Federated learning-based in-network traffic analysis on IoT edge

The rise of IoT-connected devices has led to an increase in collected data for service and traffic analysis, but also to emerging threats and attacks. In-network machine learning-based attack detection has proven effective in fast response, but scaling to distributed IoT edge devices risks increasin...

Full description

Bibliographic Details
Main Authors: Zang, M, Zheng, C, Koziak, T, Zilberman, N, Dittmann, L
Format: Conference item
Language:English
Published: IEEE 2023
_version_ 1826311330677653504
author Zang, M
Zheng, C
Koziak, T
Zilberman, N
Dittmann, L
author_facet Zang, M
Zheng, C
Koziak, T
Zilberman, N
Dittmann, L
author_sort Zang, M
collection OXFORD
description The rise of IoT-connected devices has led to an increase in collected data for service and traffic analysis, but also to emerging threats and attacks. In-network machine learning-based attack detection has proven effective in fast response, but scaling to distributed IoT edge devices risks increasing communication overheads and raising data privacy concerns. To address these concerns, we present FLIP4, a distributed in-network attack detection framework based on federated tree models. FLIP4 maintains data privacy by enabling distributed machine learning training while keeping data local on IoT edge, and provides in-network inference within the programmable data plane on edge gateway for timely attack labeling and mitigation. Evaluation results show that FLIP4 can accurately detect attacks while maintaining source data privacy and enabling lightweight deployment on IoT edge.
first_indexed 2024-03-07T08:06:39Z
format Conference item
id oxford-uuid:772de519-ad91-458d-a2d8-9afbdd3f6987
institution University of Oxford
language English
last_indexed 2024-03-07T08:06:39Z
publishDate 2023
publisher IEEE
record_format dspace
spelling oxford-uuid:772de519-ad91-458d-a2d8-9afbdd3f69872023-11-03T08:53:45ZFederated learning-based in-network traffic analysis on IoT edgeConference itemhttp://purl.org/coar/resource_type/c_5794uuid:772de519-ad91-458d-a2d8-9afbdd3f6987EnglishSymplectic ElementsIEEE2023Zang, MZheng, CKoziak, TZilberman, NDittmann, LThe rise of IoT-connected devices has led to an increase in collected data for service and traffic analysis, but also to emerging threats and attacks. In-network machine learning-based attack detection has proven effective in fast response, but scaling to distributed IoT edge devices risks increasing communication overheads and raising data privacy concerns. To address these concerns, we present FLIP4, a distributed in-network attack detection framework based on federated tree models. FLIP4 maintains data privacy by enabling distributed machine learning training while keeping data local on IoT edge, and provides in-network inference within the programmable data plane on edge gateway for timely attack labeling and mitigation. Evaluation results show that FLIP4 can accurately detect attacks while maintaining source data privacy and enabling lightweight deployment on IoT edge.
spellingShingle Zang, M
Zheng, C
Koziak, T
Zilberman, N
Dittmann, L
Federated learning-based in-network traffic analysis on IoT edge
title Federated learning-based in-network traffic analysis on IoT edge
title_full Federated learning-based in-network traffic analysis on IoT edge
title_fullStr Federated learning-based in-network traffic analysis on IoT edge
title_full_unstemmed Federated learning-based in-network traffic analysis on IoT edge
title_short Federated learning-based in-network traffic analysis on IoT edge
title_sort federated learning based in network traffic analysis on iot edge
work_keys_str_mv AT zangm federatedlearningbasedinnetworktrafficanalysisoniotedge
AT zhengc federatedlearningbasedinnetworktrafficanalysisoniotedge
AT koziakt federatedlearningbasedinnetworktrafficanalysisoniotedge
AT zilbermann federatedlearningbasedinnetworktrafficanalysisoniotedge
AT dittmannl federatedlearningbasedinnetworktrafficanalysisoniotedge