Next Article in Journal
Digital Twins of the Water Cooling System in a Power Plant Based on Fuzzy Logic
Next Article in Special Issue
Design, Development, and Evaluation of 5G-Enabled Vehicular Services: The 5G-HEART Perspective
Previous Article in Journal
In-Network Data Aggregation for Ad Hoc Clustered Cognitive Radio Wireless Sensor Network
Previous Article in Special Issue
Firmware Update Using Multiple Gateways in LoRaWAN Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

IDS for Industrial Applications: A Federated Learning Approach with Active Personalization

by
Vasiliki Kelli
1,
Vasileios Argyriou
2,
Thomas Lagkas
3,*,
George Fragulis
1,
Elisavet Grigoriou
4 and
Panagiotis Sarigiannidis
1
1
Department of Electrical and Computer Engineering, University of Western Macedonia, 501 31 Kozani, Greece
2
Department of Networks and Digital Media, Kingston University, London KT1 1LQ, UK
3
Department of Computer Science, Kavala Campus, International Hellenic University, 654 04 Kavala, Greece
4
Sidroco Holdings Ltd., Nicosia 1077, Cyprus
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(20), 6743; https://doi.org/10.3390/s21206743
Submission received: 18 September 2021 / Revised: 30 September 2021 / Accepted: 4 October 2021 / Published: 11 October 2021
(This article belongs to the Special Issue Emerging Trends in Wireless Sensor Networks)

Abstract

:
Internet of Things (IoT) is a concept adopted in nearly every aspect of human life, leading to an explosive utilization of intelligent devices. Notably, such solutions are especially integrated in the industrial sector, to allow the remote monitoring and control of critical infrastructure. Such global integration of IoT solutions has led to an expanded attack surface against IoT-enabled infrastructures. Artificial intelligence and machine learning have demonstrated their ability to resolve issues that would have been impossible or difficult to address otherwise; thus, such solutions are closely associated with securing IoT. Classical collaborative and distributed machine learning approaches are known to compromise sensitive information. In our paper, we demonstrate the creation of a network flow-based Intrusion Detection System (IDS) aiming to protecting critical infrastructures, stemming from the pairing of two machine learning techniques, namely, federated learning and active learning. The former is utilized for privately training models in federation, while the latter is a semi-supervised approach applied for global model adaptation to each of the participant’s traffic. Experimental results indicate that global models perform significantly better for each participant, when locally personalized with just a few active learning queries. Specifically, we demonstrate how the accuracy increase can reach 7.07% in only 10 queries.

1. Introduction

Machine learning solutions currently have universal utilization in IoT applications [1,2,3]. Specifically, machine learning helps to extract insights and knowledge from IoT data, attributes which would have been extremely difficult to obtain with other means [4]. For this purpose, machine learning has been successfully applied in multiple areas, from AI-enabled assistants [5] and speech recognition [6], to the time-critical industrial sector [7,8]. In addition, with the help of machine-learning-enabled solutions, robust IDS can be created and applied for rapid and accurate detection of malicious attempts against the network [9,10,11].
Attacks against the industrial sector, as indicated from past incidents, can have severe consequences. Such incidents include the December 2015 cyberattack against Ukraine’s power grid, which resulted in complete electricity disruption for 225,000 people [12,13]. In addition, as Stuxnet, the first known cyber warfare weapon [14,15], indicated, nuclear power plants have also been targeted by cyberattacks, thus emphasizing the urgent need for adequate security measures in such critical domains. As such, the adoption of security measures, such as IDS for rapid attack detection, is necessary to ensure safe and secure operations.
Machine learning for the creation of IDS is not a new concept, as intelligent solutions can boost the efficiency of IDS. However, creating IDS with multiple nodes, characterized by differences in traffic, is not an easy task. Traditional centralized solutions assume a central server, receiving IoT data [16] and utilizing them to train models capable of distinguishing regular traffic from attack attempts [17]. Such solutions consume network resources, as massive data from all IoT devices would have to be sent to the central server [18]. Furthermore, such solutions raise issues with data privacy [19] and single-point-of-failure concerns [20]. As data would flow from the devices to the server for training, data loss is a possibility, as well as data tampering or false data injection from a malicious entity.
Such issues are addressed with Federated Learning (FL). FL is a technique that requires model updates to be sent to the server, while data remain locally on each device, thus ensuring data privacy during model training [21]. However, traffic from multiple IoT devices may not be characterized by the same attributes. As such, final model personalization methods are required. Notably, dataset labelling is an expensive and time-consuming process, especially regarding large datasets composed by IoT devices [22]. Active Learning (AL) solutions have emerged to tackle such limitations, as the learner can choose the samples to learn from  [23], thus, making this technique excellent for model personalization.
The purpose of this paper is three-fold:
  • present a 2-stage methodology for pairing FL and AL strategies, with the former offering distributed, secure and private global model training as the first training stage, and the latter for improving the generated model’s performance, as the last training stage.
  • analyse and compare the amount of annotating effort, or, AL queries needed to achieve a sufficiently better, customized local model.
  • design and implement an attack detection and classification model based on DNNs, with the utilization of DNP3-specific attacks, transformed into flow-based traffic representations, serving as a training set.
The rest of the paper is structured as follows. In Section 2, related previous work is explained. Then, in Section 3, our proposed methodology is presented, and is described in detail through Section 3.2, Section 3.3 and Section 3.4. Section 4 indicates our experimental process and the results obtained by applying our methodology, and finally, Section 5 concludes this paper.

