Chandu Jagan Sekhar Madala, G. H. K. Yadav, S. Sivakumar, R. Nithya, M. M., M. Deivakani
{"title":"网络物理系统中恶意活动跟踪的联邦学习方法","authors":"Chandu Jagan Sekhar Madala, G. H. K. Yadav, S. Sivakumar, R. Nithya, M. M., M. Deivakani","doi":"10.1109/ICECAA55415.2022.9936285","DOIUrl":null,"url":null,"abstract":"The fast rise of the Internet and advanced technologies causes an increase in network traffic, making network infrastructure increasingly complicated and varied. Mobile phones, wearable gadgets, and driverless cars are all instances of dispersed networks that create massive amounts of data every day. The processing capability of these devices has also increased steadily, necessitating the need to transport data, store data locally, and direct network calculations to edge devices. Intrusion detection systems are essential in guaranteeing the safety and confidentiality of such equipment. Deep Learning (DL) combined Intrusion Detection Systems (IDS) have gained prominence due to their excellent categorization accuracy. However, the requirement to store and communicate data to a centralized server may jeopardize privacy and security concerns. Federated learning (FL), on the other hand, fits in nicely as private information decentralized learning approach that does not transport data but instead trains algorithms locally and sends the parameters to a centralized server. This work targets to offer an extensive overview of the FL in intrusion detection systems.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Federated Learning Approach for Tracking Malicious Activities in Cyber-Physical Systems\",\"authors\":\"Chandu Jagan Sekhar Madala, G. H. K. Yadav, S. Sivakumar, R. Nithya, M. M., M. Deivakani\",\"doi\":\"10.1109/ICECAA55415.2022.9936285\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The fast rise of the Internet and advanced technologies causes an increase in network traffic, making network infrastructure increasingly complicated and varied. Mobile phones, wearable gadgets, and driverless cars are all instances of dispersed networks that create massive amounts of data every day. The processing capability of these devices has also increased steadily, necessitating the need to transport data, store data locally, and direct network calculations to edge devices. Intrusion detection systems are essential in guaranteeing the safety and confidentiality of such equipment. Deep Learning (DL) combined Intrusion Detection Systems (IDS) have gained prominence due to their excellent categorization accuracy. However, the requirement to store and communicate data to a centralized server may jeopardize privacy and security concerns. Federated learning (FL), on the other hand, fits in nicely as private information decentralized learning approach that does not transport data but instead trains algorithms locally and sends the parameters to a centralized server. This work targets to offer an extensive overview of the FL in intrusion detection systems.\",\"PeriodicalId\":273850,\"journal\":{\"name\":\"2022 International Conference on Edge Computing and Applications (ICECAA)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Edge Computing and Applications (ICECAA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECAA55415.2022.9936285\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA55415.2022.9936285","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Federated Learning Approach for Tracking Malicious Activities in Cyber-Physical Systems
The fast rise of the Internet and advanced technologies causes an increase in network traffic, making network infrastructure increasingly complicated and varied. Mobile phones, wearable gadgets, and driverless cars are all instances of dispersed networks that create massive amounts of data every day. The processing capability of these devices has also increased steadily, necessitating the need to transport data, store data locally, and direct network calculations to edge devices. Intrusion detection systems are essential in guaranteeing the safety and confidentiality of such equipment. Deep Learning (DL) combined Intrusion Detection Systems (IDS) have gained prominence due to their excellent categorization accuracy. However, the requirement to store and communicate data to a centralized server may jeopardize privacy and security concerns. Federated learning (FL), on the other hand, fits in nicely as private information decentralized learning approach that does not transport data but instead trains algorithms locally and sends the parameters to a centralized server. This work targets to offer an extensive overview of the FL in intrusion detection systems.