RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Informatics and Automation, 2023 Issue 22, volume 5, Pages 1034–1082 (Mi trspy1264)

Information Security

Analytical review of intelligent intrusion detection systems based on federated learning: advantages and open challenges

E. Novikovaa, E. Fedorchenkoa, I. Kotenkoa, I. Kholodb

a St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS)
b Saint Petersburg State Electrotechnical University “LETI”

Abstract: To provide an accurate and timely response to different types of attacks, intrusion detection systems collect and analyze a large amount of data, which may include information with limited access, such as personal data or trade secrets. Consequently, such systems can be seen as an additional source of risks associated with handling sensitive information and breaching its security. Applying the federated learning paradigm to build analytical models for attack and anomaly detection can significantly reduce such risks because locally generated data is not transmitted to any third party, and model training is done locally - on the data sources. Using federated training for intrusion detection solves the problem of training on data that belongs to different organizations, and which, due to the need to protect commercial or other secrets, cannot be placed in the public domain. Thus, this approach also allows us to expand and diversify the set of data on which machine learning models are trained, thereby increasing the level of detectability of heterogeneous attacks. Due to the fact that this approach can overcome the aforementioned problems, it is actively used to design new approaches for intrusion and anomaly detection. The authors systematically explore existing solutions for intrusion and anomaly detection based on federated learning, study their advantages, and formulate open challenges associated with its application in practice. Particular attention is paid to the architecture of the proposed systems, the intrusion detection methods and models used, and approaches for modeling interactions between multiple system users and distributing data among them are discussed. The authors conclude by formulating open problems that need to be solved in order to apply federated learning-based intrusion detection systems in practice.

Keywords: intrusion detection, anomalies, federated learning, analysis models, data partition.

UDC: 006.72

Received: 23.05.2023

DOI: 10.15622/ia.22.5.4



© Steklov Math. Inst. of RAS, 2024