A Decentralized Approach to Threat Intelligence using Federated Learning in Privacy-Preserving Cyber Security
Main Article Content
Abstract
The need to protect data privacy and improve threat intelligence in the constantly changing field of cybersecurity has prompted the investigation of novel approaches. This research presents, within the scope of privacy-preserving cyber security, a decentralized method of threat intelligence using Federated Learning (FL). Sensitive threat intelligence data is maintained locally thanks to the decentralized structure of the suggested solution, which reduces the dangers associated with centralized repositories. The cornerstone is federated learning, which permits cooperative model training between dispersed entities without disclosing raw data. Differential privacy and homomorphic encryption are two privacy-preserving strategies that are combined to protect personal information while learning collaboratively. Updates to the model are safely combined and added to a global threat intelligence model without jeopardizing the privacy of the entities involved. The article delves into the nuances of this decentralized strategy, with a focus on building strong security and governance frameworks, being flexible enough to respond to new threats, and continuously improving through feedback loops. This decentralized method offers a viable model for threat intelligence in the future of cyber security by encouraging cooperation, protecting privacy, and strengthening the group's protection against cyberattacks.
Article Details
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
References
A. Ferrag and L. Maglaras, ‘‘DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids,’’ IEEE Trans. Eng. Manage., vol. 67, no. 4, pp. 1285–1297,Nov. 2019.
X. Hei, X. Yin, Y. Wang, J. Ren, and L. Zhu, ‘‘A trusted feature aggregatorfederated learning for distributed malicious attack detection,’’ Comput.Secur., vol. 99, Dec. 2020, Art. no. 102033.
Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262.
Potnurwar, A. V. ., Bongirwar, V. K. ., Ajani, S. ., Shelke, N. ., Dhone, M. ., & Parati, N. . (2023). Deep Learning-Based Rule-Based Feature Selection for Intrusion Detection in Industrial Internet of Things Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 23–35.
H. Wen, Y. Wu, C. Yang, H. Duan, and S. Yu, ‘‘A unified federatedlearning framework for wireless communications: Towards privacy, efficiency, and security,’’ in Proc. IEEE Conf. Comput. Commun. Workshops(INFOCOM WKSHPS), Jul. 2020, pp. 653–658.
M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, ‘‘Bubbles oftrust: A decentralized blockchain-based authentication system for IoT,’’Comput. Secur., vol. 78, pp. 126–142, Sep. 2018.
D. Puthal and S. P. Mohanty, ‘‘Proof of authentication: IoT-friendlyblockchains,’’ IEEE Potentials, vol. 38, no. 1, pp. 26–29,Jan. 2018.
M. A. Ferrag, L. Maglaras, A. Ahmim, M. Derdour, and H. Janicke,‘‘RDTIDS: Rules and decision tree-based intrusion detection systemfor Internet-of-Things networks,’’ Future Internet, vol. 12, no. 3, p. 44,Mar. 2020.
A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, ‘‘Deeplearning for cyber security intrusion detection: Approaches, datasets,and comparative study,’’ J. Inf. Secur. Appl., vol. 50, Feb. 2020,Art. no. 102419.
Y. Zhang, Q. Wu, and M. Shikh-Bahaei, ‘‘Vertical federated learningbased privacy-preserving cooperative sensing in cognitive radio networks,’’ in Proc. IEEE Globecom Workshops (GC Wkshps), Dec. 2020,pp. 1–6.
B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. Y. Arcas,‘‘Communication-efficient learning of deep networks from decentralized data,’’ in Artificial Intelligence and Statistics. 2017, pp. 1273–1282
L. Feng, Y. Zhao, S. Guo, X. Qiu, W. Li, and P. Yu, ‘‘Blockchain-basedasynchronous federated learning for Internet of Things,’’ IEEE Trans.Comput., early access, Apr. 9, 2021, doi: 10.1109/TC.2021.3072033.
N. Bouacida and P. Mohapatra, ‘‘Vulnerabilities in federated learning,’’IEEE Access, vol. 9, pp. 63229–63249, 2021.
M. S. Jere, T. Farnan, and F. Koushanfar, ‘‘A taxonomy of attacks onfederated learning,’’ IEEE Secur. Privacy, vol. 19, no. 2, pp. 20–28,Dec. 2021.
Y. Qi, M. S. Hossain, J. Nie, and X. Li, ‘‘Privacy-preserving blockchainbased federated learning for traffic flow prediction,’’ Future Gener. Comput. Syst., vol. 117, pp. 328–337, Apr. 2021.
Ajani, S. N. ., Khobragade, P. ., Dhone, M. ., Ganguly, B. ., Shelke, N. ., & Parati, N. . (2023). Advancements in Computing: Emerging Trends in Computational Science with Next-Generation Computing. International Journal of Intelligent Systems and Applications in Engineering, 12(7s), 546–559.
G. Han, T. Zhang, Y. Zhang, G. Xu, J. Sun, and J. Cao, ‘‘Verifiableand privacy preserving federated learning without fully trusted centers,’’J. Ambient Intell. Humanized Comput., pp. 1–11, Jan. 2021.
F. O. Olowononi, D. B. Rawat, and C. Liu, ‘‘Federated learning with differential privacy for resilient vehicular cyber physical systems,’’ in Proc.IEEE 18th Annu. Consum. Commun. Netw. Conf. (CCNC), Jan. 2021,pp. 1–5.
Z. Xiong, Z. Cai, D. Takabi, and W. Li, ‘‘Privacy threat and defensefor federated learning with non-i.i.d. Data in AIoT,’’ IEEE Trans. Ind.Informat., early access, Apr. 19, 2021, doi: 10.1109/TII.2021.3073925.
Z. Yang, M. Chen, W. Saad, C. S. Hong, and M. Shikh-Bahaei,‘‘Energy efficient federated learning over wireless communication networks,’’ IEEE Trans. Wireless Commun., vol. 20, no. 3, pp. 1935–1949,Mar. 2020.
Anandpwar, W. ., S. . Barhate, S. . Limkar, M. . Vyawahare, S. N. . Ajani, and P. . Borkar. “Significance of Artificial Intelligence in the Production of Effective Output in Power Electronics”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 3s, Mar. 2023, pp. 30-36.
Novel Schemes for Cauchy-Riemann System of Equations with Cauchy Conditions. (2021). Advances in the Theory of Nonlinear Analysis and Its Application, 5(1), 94-126. https://atnaea.org/index.php/journal/article/view/187
Singh, M. ., Angurala, D. M. ., & Bala, D. M. . (2020). Bone Tumour detection Using Feature Extraction with Classification by Deep Learning Techniques. Research Journal of Computer Systems and Engineering, 1(1), 23–27. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/21
Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, ‘‘Low-latencyfederated learning and blockchain for edge association in digital twinempowered 6G networks,’’ IEEE Trans. Ind. Informat., vol. 17, no. 7,pp. 5098–5107, Jul. 2021.
Federated Learning: Collaborative Machine Learning Without Centralized Training Data. Accessed: Sep. 18, 2021.