Federated learning-based in-network traffic analysis on IoT edge
The rise of IoT-connected devices has led to an increase in collected data for service and traffic analysis, but also to emerging threats and attacks. In-network machine learning-based attack detection has proven effective in fast response, but scaling to distributed IoT edge devices risks increasin...
Main Authors: | , , , , |
---|---|
Format: | Conference item |
Language: | English |
Published: |
IEEE
2023
|
_version_ | 1826311330677653504 |
---|---|
author | Zang, M Zheng, C Koziak, T Zilberman, N Dittmann, L |
author_facet | Zang, M Zheng, C Koziak, T Zilberman, N Dittmann, L |
author_sort | Zang, M |
collection | OXFORD |
description | The rise of IoT-connected devices has led to an increase in collected data for service and traffic analysis, but also to emerging threats and attacks. In-network machine learning-based attack detection has proven effective in fast response, but scaling to distributed IoT edge devices risks increasing communication overheads and raising data privacy concerns. To address these concerns, we present FLIP4, a distributed in-network attack detection framework based on federated tree models. FLIP4 maintains data privacy by enabling distributed machine learning training while keeping data local on IoT edge, and provides in-network inference within the programmable data plane on edge gateway for timely attack labeling and mitigation. Evaluation results show that FLIP4 can accurately detect attacks while maintaining source data privacy and enabling lightweight deployment on IoT edge. |
first_indexed | 2024-03-07T08:06:39Z |
format | Conference item |
id | oxford-uuid:772de519-ad91-458d-a2d8-9afbdd3f6987 |
institution | University of Oxford |
language | English |
last_indexed | 2024-03-07T08:06:39Z |
publishDate | 2023 |
publisher | IEEE |
record_format | dspace |
spelling | oxford-uuid:772de519-ad91-458d-a2d8-9afbdd3f69872023-11-03T08:53:45ZFederated learning-based in-network traffic analysis on IoT edgeConference itemhttp://purl.org/coar/resource_type/c_5794uuid:772de519-ad91-458d-a2d8-9afbdd3f6987EnglishSymplectic ElementsIEEE2023Zang, MZheng, CKoziak, TZilberman, NDittmann, LThe rise of IoT-connected devices has led to an increase in collected data for service and traffic analysis, but also to emerging threats and attacks. In-network machine learning-based attack detection has proven effective in fast response, but scaling to distributed IoT edge devices risks increasing communication overheads and raising data privacy concerns. To address these concerns, we present FLIP4, a distributed in-network attack detection framework based on federated tree models. FLIP4 maintains data privacy by enabling distributed machine learning training while keeping data local on IoT edge, and provides in-network inference within the programmable data plane on edge gateway for timely attack labeling and mitigation. Evaluation results show that FLIP4 can accurately detect attacks while maintaining source data privacy and enabling lightweight deployment on IoT edge. |
spellingShingle | Zang, M Zheng, C Koziak, T Zilberman, N Dittmann, L Federated learning-based in-network traffic analysis on IoT edge |
title | Federated learning-based in-network traffic analysis on IoT edge |
title_full | Federated learning-based in-network traffic analysis on IoT edge |
title_fullStr | Federated learning-based in-network traffic analysis on IoT edge |
title_full_unstemmed | Federated learning-based in-network traffic analysis on IoT edge |
title_short | Federated learning-based in-network traffic analysis on IoT edge |
title_sort | federated learning based in network traffic analysis on iot edge |
work_keys_str_mv | AT zangm federatedlearningbasedinnetworktrafficanalysisoniotedge AT zhengc federatedlearningbasedinnetworktrafficanalysisoniotedge AT koziakt federatedlearningbasedinnetworktrafficanalysisoniotedge AT zilbermann federatedlearningbasedinnetworktrafficanalysisoniotedge AT dittmannl federatedlearningbasedinnetworktrafficanalysisoniotedge |