A Decentralized Approach to Threat Intelligence using Federated Learning in Privacy-Preserving Cyber Security

Main Article Content

Nitin N. Sakhare, Raj Kulkarni, Nuzhat Rizvi, Devashri Raich, Anishkumar Dhablia, Shailesh P. Bendale

Abstract

The need to protect data privacy and improve threat intelligence in the constantly changing field of cybersecurity has prompted the investigation of novel approaches. This research presents, within the scope of privacy-preserving cyber security, a decentralized method of threat intelligence using Federated Learning (FL). Sensitive threat intelligence data is maintained locally thanks to the decentralized structure of the suggested solution, which reduces the dangers associated with centralized repositories. The cornerstone is federated learning, which permits cooperative model training between dispersed entities without disclosing raw data. Differential privacy and homomorphic encryption are two privacy-preserving strategies that are combined to protect personal information while learning collaboratively. Updates to the model are safely combined and added to a global threat intelligence model without jeopardizing the privacy of the entities involved. The article delves into the nuances of this decentralized strategy, with a focus on building strong security and governance frameworks, being flexible enough to respond to new threats, and continuously improving through feedback loops. This decentralized method offers a viable model for threat intelligence in the future of cyber security by encouraging cooperation, protecting privacy, and strengthening the group's protection against cyberattacks.

Article Details

Section
Articles
Author Biography

Nitin N. Sakhare, Raj Kulkarni, Nuzhat Rizvi, Devashri Raich, Anishkumar Dhablia, Shailesh P. Bendale

1Nitin N. Sakhare

2Raj Kulkarni

3Dr. Nuzhat Rizvi

4Dr. Devashri Raich

5Anishkumar Dhablia

6Dr. Shailesh P. Bendale

1Assistant Professor, Department of Computer Engineering, BRACT'S Vishwakarma Institute of Information Technology, Pune, Maharashtra, India Email: Nitin.sakhare@viit.ac.in

2Department of Information Technology, Government College of Engineering, Karad, Maharashtra, India  Email ID: raj_joy@yahoo.com

3Assistant Professor, Symbiosis Law School, Nagpur Campus, Symbiosis International (Deemed University), Pune, India. Email: nuzhatrizvi@slsnagpur.edu.in

4Assistant Professor, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering, Research and Technology, Chandrapur, Maharashtra, India. Email: devashriraich@gmail.com

5Engineering Manager, Altimetrik India Pvt Ltd, Pune, Maharashtra, India Email: anishdhablia@gmail.com

6Head and Assistant Professor, Department of Computer Engineering, NBN Sinhgad School of Engineering, Pune, Maharashtra, India. Email: bendale.shailesh@gmail.com

Copyright © JES 2023 on-line : journal.esrgroups.org

References

A. Ferrag and L. Maglaras, ‘‘DeepCoin: A novel deep learning and blockchain-based energy exchange framework for smart grids,’’ IEEE Trans. Eng. Manage., vol. 67, no. 4, pp. 1285–1297,Nov. 2019.

X. Hei, X. Yin, Y. Wang, J. Ren, and L. Zhu, ‘‘A trusted feature aggregatorfederated learning for distributed malicious attack detection,’’ Comput.Secur., vol. 99, Dec. 2020, Art. no. 102033.

Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262.

Potnurwar, A. V. ., Bongirwar, V. K. ., Ajani, S. ., Shelke, N. ., Dhone, M. ., & Parati, N. . (2023). Deep Learning-Based Rule-Based Feature Selection for Intrusion Detection in Industrial Internet of Things Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 23–35.

H. Wen, Y. Wu, C. Yang, H. Duan, and S. Yu, ‘‘A unified federatedlearning framework for wireless communications: Towards privacy, efficiency, and security,’’ in Proc. IEEE Conf. Comput. Commun. Workshops(INFOCOM WKSHPS), Jul. 2020, pp. 653–658.

M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, ‘‘Bubbles oftrust: A decentralized blockchain-based authentication system for IoT,’’Comput. Secur., vol. 78, pp. 126–142, Sep. 2018.

D. Puthal and S. P. Mohanty, ‘‘Proof of authentication: IoT-friendlyblockchains,’’ IEEE Potentials, vol. 38, no. 1, pp. 26–29,Jan. 2018.

