fore against security attacks in eHealth networks. For instance, in [ 189 ], the authors developed a differentially private federated learning method for anomaly detection in eHealth networks. In this case, network traffic was protected using a federated learning-based jointly trained anomaly detection system.…”
Section: Ehealth: Security and Privacy Concernsmentioning
confidence: 99%