HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a
Collaborative IoT Intrusion Detection
- URL: http://arxiv.org/abs/2204.04254v1
- Date: Fri, 8 Apr 2022 19:06:16 GMT
- Title: HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a
Collaborative IoT Intrusion Detection
- Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann
- Abstract summary: We propose a hierarchical blockchain-based federated learning framework to enable secure and privacy-preserved collaborative IoT intrusion detection.
The proposed ML-based intrusion detection framework follows a hierarchical federated learning architecture to ensure the privacy of the learning process and organisational data.
The outcome is a securely designed ML-based intrusion detection system capable of detecting a wide range of malicious activities while preserving data privacy.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The continuous strengthening of the security posture of IoT ecosystems is
vital due to the increasing number of interconnected devices and the volume of
sensitive data shared. The utilisation of Machine Learning (ML) capabilities in
the defence against IoT cyber attacks has many potential benefits. However, the
currently proposed frameworks do not consider data privacy, secure
architectures, and/or scalable deployments of IoT ecosystems. In this paper, we
propose a hierarchical blockchain-based federated learning framework to enable
secure and privacy-preserved collaborative IoT intrusion detection. We
highlight and demonstrate the importance of sharing cyber threat intelligence
among inter-organisational IoT networks to improve the model's detection
capabilities. The proposed ML-based intrusion detection framework follows a
hierarchical federated learning architecture to ensure the privacy of the
learning process and organisational data. The transactions (model updates) and
processes will run on a secure immutable ledger, and the conformance of
executed tasks will be verified by the smart contract. We have tested our
solution and demonstrated its feasibility by implementing it and evaluating the
intrusion detection performance using a key IoT data set. The outcome is a
securely designed ML-based intrusion detection system capable of detecting a
wide range of malicious activities while preserving data privacy.
Related papers
- Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security [1.2369895513397127]
Attacks against the Internet of Things (IoT) are rising as devices, applications, and interactions become more networked and integrated.
To efficiently secure IoT devices, real-time detection of intrusion systems is critical.
This paper investigates the latest research on machine learning-based intrusion detection strategies for IoT security.
arXiv Detail & Related papers (2024-10-01T19:24:34Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - SISSA: Real-time Monitoring of Hardware Functional Safety and
Cybersecurity with In-vehicle SOME/IP Ethernet Traffic [49.549771439609046]
We propose SISSA, a SOME/IP communication traffic-based approach for modeling and analyzing in-vehicle functional safety and cyber security.
Specifically, SISSA models hardware failures with the Weibull distribution and addresses five potential attacks on SOME/IP communication.
Extensive experimental results show the effectiveness and efficiency of SISSA.
arXiv Detail & Related papers (2024-02-21T03:31:40Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Blockchain-based Zero Trust on the Edge [5.323279718522213]
This paper proposes a novel approach based on Zero Trust Architecture (ZTA) extended with blockchain to further enhance security.
The blockchain component serves as an immutable database for storing users' requests and is used to verify trustworthiness by analyzing and identifying potentially malicious user activities.
We discuss the framework, processes of the approach, and the experiments carried out on a testbed to validate its feasibility and applicability in the smart city context.
arXiv Detail & Related papers (2023-11-28T12:43:21Z) - Adversarial Client Detection via Non-parametric Subspace Monitoring in
the Internet of Federated Things [3.280202415151067]
Internet of Federated Things (IoFT) represents a network of interconnected systems with federated learning as the backbone.
We propose an effective non-parametric approach FedRR to address the adversarial attack problem.
Our proposed method is capable of accurately detecting adversarial clients and controlling the false alarm rate under the scenario with no attack occurring.
arXiv Detail & Related papers (2023-10-02T18:25:02Z) - Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future [6.422895251217666]
This paper reviews forensic and security issues associated with IoT in different fields.
Most IoT devices are vulnerable to attacks due to a lack of standardized security measures.
To fulfil the security-conscious needs of consumers, IoT can be used to develop a smart home system.
arXiv Detail & Related papers (2023-09-06T04:41:48Z) - A Systematic Literature Review on Blockchain Enabled Federated Learning
Framework for Internet of Vehicles [1.0499611180329804]
Federated Learning (FL) has been proven as an emerging idea to protect IoVs data privacy and security.
We present a comprehensive survey on the application and implementation of BC-Enabled Learning frameworks for IoVs.
arXiv Detail & Related papers (2022-03-10T07:06:04Z) - RoFL: Attestable Robustness for Secure Federated Learning [59.63865074749391]
Federated Learning allows a large number of clients to train a joint model without the need to share their private data.
To ensure the confidentiality of the client updates, Federated Learning systems employ secure aggregation.
We present RoFL, a secure Federated Learning system that improves robustness against malicious clients.
arXiv Detail & Related papers (2021-07-07T15:42:49Z) - On Lightweight Privacy-Preserving Collaborative Learning for Internet of
Things by Independent Random Projections [40.586736738492384]
Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence.
This paper considers the design and implementation of a practical privacy-preserving collaborative learning scheme.
A curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects.
arXiv Detail & Related papers (2020-12-11T12:44:37Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.