• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

IDAC:基于联邦学习的物联网入侵检测,利用自主提取的异常情况

IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT.

作者信息

Ohtani Takahiro, Yamamoto Ryo, Ohzahata Satoshi

机构信息

Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofu 182-8585, Japan.

出版信息

Sensors (Basel). 2024 May 18;24(10):3218. doi: 10.3390/s24103218.

DOI:10.3390/s24103218
PMID:38794075
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11125209/
Abstract

The recent rapid growth in Internet of Things (IoT) technologies is enriching our daily lives but significant information security risks in IoT fields have become apparent. In fact, there have been large-scale botnet attacks that exploit undiscovered vulnerabilities, known as zero-day attacks. Several intrusion detection methods based on network traffic monitoring have been proposed to address this issue. These methods employ federated learning to share learned attack information among multiple IoT networks, aiming to improve collective detection capabilities against attacks including zero-day attacks. Although their ability to detect zero-day attacks with high precision has been confirmed, challenges such as autonomous labeling of attacks from traffic information and attack information sharing between different device types still remain. To resolve the issues, this paper proposes IDAC, a novel intrusion detection method with autonomous attack candidate labeling and federated learning-based attack candidate sharing. The labeling of attack candidates in IDAC is executed using information autonomously extracted from traffic information, and the labeling can also be applied to zero-day attacks. The federated learning-based attack candidate sharing enables candidate aggregation from multiple networks, and it executes attack determination based on the aggregated similar candidates. Performance evaluations demonstrated that IDS with IDAC within networks based on attack candidates is feasible and achieved comparable detection performance against multiple attacks including zero-day attacks compared to the existing methods while suppressing false positives in the extraction of attack candidates. In addition, the sharing of autonomously extracted attack candidates from multiple networks improves both detection performance and the required time for attack detection.

摘要

物联网(IoT)技术最近的快速发展丰富了我们的日常生活,但物联网领域重大的信息安全风险已变得显而易见。事实上,已经出现了利用未发现漏洞的大规模僵尸网络攻击,即所谓的零日攻击。为解决这一问题,人们提出了几种基于网络流量监测的入侵检测方法。这些方法采用联邦学习在多个物联网网络之间共享所学的攻击信息,旨在提高对包括零日攻击在内的攻击的集体检测能力。尽管它们高精度检测零日攻击的能力已得到证实,但仍存在诸如根据流量信息自动标记攻击以及不同设备类型之间共享攻击信息等挑战。为解决这些问题,本文提出了IDAC,一种具有自动攻击候选标记和基于联邦学习的攻击候选共享的新型入侵检测方法。IDAC中攻击候选的标记使用从流量信息中自动提取的信息来执行,并且该标记也可应用于零日攻击。基于联邦学习的攻击候选共享实现了来自多个网络的候选聚合,并基于聚合的相似候选执行攻击判定。性能评估表明,基于攻击候选在网络内使用IDAC的入侵检测系统是可行的,与现有方法相比,在针对包括零日攻击在内的多种攻击时实现了可比的检测性能,同时抑制了攻击候选提取中的误报。此外,从多个网络共享自动提取的攻击候选提高了检测性能以及攻击检测所需的时间。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/d13bbdc2cab5/sensors-24-03218-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/c877c186a623/sensors-24-03218-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/062208852c5a/sensors-24-03218-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/5f06fc755ebb/sensors-24-03218-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/8214426d6f1e/sensors-24-03218-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/2ff545266fce/sensors-24-03218-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/d13bbdc2cab5/sensors-24-03218-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/c877c186a623/sensors-24-03218-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/062208852c5a/sensors-24-03218-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/5f06fc755ebb/sensors-24-03218-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/8214426d6f1e/sensors-24-03218-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/2ff545266fce/sensors-24-03218-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/01f3/11125209/d13bbdc2cab5/sensors-24-03218-g006.jpg

相似文献

1
IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT.IDAC:基于联邦学习的物联网入侵检测,利用自主提取的异常情况
Sensors (Basel). 2024 May 18;24(10):3218. doi: 10.3390/s24103218.
2
Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning.基于联邦学习的物联网网络僵尸网络检测与缓解模型
Sensors (Basel). 2023 Jul 11;23(14):6305. doi: 10.3390/s23146305.
3
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
4
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
5
Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning.基于机器学习的 SDN 赋能物联网中的僵尸网络攻击检测综述。
Sensors (Basel). 2022 Dec 14;22(24):9837. doi: 10.3390/s22249837.
6
Transfer-Learning-Based Intrusion Detection Framework in IoT Networks.基于迁移学习的物联网网络入侵检测框架。
Sensors (Basel). 2022 Jul 27;22(15):5621. doi: 10.3390/s22155621.
7
Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices.用于异构物联网设备中僵尸网络检测的集成平均深度神经网络。
Sci Rep. 2024 Feb 16;14(1):3878. doi: 10.1038/s41598-024-54438-6.
8
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
9
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.基于机器学习的物联网僵尸网络攻击检测的序列架构。
Sensors (Basel). 2020 Aug 5;20(16):4372. doi: 10.3390/s20164372.
10
Cross-Layer Federated Learning for Lightweight IoT Intrusion Detection Systems.用于轻量级物联网入侵检测系统的跨层联邦学习
Sensors (Basel). 2023 Aug 9;23(16):7038. doi: 10.3390/s23167038.

引用本文的文献

1
A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection.一种适用于物联网和工业物联网安全的可扩展方法:评估用于零日攻击检测的自适应自调整内存K近邻算法
Sensors (Basel). 2025 Jan 2;25(1):216. doi: 10.3390/s25010216.