2. Previous Work

Currently, data privacy is one of the focal research points, especially due to the General Data Protection Regulation (GDPR) adopted by the European Union [24]; thus, federated learning has gained a lot of attention for allowing distributed model training without local data exchange [25]. A lot of research has been conducted with regards to the application of federated learning for creating IDS. The authors in [26] propose a federated training approach, on Gated Recurrent Units (GRUs) models, to detect anomalies in IoT networks, in order to timely recognize intrusion attempts. Similarly, the authors in [27] target the insufficiency of current IDS by proposing DÏoT, an autonomous self-learning system capable of detecting compromised IoT devices, without needing a human to intervene in the process, or labeled datasets. Specifically, DÏoT detects anomalies in devices’ communication, by aggregating behavior profiles with the utilization of the federated learning approach. Federated learning is also utilized for the creation of an IDS catering to the needs of Medical Cyber-Physical Systems (MCPS), where patients are clustered based on their profiles, and each cluster develops its own federated model according to the input that is received by the registered patients. If any abnormality is detected due to a malicious intervention such as data modification or injection attack, alerts are generated [28].
As noted, active learning reduces the amount of labeled samples required for model training, by locating query-worthy samples to be learn from. The integration of this methodology for detecting attacks has been researched in the past. Specifically, active learning for network intrusion detection can be seen as an unsupervised task according to [29]. Furthermore, the authors propose a novel querying strategy to reduce labelling effords. Experimental results indicated that the ActiveSVDDs were able to distinguish normal and attack data, while reducing labelling actions. The authors in [30] present a method of reducing outlier detection to a classification problem by representing outliers using artificially generated examples, and later applying active learning for selective sampling. According to experiments conducted, the proposed methodology yields better results than methods which apply the same reduction, but use regular classification procedures. The authors in [31] suggest building active learning procedures on top of deep learning solutions for unsupervised anomaly detection. This is achieved by adding an Unsupervised to Active Inference (UAI) layer on top of unsupervised deep learning architectures. Experimental results showed that models were able to achieve similar or improved results than their non-active learning enhanced counterparts.
As noted, a lot of great research has been conducted for finding solutions for private, distributed model training and active learning for anomaly detection and classification. As such, we aim to further contribute in the aforementioned research areas, specifically by combining federated learning, active learning and Deep Neural Network (DNNs) strategies to enhance data privacy, and introduce personalization methods in a semi-supervised approach in order to create attack classification-based IDS.

