2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) 2021
DOI: 10.1109/icecce52056.2021.9514222
|View full text |Cite
|
Sign up to set email alerts
|

Federated Learning-Based Network Intrusion Detection with a Feature Selection Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 10 publications
0
19
0
Order By: Relevance
“…The reason for AEs being so common within FL-IDS architecture 7,11,38,39,44 is that their input reconstruction abilities suit themselves very nicely for intrusion detection based on anomaly detection. Once the usual network traffic patterns are learned, anomalies are translated into high reconstruction loss instances.…”
Section: Employing Fl In Idsmentioning
confidence: 99%
See 2 more Smart Citations
“…The reason for AEs being so common within FL-IDS architecture 7,11,38,39,44 is that their input reconstruction abilities suit themselves very nicely for intrusion detection based on anomaly detection. Once the usual network traffic patterns are learned, anomalies are translated into high reconstruction loss instances.…”
Section: Employing Fl In Idsmentioning
confidence: 99%
“…Once the usual network traffic patterns are learned, anomalies are translated into high reconstruction loss instances. Qin et al 39 face the challenge of using high dimensional time series with resource limited IoT devices. A greedy feature selection algorithm is employed to DNN RNN LSTM 21,29,30,48 GRU 10,27,33,35 MLP AE 7,11,38,39,44 Vanilla 1,23,40,47,49 deal with data dimensionality issues, as well as a sequential implementation of batch learning is applied to an autoencoder.…”
Section: Employing Fl In Idsmentioning
confidence: 99%
See 1 more Smart Citation
“…AEs are the most common FL-IDS architecture [99]- [103] to perform ID via anomaly detection due to their input reconstruction abilities. Once the usual network traffic patterns are learned, anomalies are translated into high reconstruction loss instances.…”
Section: Autoencodersmentioning
confidence: 99%
“…Qin et al [99] face the challenge of performing real-time high-dimensional time series analysis to create an anomalybased ID for resource-limited embedded systems. On-device sequential learning neural network ONLAD [130] is created by applying Online Sequential Extreme Learning Machine (OS-ELM) [131] to an Autoencoder [132], with the objective of performing threat detection.…”
Section: Autoencodersmentioning
confidence: 99%