Pub Date : 2023-05-10DOI: 10.1109/ISMICT58261.2023.10152107
Zie Eya Ekolle, Ryuji Kohno, H. Ochiai
Most cybersecurity solutions are based on building a single logical entity to tackle one or multiple cyber threats. Such solutions have proven effective but can be less advantageous in a situation where cyber threats are so many, such that building a detection mechanism will imply writing a lot of logical expressions. Such solutions can be less effective on a specific threat and resource exhaustive on multiple threats. This can be risky to implement in delicate environments such as the medical IoT environment, where an optimal threat detection precision is required. In this paper, we introduce a distributed cybersecurity solution where the logical entities (agents) are distributed in federation along a threat profile, and their individual security operations are merged to produce a globalized security solution over a larger threat profile. We did experiment on this proposed solution and compare the results with those of conventional cybersecurity solution.
{"title":"A Distributed Cybersecurity Solution in an IoMT Network Using a Multi-target Federated Learning","authors":"Zie Eya Ekolle, Ryuji Kohno, H. Ochiai","doi":"10.1109/ISMICT58261.2023.10152107","DOIUrl":"https://doi.org/10.1109/ISMICT58261.2023.10152107","url":null,"abstract":"Most cybersecurity solutions are based on building a single logical entity to tackle one or multiple cyber threats. Such solutions have proven effective but can be less advantageous in a situation where cyber threats are so many, such that building a detection mechanism will imply writing a lot of logical expressions. Such solutions can be less effective on a specific threat and resource exhaustive on multiple threats. This can be risky to implement in delicate environments such as the medical IoT environment, where an optimal threat detection precision is required. In this paper, we introduce a distributed cybersecurity solution where the logical entities (agents) are distributed in federation along a threat profile, and their individual security operations are merged to produce a globalized security solution over a larger threat profile. We did experiment on this proposed solution and compare the results with those of conventional cybersecurity solution.","PeriodicalId":332729,"journal":{"name":"2023 IEEE 17th International Symposium on Medical Information and Communication Technology (ISMICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}