2020
DOI: 10.1002/ett.3957
|View full text |Cite
|
Sign up to set email alerts
|

Privacy‐preserving multisource transfer learning in intrusion detection system

Abstract: The increasing scale of the network and the demand for data privacy‐preserving have brought several challenges for existing intrusion detection schemes, which presents three issues: large computational overhead, long training period, and different feature distribution which leads low model performance. The emergence of transfer learning has solved the above problems. However, the existing transfer learning‐based schemes can only operate in plaintext when different domains and clouds are untrusted entities, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 27 publications
(31 reference statements)
0
11
0
Order By: Relevance
“…e benchmark algorithms selected in the experiment are ELM [32], TrAdaBoost [13,14,39], and SVM, among which SVM is implemented using the LIBSVM [37] toolkit. e 10-fold cross-validation method is a standard method for evaluating machine learning algorithms, and this study uses the intrusion detection model proposed by its evaluation.…”
Section: Experimental Setting Evaluation Criteriamentioning
confidence: 99%
See 2 more Smart Citations
“…e benchmark algorithms selected in the experiment are ELM [32], TrAdaBoost [13,14,39], and SVM, among which SVM is implemented using the LIBSVM [37] toolkit. e 10-fold cross-validation method is a standard method for evaluating machine learning algorithms, and this study uses the intrusion detection model proposed by its evaluation.…”
Section: Experimental Setting Evaluation Criteriamentioning
confidence: 99%
“…e experimental results show that compared with the existing methods, the detection accuracy of our model scheme is improved by at least 23%. Xu et al [13] designed a multisource transfer learning intrusion detection system for privacy protection. First, the system uses Paillier homomorphism to encrypt the models that are trained from different source domains and uploaded to the cloud and then proposes a multisource transfer learning intrusion detection system based on encryption XGBoost (e-XGBoost) based on a privacy protection scheme.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…23,24 Network administrators have applied intrusion detection systems (IDS) to supply essential network security. 17,25 An intrusion is a kind of attack on information assets in which the instigator attempts to gain entry into a system or disturb its usual operations. 26 Intrusion detection is the process of monitoring networks for unauthorized access, activity, or file modification.…”
Section: Introductionmentioning
confidence: 99%
“…A privacy‐preserving multisource transfer learning intrusion detection scheme was introduced in Reference 18 for security analysis. However, the minimization of data loss rate was not sufficient.…”
Section: Introductionmentioning
confidence: 99%