M. A. Ferrag, L. Maglaras, A. Ahmim, M. Derdour, and H. Janicke,‘‘RDTIDS: Rules and decision tree-based intrusion detection systemfor Internet-of-Things networks,’’ Future Internet, vol. 12, no. 3, p. 44,Mar. 2020.

A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, ‘‘Deeplearning for cyber security intrusion detection: Approaches, datasets,and comparative study,’’ J. Inf. Secur. Appl., vol. 50, Feb. 2020,Art. no. 102419.

Y. Zhang, Q. Wu, and M. Shikh-Bahaei, ‘‘Vertical federated learningbased privacy-preserving cooperative sensing in cognitive radio networks,’’ in Proc. IEEE Globecom Workshops (GC Wkshps), Dec. 2020,pp. 1–6.

B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. Y. Arcas,‘‘Communication-efficient learning of deep networks from decentralized data,’’ in Artificial Intelligence and Statistics. 2017, pp. 1273–1282

L. Feng, Y. Zhao, S. Guo, X. Qiu, W. Li, and P. Yu, ‘‘Blockchain-basedasynchronous federated learning for Internet of Things,’’ IEEE Trans.Comput., early access, Apr. 9, 2021, doi: 10.1109/TC.2021.3072033.

N. Bouacida and P. Mohapatra, ‘‘Vulnerabilities in federated learning,’’IEEE Access, vol. 9, pp. 63229–63249, 2021.

M. S. Jere, T. Farnan, and F. Koushanfar, ‘‘A taxonomy of attacks onfederated learning,’’ IEEE Secur. Privacy, vol. 19, no. 2, pp. 20–28,Dec. 2021.

Y. Qi, M. S. Hossain, J. Nie, and X. Li, ‘‘Privacy-preserving blockchainbased federated learning for traffic flow prediction,’’ Future Gener. Comput. Syst., vol. 117, pp. 328–337, Apr. 2021.

Ajani, S. N. ., Khobragade, P. ., Dhone, M. ., Ganguly, B. ., Shelke, N. ., & Parati, N. . (2023). Advancements in Computing: Emerging Trends in Computational Science with Next-Generation Computing. International Journal of Intelligent Systems and Applications in Engineering, 12(7s), 546–559.

G. Han, T. Zhang, Y. Zhang, G. Xu, J. Sun, and J. Cao, ‘‘Verifiableand privacy preserving federated learning without fully trusted centers,’’J. Ambient Intell. Humanized Comput., pp. 1–11, Jan. 2021.

F. O. Olowononi, D. B. Rawat, and C. Liu, ‘‘Federated learning with differential privacy for resilient vehicular cyber physical systems,’’ in Proc.IEEE 18th Annu. Consum. Commun. Netw. Conf. (CCNC), Jan. 2021,pp. 1–5.

Z. Xiong, Z. Cai, D. Takabi, and W. Li, ‘‘Privacy threat and defensefor federated learning with non-i.i.d. Data in AIoT,’’ IEEE Trans. Ind.Informat., early access, Apr. 19, 2021, doi: 10.1109/TII.2021.3073925.

Z. Yang, M. Chen, W. Saad, C. S. Hong, and M. Shikh-Bahaei,‘‘Energy efficient federated learning over wireless communication networks,’’ IEEE Trans. Wireless Commun., vol. 20, no. 3, pp. 1935–1949,Mar. 2020.

Anandpwar, W. ., S. . Barhate, S. . Limkar, M. . Vyawahare, S. N. . Ajani, and P. . Borkar. “Significance of Artificial Intelligence in the Production of Effective Output in Power Electronics”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 3s, Mar. 2023, pp. 30-36.

Novel Schemes for Cauchy-Riemann System of Equations with Cauchy Conditions. (2021). Advances in the Theory of Nonlinear Analysis and Its Application, 5(1), 94-126. https://atnaea.org/index.php/journal/article/view/187

Singh, M. ., Angurala, D. M. ., & Bala, D. M. . (2020). Bone Tumour detection Using Feature Extraction with Classification by Deep Learning Techniques. Research Journal of Computer Systems and Engineering, 1(1), 23–27. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/21

Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, ‘‘Low-latencyfederated learning and blockchain for edge association in digital twinempowered 6G networks,’’ IEEE Trans. Ind. Informat., vol. 17, no. 7,pp. 5098–5107, Jul. 2021.

Federated Learning: Collaborative Machine Learning Without Centralized Training Data. Accessed: Sep. 18, 2021.