3. Methodology

As described in Section 2, a lot of research has been conducted in order to identify optimal methods for cyberattack detection and classification, aiming in the creation of robust IDS, especially for the critical industrial sector where rapid and precise attack detection is of essence. An important aspect for consideration while training classification models for application on each device on the network, is the difference in traffic attributes. As such, personalization methods should be applied in order to ensure that models running on each device cover a plethora of attack cases, while also being customized to the devices’ needs.

3.1. Overall Description

The proposed methodology provides a data privacy-friendly approach for training a DNN on attack detection and classification, while adapting the final model to the requirements of each device, in order to produce accurate, and personalized results. In the methodology proposed, to ensure that local data would never leave the device and thus reducing the amount of messages constrained devices would have to communicate, while simultaneously addressing the issue of training data tampering, the multi-class classification DNN model training based on various attack scenarios was conducted with FL. After the FL process comes to a halt, the global model is personalized with AL, by each of the participating devices. The proposed methodology is divided into two stages:
  • the FL global model training and
  • the personalisation stage using AL.
Figure 1 below, represents the entire methodology of this paper.
The entire machine learning process is divided into two stages, the FL and the AL stage. We assume N participating entities, where each party p [ 1 , N ] holds locally two inputs, the D F p input used for training the attack detection and classification model in federation with the rest of the participants, and the D A p input used for adapting the final global federated model to each of the participants’ traffic. During the FL stage, each party p pre-processes the D F p inputs by applying feature normalization to turn data into values in the [ 0 , 1 ] range, as demonstrated in (1) [32] where x s c is the scaled feature value, x is the feature vector and x i is the initial feature value;
x s c = x i min ( x ) max ( x ) min ( x )
then, the resulting inputs which are transformed in X F p data points and Y F p labels, are fed into the DNN in order to train the attack detection and classification model via supervised learning. As a result of the training procedure each p obtains the updates W p , and via aggregating the results from each p, the global model W is formed. After the FL stage concludes, the AL is initiated, during which, each p divides the D A p input into two parts and transforms the first part into X A p data points, via normalization, (1) and Y A p corresponding labels while transforming the latter part, also via normalization (1), into the X AU p sampling pool, containing only unlabeled data points. W is further trained in a supervised manner by each p using the X A p data points and the Y A p labels; then, by following a querying strategy, the model selects the most informative samples from the data pool X AU p X A p . When the active training process concludes, each p has formed the final, personalized attack detection and classification model.
In the sections below, the FL and AL stage are explained in detail, while the attack detection and classification model is presented.

3.2. Federated Learning for Cyber-Attack Detection

We consider the scenario where network traffic data containing normal and malicious records, is located in various devices. Specifically, the p-th device, or party, p = 1 , , N N , has ( X F p , Y F p ) D F p local database, containing l p data points, given as
X F p = x F 1 p x F l p p , Y F p = y F 1 p y F l p p
where a label y F k p R , with k [ 1 , , l p ] , is associated with each training data point x F k p R . Each device p uses its database D F p to train a local model, represented by vector W p . Training is carried out to minimize a local objective f ( W ; D F p ) , based on a loss measure L ( · )  [33], where W represents the global model’s vector. The local objective for p is given by:
f ( W ; x F k p , y F k p k = 1 l p ) = 1 l p k = 1 l p L ( x F k p , y F k p , W )
Thus, the objective of every p is to obtain the parameters W p which minimize (3):
W p = arg min W f ( W ; D F p )
An aspect for consideration while training models with federated learning, is the fusion technique used by the central aggregator, to combine model updates coming from multiple participants p. According to the iterative averaging approach, the server requests local model updates W p r from parties p at each federated round r, and then the averaging aggregation is performed over the collected models’ weights, where the global model W r is updated by the mean of all the collected local models’ weights, like so:
W r = W p r + W p + 1 r + + W N r N
The federated learning procedure combines local training described by (4) and global aggregation and fusion, described by (5) in a set of iterative steps, followed until the desired convergence is achieved, without having parties share their local database. Specifically, at each round r:
(1)
The server sends the global model W r to the participants, and each p sets their local model to be the global model W p r = W r .
(2)
Each party p updates the model from W p r to W p ( r + 1 ) , based on (4), by utilizing their local database D F p .
(3)
The participants send their locally calculated updates back to the server for global model formation, according to (5).
In Algorithm 1 below, the federated process is described.
Algorithm 1 FL Stage
1:
Aggregator Side
2:
forrdo
3:
      for  p = 1 , 2 , , N  do
4:
            Send W r to p
5:
    end for
6:
    for  p = 1 , 2 , , N  do
7:
          W r += Request W p ( r + 1 ) from p
8:
    end for
9:
     W ( r + 1 ) W r N
10:
end for
11:
Worker Side
12:
W p r = W r
13:
for e p o c h s do
14:
       W p ( r + 1 ) ← Train W p r with ( X F p , Y F p ) D F p
15:
end for
16:
On Request Send W p ( r + 1 ) to Aggregator

