2022 19th Annual International Conference on Privacy, Security &Amp; Trust (PST) 2022
DOI: 10.1109/pst55820.2022.9851984
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 53 publications
0
6
0
Order By: Relevance
“…The results with the CICDDoS2019 dataset showed the superiority of the proposed models under human expertise over most previous works ( [19], [24], [43]) in terms of accuracy, precision, and FPR with 99.80%, 99.98%, and 0.085% for the CNN and 99.76%, 99.99%, and 0.046% for the BiLSTM+LSTM, respectively. However, a DFNN model developed by the authors in [42] demonstrated a slight superiority in accuracy (99.94%) but a lower precision (99.95%).…”
Section: Discussionmentioning
confidence: 71%
See 1 more Smart Citation
“…The results with the CICDDoS2019 dataset showed the superiority of the proposed models under human expertise over most previous works ( [19], [24], [43]) in terms of accuracy, precision, and FPR with 99.80%, 99.98%, and 0.085% for the CNN and 99.76%, 99.99%, and 0.046% for the BiLSTM+LSTM, respectively. However, a DFNN model developed by the authors in [42] demonstrated a slight superiority in accuracy (99.94%) but a lower precision (99.95%).…”
Section: Discussionmentioning
confidence: 71%
“…Neto et al [19] proposed a feedforward neural network model to detect DDoS attacks in a multi-tenant IoT network. The authors used federated learning to maintain the privacy of the tenants' device data while training a deep learning model.…”
Section: Previous Workmentioning
confidence: 99%
“…Neto et al [12] proposed a collaborative DDoS detection solution for a general IoT system, including e-health, by using federated learning. They used different deep learning instances for each pool of data sources to generate the local parameters.…”
Section: Related Workmentioning
confidence: 99%
“…The former identifies attacks by manually maintaining a list of detection rules, which is commonly used in industrial security products. The latter [2][3][4][5][6][7][8][9][10][11] involves training a machine learning model for detection. The drawback of the former lies in the expensive manual maintenance of detection rules, while the latter requires security experts to perform feature engineering.…”
Section: Introductionmentioning
confidence: 99%
“…However, due to limitations in expert knowledge, the defined feature engineering approaches have their own flaws. For instance, the flow header features and Hrust features proposed in [2][3] cannot detect all types of DDoS attacks, and the methods presented in [4][5][6][7][8][9][10][11] can only detect DDoS attacks initiated by IoT botnets.…”
Section: Introductionmentioning
confidence: 99%