Decentralized Machine Learning Models to Preserve Data Privacy in Intrusion Detection Systems (IDS)
Article Sidebar
Main Article Content
Abstract: As Technology keeps advancing rapidly, the risk of data leakage is on the increase. centralized servers are often attacked in order to control the flow of data and divert the actual network direction and breach data privacy. Data can be manipulated on a higher scale once the centralized systems have been attacked and the existing IDS fails to recognize a breach in the network server.
In order to have a more robust privacy of data and accurate functioning of the IDS through ML and DL approaches to curb cyber-attacks and network attacks, the use of a decentralized ML model would be effective. This approach aims at introducing a decentralized network where data will be shared in protective nodes and each node will have an existing IDS that will not be exhausted with a huge workload.
Federated Learning, which is a sub domain of DML, would offer solutions by enhancing local models on edge devices without the need and reliance of a centralized server [16].
This approach will reduce the risk of data exposure by ensuring that data stays on the source device and can only be accessed and controlled from that source only.
The outcome of this research would vividly outline the effectiveness of decentralization of data and the efficiency of IDS on specialized points of the data network to protect the exchange and control of data without a maximum risk of data leak.
Downloads
References
1. A Decentralized Intrusion Detection System for Security of Generation Control Publisher: IEEE 2022 Siddhartha Deb Roy; Sanjoy Debbarma; Adnan Iqbal
2. Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT Publisher: IEEE Guntur Dharma Putra; Volkan Dedeoglu; Salil S Kanhere; Raja Jurdak
3. Securing Cyber-Physical Systems: A Decentralized Framework for Collaborative Intrusion Detection with Privacy Preservation Publisher: IEEE 2024 Zia Ul Islam Nasir; Adnan Iqbal; Hassaan Khaliq Qureshi
4. Kim, K.-J. Park and C. Lu, "A survey on network security for cyber–physical systems: From threats to resilient design", IEEE Commun. Surv. Tuts., vol. 24, no. 3, pp. 1534-1573, 2022.
5. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah and F. Ahmad, "Network intrusion detection system: A systematic study of machine learning and deep learning approaches", Trans. Emerg. Telecommun. Technol., vol. 32, no. 1, 2021.
6. A. Cheema, H. K. Qureshi, C. Chrysostomou and M. Lestas, "Utilizing block-chain for distributed machine learning based intrusion detection in Internet of Things", Proc. IEEE 16th Int. Conf. Distrib. Comput. Sensor Syst., pp. 429-435, 2020.
7. A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi and R. Ahmad, "CNN-LSTM: Hybrid deep neural network for network intrusion detection system", IEEE Access, vol. 10, pp. 99837-99849, 2022.
8. Zhao, Y. Yin, Y. Shi and Z. Xue, "Intelligent intrusion detection based on federated learning aided long short-term memory", Phys. Commun., vol. 42, 2020.
9. A review of applications in federated learning Author: Li Li a b, Yuxi Fan a, Mike Tse c, Kuo-Yi Lin 2020
10. Advances and Open Problems in Federated Learning © 2021 Peter Kairouz, H. Brendan McMahan, et al.
11. A survey on federated learning: challenges and applications Original Article Published: 11 November 2022
12. Federated Learning: Challenges, Methods, and Future Directions Publisher: IEEE 2020 Tian Li; Anit Kumar Sahu; Ameet Talwalkar; Virginia Smith
13. Enhancing Security with a Decentralized Intrusion Detection System for Sensor and Control Attacks J Khurana, SS, A Singla, GV Gaonkar… - 2024 IEEE 4th …, 2024
14. Centralized and distributed intrusion detection for resource-constrained wireless SDN networks GAN Segura, A Chorti, CB Margi - IEEE Internet of Things …, 2021
15. Tyagi, A. D., & Asawa, K. (2024). Influence Maximization in Social Network using Community Detection and Node Modularity. International Journal of Performability Engineering, 20(9).
16. Tomar, V., Sharma, S., Arora, S., & Tyagi, A. D. (2024, October). A Comprehensive Analysis of Techniques and Applications in Multimodal Deep Learning. In 2024 International Conference on Computing, Sciences and Communications (ICCSC) (pp. 1-5). IEEE.
17. Tyagi, A. D., Garg, S., Sharma, S., Tomar, V., & Verma, K. (2024, November). Sarcasm Detection in X Data Using Node Embedding and Graph Convolutional Networks. In 2024 4th International Conference on Advancement in Electronics & Communication Engineering (AECE) (pp. 1336-1340). IEEE.

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.