We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: FLAD: Adaptive Federated Learning for DDoS Attack Detection

Abstract: Federated Learning (FL) has been recently receiving increasing consideration from the cybersecurity community as a way to collaboratively train deep learning models with distributed profiles of cyber threats, with no disclosure of training data. Nevertheless, the adoption of FL in cybersecurity is still in its infancy, and a range of practical aspects have not been properly addressed yet. Indeed, the Federated Averaging algorithm at the core of the FL concept requires the availability of test data to control the FL process. Although this might be feasible in some domains, test network traffic of newly discovered attacks cannot be always shared without disclosing sensitive information. In this paper, we address the convergence of the FL process in dynamic cybersecurity scenarios, where the trained model must be frequently updated with new recent attack profiles to empower all members of the federation with the latest detection features. To this aim, we propose FLAD (adaptive Federated Learning Approach to DDoS attack detection), an FL solution for cybersecurity applications based on an adaptive mechanism that orchestrates the FL process by dynamically assigning more computation to those members whose attacks profiles are harder to learn, without the need of sharing any test data to monitor the performance of the trained model. Using a recent dataset of DDoS attacks, we demonstrate that FLAD outperforms state-of-the-art FL algorithms in terms of convergence time and accuracy across a range of unbalanced datasets of heterogeneous DDoS attacks. We also show the robustness of our approach in a realistic scenario, where we retrain the deep learning model multiple times to introduce the profiles of new attacks on a pre-trained model.
Subjects: Cryptography and Security (cs.CR)
DOI: 10.1016/j.cose.2023.103597
Cite as: arXiv:2205.06661 [cs.CR]
  (or arXiv:2205.06661v5 [cs.CR] for this version)

Submission history

From: Roberto Doriguzzi Corin [view email]
[v1] Fri, 13 May 2022 14:13:06 GMT (317kb,D)
[v2] Mon, 16 May 2022 14:53:41 GMT (317kb,D)
[v3] Tue, 23 Aug 2022 12:55:34 GMT (1075kb,D)
[v4] Wed, 14 Jun 2023 09:30:03 GMT (259kb,D)
[v5] Mon, 20 Nov 2023 08:46:19 GMT (104kb,D)

Link back to: arXiv, form interface, contact.