FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems
نویسندگان
چکیده
Deep learning (DL) methods have been widely applied to anomaly-based network intrusion detection system (NIDS) detect malicious traffic. To expand the usage scenarios of DL-based methods, federated (FL) allows multiple users train a global model on basis respecting individual data privacy. However, it has not yet systematically evaluated how robust FL-based NIDSs are against existing privacy attacks under defenses. address this issue, we propose two evaluation metrics designed for NIDSs, including (1) score that evaluates similarity between original and recovered traffic features using reconstruction attacks, (2) evasion rate adversarial attack with We conduct experiments illustrate defenses provide little protection corresponding can even evade SOTA NIDS Kitsune. defend such build more NIDS, further FedDef, novel optimization-based input perturbation defense strategy theoretical guarantee. It achieves both high utility by minimizing gradient distance strong maximizing distance. experimentally evaluate four datasets show our outperforms all baselines in terms up 7 times higher score, while maintaining accuracy loss within 3% optimal parameter combination.
منابع مشابه
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملRevisiting Anomaly-based Network Intrusion Detection Systems
Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match with current input raises an alert. A signature-based IDS cannot detect unknown attacks, either ...
متن کاملNeural Network based Intrusion Detection Systems
Recent Intrusion Detection Systems (IDSs) which are used to monitor real-time attacks on computer and network systems are still faced with problems of low detection rate, high false positive, high false negative and alert flooding. This paper present a Neural Network-based approach that combined supervised and unsupervised learning techniques designed to correct some of these problems. The desi...
متن کاملIntrusion Detection based on a Novel Hybrid Learning Approach
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...
متن کاملMachine Learning in Network Intrusion Detection System
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP’99 is the mostly widely used data set for the evaluation of these systems. As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a cr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2023
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2023.3297369