FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system

被引:1
|
作者
Nivaashini, M. [1 ]
Suganya, E. [2 ]
Sountharrajan, S. [3 ]
Prabu, M. [3 ]
Bavirisetti, Durga Prasad [4 ]
机构
[1] Sri Eshwar Coll Engn, Dept Artificial Intelligence & Data Sci, Coimbatore, Tamilnadu, India
[2] Sri Sivasubramaniya Nadar Coll Engn, Dept Informat Technol, Chennai, Tamilnadu, India
[3] Amrita Vishwa Vidyapeetham, Amrita Sch Comp, Dept Comp Sci & Engn, Chennai, India
[4] Norwegian Univ Sci & Technol NTNU, Dept Comp Sci, Trondheim, Norway
关键词
Federated learning (FL); Deep learning (DL); Wi-Fi attacks; Intrusion detection system (IDS);
D O I
10.1186/s13635-024-00156-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet. Wi-Fi network security is severely questioned since there is no physical barrier separating a wireless network from a wired network, and the security procedures in place are defenseless against a wide range of threats. This study set out to assess federated learning, a new technique, as a possible remedy for privacy issues and the high expense of data collecting in network attack detection. To detect and identify cyber threats, especially in Wi-Fi networks, the research presents FEDDBN-IDS, a revolutionary intrusion detection system (IDS) that makes use of deep belief networks (DBNs) inside a federated deep learning (FDL) framework. Every device has a pre-trained DBN with stacking restricted Boltzmann machines (RBM) to learn low-dimensional characteristics from unlabelled local and private data. Later, these models are combined by a central server using federated learning (FL) to create a global model. The whole model is then enhanced by the central server with fully linked SoftMax layers to form a supervised neural network, which is then trained using publicly accessible labeled AWID datasets. Our federated technique produces a high degree of classification accuracy, ranging from 88% to 98%, according to the results of our studies.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] GNN-IDS: Graph Neural Network based Intrusion Detection System
    Sun, Zhenlu
    Teixeira, Andre M. H.
    Toor, Salman
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [33] A systematic literature review for network intrusion detection system (IDS)
    Abdulganiyu, Oluwadamilare Harazeem
    Tchakoucht, Taha Ait
    Saheed, Yakub Kayode
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1125 - 1162
  • [34] A systematic literature review for network intrusion detection system (IDS)
    Oluwadamilare Harazeem Abdulganiyu
    Taha Ait Tchakoucht
    Yakub Kayode Saheed
    International Journal of Information Security, 2023, 22 : 1125 - 1162
  • [35] GowFed A novel federated network intrusion detection system
    Belenguer, Aitor
    Pascual, Jose A.
    Navaridas, Javier
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 217
  • [36] An Efficient Federated Learning System for Network Intrusion Detection
    Li, Jianbin
    Tong, Xin
    Liu, Jinwei
    Cheng, Long
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2455 - 2464
  • [37] Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System
    Thakkar, Ankit
    Lohiya, Ritika
    INFORMATION FUSION, 2023, 90 : 353 - 363
  • [38] An optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network
    Wei, Peng
    Li, Yufeng
    Zhang, Zhen
    Hu, Tao
    Li, Ziyong
    Liu, Diyang
    IEEE ACCESS, 2019, 7 : 87593 - 87605
  • [39] Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network
    Zhang, Ying
    Li, Peisong
    Wang, Xinheng
    IEEE ACCESS, 2019, 7 : 31711 - 31722
  • [40] Research on Feature Selection Method of Intrusion Detection Based on Deep Belief Network
    BaoyiWang
    Sun, Shan
    Zhang, Shaomin
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 556 - 561