FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems

نویسندگان

چکیده

Deep learning (DL) methods have been widely applied to anomaly-based network intrusion detection system (NIDS) detect malicious traffic. To expand the usage scenarios of DL-based methods, federated (FL) allows multiple users train a global model on basis respecting individual data privacy. However, it has not yet systematically evaluated how robust FL-based NIDSs are against existing privacy attacks under defenses. address this issue, we propose two evaluation metrics designed for NIDSs, including (1) score that evaluates similarity between original and recovered traffic features using reconstruction attacks, (2) evasion rate adversarial attack with We conduct experiments illustrate defenses provide little protection corresponding can even evade SOTA NIDS Kitsune. defend such build more NIDS, further FedDef, novel optimization-based input perturbation defense strategy theoretical guarantee. It achieves both high utility by minimizing gradient distance strong maximizing distance. experimentally evaluate four datasets show our outperforms all baselines in terms up 7 times higher score, while maintaining accuracy loss within 3% optimal parameter combination.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

Revisiting Anomaly-based Network Intrusion Detection Systems

Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match with current input raises an alert. A signature-based IDS cannot detect unknown attacks, either ...

متن کامل

Neural Network based Intrusion Detection Systems

Recent Intrusion Detection Systems (IDSs) which are used to monitor real-time attacks on computer and network systems are still faced with problems of low detection rate, high false positive, high false negative and alert flooding. This paper present a Neural Network-based approach that combined supervised and unsupervised learning techniques designed to correct some of these problems. The desi...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Machine Learning in Network Intrusion Detection System

During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP’99 is the mostly widely used data set for the evaluation of these systems. As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a cr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2023

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2023.3297369