Intrusion Detection Approach for Industrial Internet of Things Traffic Using Deep Recurrent Reinforcement Learning Assisted Federated Learning

Amandeep Kaur
{"title":"Intrusion Detection Approach for Industrial Internet of Things Traffic Using Deep Recurrent Reinforcement Learning Assisted Federated Learning","authors":"Amandeep Kaur","doi":"10.1109/TAI.2024.3443787","DOIUrl":null,"url":null,"abstract":"The rapid growth of industrial Internet of Things (IIoT) applications generates massive amount of heterogeneous data that are prone to cyberattacks. The imperative is to secure industrial data from adversarial attacks and develop a robust and secure framework capable of withstanding sophisticated attacks. Toward this machine learning (ML) algorithms are used for intrusion detection by analyzing the devices’ network traffic. However, classical ML models work on entire datasets that are located on a central server and are not a suitable choice for a secure intrusion detection framework. We propose the federated learning (FL)-based network intrusion detection model for IIoT scenarios which only share learned parameters with the central server and keep the data intact to local servers only. The proposed model is assisted with gated recurrent units (GRUs) for FL training to extract temporal dependencies of network traffic attacks in order to improve intrusion detection accuracy. Additionally, to increase the model aggregation rate of FL, we integrate deep reinforcement learning (DRL) to select of IIoT devices with high quality while keeping data privacy and energy-efficiency as main concerns. In contrast to earlier approaches, we consider nonindependent and identically distributed (non-IID) data over recent IIoT datasets. Experimental findings indicate that the proposed framework outperforms state-of-the-art FL and non-FL intrusion detection models in terms of accuracy, precision, recall, F1-score, and receiver operating characterstics (ROC).","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"6 1","pages":"37-50"},"PeriodicalIF":0.0000,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE transactions on artificial intelligence","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10636228/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid growth of industrial Internet of Things (IIoT) applications generates massive amount of heterogeneous data that are prone to cyberattacks. The imperative is to secure industrial data from adversarial attacks and develop a robust and secure framework capable of withstanding sophisticated attacks. Toward this machine learning (ML) algorithms are used for intrusion detection by analyzing the devices’ network traffic. However, classical ML models work on entire datasets that are located on a central server and are not a suitable choice for a secure intrusion detection framework. We propose the federated learning (FL)-based network intrusion detection model for IIoT scenarios which only share learned parameters with the central server and keep the data intact to local servers only. The proposed model is assisted with gated recurrent units (GRUs) for FL training to extract temporal dependencies of network traffic attacks in order to improve intrusion detection accuracy. Additionally, to increase the model aggregation rate of FL, we integrate deep reinforcement learning (DRL) to select of IIoT devices with high quality while keeping data privacy and energy-efficiency as main concerns. In contrast to earlier approaches, we consider nonindependent and identically distributed (non-IID) data over recent IIoT datasets. Experimental findings indicate that the proposed framework outperforms state-of-the-art FL and non-FL intrusion detection models in terms of accuracy, precision, recall, F1-score, and receiver operating characterstics (ROC).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于深度循环强化学习辅助联邦学习的工业物联网流量入侵检测方法
工业物联网(IIoT)应用的快速发展产生了大量异构数据,容易受到网络攻击。当务之急是保护工业数据免受对抗性攻击,并开发一个能够承受复杂攻击的强大安全框架。为此,机器学习(ML)算法通过分析设备的网络流量来进行入侵检测。然而,经典的机器学习模型适用于位于中央服务器上的整个数据集,并不是安全入侵检测框架的合适选择。我们提出了一种基于联邦学习(FL)的工业物联网网络入侵检测模型,该模型只与中央服务器共享学习参数,并将数据完整地保留到本地服务器。该模型采用门控循环单元(gru)辅助FL训练,提取网络流量攻击的时间依赖关系,以提高入侵检测的准确性。此外,为了提高FL的模型聚合率,我们集成了深度强化学习(DRL)来选择高质量的IIoT设备,同时保持数据隐私和能源效率作为主要关注点。与之前的方法相反,我们考虑了最近IIoT数据集上的非独立和同分布(非iid)数据。实验结果表明,该框架在准确率、精密度、召回率、f1得分和接收者工作特征(ROC)方面优于最先进的FL和非FL入侵检测模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
7.70
自引率
0.00%
发文量
0
期刊最新文献
ICAFS: Inter-Client-Aware Feature Selection for Vertical Federated Learning. 2025 Index IEEE Transactions on Artificial Intelligence Table of Contents Front Cover IEEE Transactions on Artificial Intelligence Publication Information
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1