Decentralized Machine Learning Models to Preserve Data Privacy in Intrusion Detection Systems (IDS)

Article Sidebar

Main Article Content

Cletus A. Sieh Jr
Edwin Hope Beh
Daniel Chibamb
Aditya Dayal Tyagi

Abstract: As Technology keeps advancing rapidly, the risk of data leakage is on the increase. centralized servers are often attacked in order to control the flow of data and divert the actual network direction and breach data privacy. Data can be manipulated on a higher scale once the centralized systems have been attacked and the existing IDS fails to recognize a breach in the network server. 


In order to have a more robust privacy of data and accurate functioning of the IDS through ML and DL approaches to curb cyber-attacks and network attacks, the use of a decentralized ML model would be effective. This approach aims at introducing a decentralized network where data will be shared in protective nodes and each node will have an existing IDS that will not be exhausted with a huge workload. 


Federated Learning, which is a sub domain of DML, would offer solutions by enhancing local models on edge devices without the need and reliance of a centralized server [16].


This approach will reduce the risk of data exposure by ensuring that data stays on the source device and can only be accessed and controlled from that source only. 


The outcome of this research would vividly outline the effectiveness of decentralization of data and the efficiency of IDS on specialized points of the data network to protect the exchange and control of data without a maximum risk of data leak. 

Decentralized Machine Learning Models to Preserve Data Privacy in Intrusion Detection Systems (IDS). (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(4), 655-661. https://doi.org/10.51583/IJLTEMAS.2025.140400074

Downloads

References

1. A Decentralized Intrusion Detection System for Security of Generation Control Publisher: IEEE 2022 Siddhartha Deb Roy; Sanjoy Debbarma; Adnan Iqbal

2. Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT Publisher: IEEE Guntur Dharma Putra; Volkan Dedeoglu; Salil S Kanhere; Raja Jurdak

3. Securing Cyber-Physical Systems: A Decentralized Framework for Collaborative Intrusion Detection with Privacy Preservation Publisher: IEEE 2024 Zia Ul Islam Nasir; Adnan Iqbal; Hassaan Khaliq Qureshi

4. Kim, K.-J. Park and C. Lu, "A survey on network security for cyber–physical systems: From threats to resilient design", IEEE Commun. Surv. Tuts., vol. 24, no. 3, pp. 1534-1573, 2022.

5. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah and F. Ahmad, "Network intrusion detection system: A systematic study of machine learning and deep learning approaches", Trans. Emerg. Telecommun. Technol., vol. 32, no. 1, 2021.

6. A. Cheema, H. K. Qureshi, C. Chrysostomou and M. Lestas, "Utilizing block-chain for distributed machine learning based intrusion detection in Internet of Things", Proc. IEEE 16th Int. Conf. Distrib. Comput. Sensor Syst., pp. 429-435, 2020.

7. A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi and R. Ahmad, "CNN-LSTM: Hybrid deep neural network for network intrusion detection system", IEEE Access, vol. 10, pp. 99837-99849, 2022.

8. Zhao, Y. Yin, Y. Shi and Z. Xue, "Intelligent intrusion detection based on federated learning aided long short-term memory", Phys. Commun., vol. 42, 2020.

9. A review of applications in federated learning Author: Li Li a b, Yuxi Fan a, Mike Tse c, Kuo-Yi Lin 2020

10. Advances and Open Problems in Federated Learning © 2021 Peter Kairouz, H. Brendan McMahan, et al.

11. A survey on federated learning: challenges and applications Original Article Published: 11 November 2022

12. Federated Learning: Challenges, Methods, and Future Directions Publisher: IEEE 2020 Tian Li; Anit Kumar Sahu; Ameet Talwalkar; Virginia Smith

13. Enhancing Security with a Decentralized Intrusion Detection System for Sensor and Control Attacks J Khurana, SS, A Singla, GV Gaonkar… - 2024 IEEE 4th …, 2024

14. Centralized and distributed intrusion detection for resource-constrained wireless SDN networks GAN Segura, A Chorti, CB Margi - IEEE Internet of Things …, 2021

15. Tyagi, A. D., & Asawa, K. (2024). Influence Maximization in Social Network using Community Detection and Node Modularity. International Journal of Performability Engineering, 20(9).

16. Tomar, V., Sharma, S., Arora, S., & Tyagi, A. D. (2024, October). A Comprehensive Analysis of Techniques and Applications in Multimodal Deep Learning. In 2024 International Conference on Computing, Sciences and Communications (ICCSC) (pp. 1-5). IEEE.

17. Tyagi, A. D., Garg, S., Sharma, S., Tomar, V., & Verma, K. (2024, November). Sarcasm Detection in X Data Using Node Embedding and Graph Convolutional Networks. In 2024 4th International Conference on Advancement in Electronics & Communication Engineering (AECE) (pp. 1336-1340). IEEE.

Article Details

How to Cite

Decentralized Machine Learning Models to Preserve Data Privacy in Intrusion Detection Systems (IDS). (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(4), 655-661. https://doi.org/10.51583/IJLTEMAS.2025.140400074