Chained anomaly detection models for federated learning: An intrusion detection case study

233Citations
Citations of this article
360Readers
Mendeley users who have this article in their library.

Abstract

The adoption of machine learning and deep learning is on the rise in the cybersecurity domain where these AI methods help strengthen traditional system monitoring and threat detection solutions. However, adversaries too are becoming more effective in concealing malicious behavior amongst large amounts of benign behavior data. To address the increasing time-to-detection of these stealthy attacks, interconnected and federated learning systems can improve the detection of malicious behavior by joining forces and pooling together monitoring data. The major challenge that we address in this work is that in a federated learning setup, an adversary has many more opportunities to poison one of the local machine learning models with malicious training samples, thereby influencing the outcome of the federated learning and evading detection. We present a solution where contributing parties in federated learning can be held accountable and have their model updates audited. We describe a permissioned blockchain-based federated learning method where incremental updates to an anomaly detection machine learning model are chained together on the distributed ledger. By integrating federated learning with blockchain technology, our solution supports the auditing of machine learning models without the necessity to centralize the training data. Experiments with a realistic intrusion detection use case and an autoencoder for anomaly detection illustrate that the increased complexity caused by blockchain technology has a limited performance impact on the federated learning, varying between 5 and 15%, while providing full transparency over the distributed training process of the neural network. Furthermore, our blockchain-based federated learning solution can be generalized and applied to more sophisticated neural network architectures and other use cases.

References Powered by Scopus

Anomaly detection: A survey

8927Citations
N/AReaders
Get full text

Toward generating a new intrusion detection dataset and intrusion traffic characterization

3073Citations
N/AReaders
Get full text

DeepLog: Anomaly detection and diagnosis from system logs through deep learning

1231Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Federated Learning in Mobile Edge Networks: A Comprehensive Survey

1690Citations
N/AReaders
Get full text

Federated Learning

529Citations
N/AReaders
Get full text

A survey on federated learning: The journey from centralized to distributed on-site learning and beyond

524Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Preuveneers, D., Rimmer, V., Tsingenopoulos, I., Spooren, J., Joosen, W., & Ilie-Zudor, E. (2018). Chained anomaly detection models for federated learning: An intrusion detection case study. Applied Sciences (Switzerland), 8(12). https://doi.org/10.3390/app8122663

Readers over time

‘19‘20‘21‘22‘23‘24‘250306090120

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 123

68%

Researcher 27

15%

Lecturer / Post doc 23

13%

Professor / Associate Prof. 8

4%

Readers' Discipline

Tooltip

Computer Science 135

75%

Engineering 32

18%

Business, Management and Accounting 11

6%

Social Sciences 3

2%

Article Metrics

Tooltip
Mentions
Blog Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free
0