Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Federated Learning Based IDS – Key Challenges and Future Paths

admin by admin
Aug 22, 2023
in News
A A
0

In today’s digital era, AI (Artificial Intelligence) and ML (Machine Learning) applications are one of the key developments. 

But, with global initiatives like the EU AI Act and U.S. AI Strategy highlight the importance of ethical AI regulation, especially in cybersecurity.

A report shared with Cyber Security News by a group of cybersecurity analysts consisting of Jose L. Hernandez-Ramos, Georgios Karopoulos, Efstratios Chatzoglou, Vasileios Kouliaridis, Enrique Marmol, Aurora Gonzalez-Vidal, and Georgios Kambourakis, revealed the latest development in the cybersecurity field, which is the decentralized learning approach known as “Federated Learning (FL).”

Under this decentralized approach, the ML models are built without sharing the end nodes’ data by utilizing a certain aggregation.

Federated Learning-Based IDS

For the development of systems and applications based on Machine Learning, this decentralized approach is very important, and not only that, but even this new approach also helps secure the privacy of end users.

web

So, it seems that the complete mechanism of this new approach, Federated Learning (FL), is comprehensive and advanced in nature, as the security systems can use this approach for better protection and defense mechanisms.

Centralized ML vs. FL approach (Source – Arxiv)

The IDS (Intrusion Detection System) detects the threats in IT/OT systems, and the FL-based IDS growth links to accurate evaluation datasets.

Besides this, the initial evolution of IDSs was mainly focused on the approaches that are signature-based, but the recent combination of IDS with an FL-based approach seems promising and far more efficient than the previous approaches.

Taxonomy of FL-based IDS (Source – Arxiv)

Here below, we have mentioned all the datasets:-

  • CIC-IDS2017
  • CSE-CIC-IDS2018
  • CIDDS-001
  • CIDDS-002 
  • CIC DoS
  • PUF
  • TRAbID
  • Unified host and network
  • N-BaIoT
  • Kitsune
  • Bot-IoT
  • AWID3
  • WUSTL-IIoT
  • H23Q
  • IoT network intrusion dataset
  • IoTID20
  • IoT-23
  • IoT Healthcare Security Dataset
  • e IoT DoS and DDoS Attack Dataset
  • CCD-INID-V1
  • X-IIoTID 
  • Edge-IIoTset
  • MQTT-IoT-IDS2020
  • MQTTset
  • LATAM-DDoS-IoT dataset
  • UAV Attack Dataset
  • CIC IoT dataset
  • Intrusion Detection in CAN bus
  • Ton IoT dataset
  • Car Hacking
  • MedBIoT
  • Car Hacking: Attack & Defense Challenge
  • InSDN
  • OTIDS
  • Vehicular Reference Misbehavior Dataset (VeReMi)
Datasets employed by existing FL-enabled IDS (Source – Arxiv)

In this scenario, the neural networks (NNs) used in IDS match the two key elements, and here below, we have mentioned them:-

Moreover, the RL (Reinforcement Learning), an ML branch, has agents learn to maximize rewards through trial and error. While it categorizes into the following methods:-

  • Value-based
  • Policy-based
  • Model-based

Challenges Faced

Here below, we have mentioned all the challenges and future trends for FL-enabled IDS approaches:-

  • Security
  • Privacy
  • Aggregator as bottleneck
  • Data heterogeneity
  • Device heterogeneity
  • Computation requirements
  • Communication requirements

The growth of FL in IDS is clearly notable and skyrocketed rapidly due to its following key features:-

  • Decentralized
  • Collaborative
  • Privacy-protection

Overall, it’s been concluded that this new decentralized approach could be game-changing in the field of cybersecurity.

Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.