3.3. Attack Detection and Classification Model

DNNs are powerful machine learning tools, utilized in problems with high complexity. As such, the attack detection and classification model implemented in this paper, follows a DNN architecture. Specifically, the various layers composing the DNN, can be observed in Figure 2. The classification model is compiled with Categorical Crossentropy (6), a loss function suitable for classification problems where K denotes the number of classes, b k c is a binary indicator that detects whether the kth input belongs to the c category, while the output o k c denotes the predicted probability for the kth input to belong to the c category. Finally, the optimization algorithm used was Adam with a learning rate of 0.001.
L C C E = c = 1 K b k c l o g ( o k c )
The architecture of the DNN, as observed in Figure 2, consists of 6 layers, all of which are Dense. The first layer takes as an input a V number of features, while it consists of 64 neurons. The next 3 layers have a decreasing number of neurons, while the 5th layer consists of 9 neurons. Finally, the output layer has K neurons, where K denotes the number of classes. All layers but the output one, are activated by the ReLu activation function (7) with x denoting the input value:
f ( x ) = 0 if   x 0 x if   x > 0
The last layer is activated by the Softmax activation function (8), utilized in multi-class classification problems, which turns input values to probabilities. Specifically, for each output of the last layer, Softmax provides a probability distribution of class membership. This is achieved by dividing the exponential value of output z i with the summation of all exponentials:
S M ( z i ) = e z i j = 1 K e z j

3.4. Active Learning

Active Learning is a semi-supervised machine learning approach which addresses the difficulties of adding manually labels to an unlabeled dataset, by dynamically choosing samples and querying an oracle for the provision of labels. Initially, the learner located in each party p, is trained on a set of fully labeled samples, ( X A p , Y A p ) D A p , containing d p data points, given as:
X A p = x A 1 p x A d p p , Y A p = y A 1 p y A d p p
where, a label y A k p R , with k [ 1 , , d p ] , is associated with each training data point x A k p R .
After the first round of training, the learner gets introduced to a pool of un-annotated samples, X AU p D A p X A p , containing z p data points:
X AU p = x AU 1 p x AU z p p
Following a querying strategy, the learner selects the most informative, or the most uncertain instance x AUi p X AU p , with i [ 1 , , z p ] and poses a query to the handler in order to be informed about the corresponding label y A U i p . The learner, expands its knowledge, having obtained the y A U i p to the queried x AUi p . This process reiterates until a preferred accuracy is achieved. An example of the aforementioned AL process is represented in Algorithm 2, below.
Algorithm 2 AL Stage
1:
p Side
2:
Initial adaptation of W with ( X A p , Y A p ) D A p l e a r n e r
3:
for i t e r = 1 , 2 , , R do
4:
       Select x AUi p X AU p
5:
       Label Query x AUi p y A U i p
6:
       Train l e a r n e r with ( x AUi p , y A U i p ) p e r s o n a l i z e d m o d e l
7:
end for
The querying strategy utilized successfully in multiple scenarios, namely Uncertainty Sampling, emphasizes on selecting unlabeled samples which the learner is mostly uncertain about. Several measures can be used for this, one being classification uncertainty defined in (11), where x AUk p is the instance to be predicted and p y A U k p is the most likely prediction probability for this instance:
S ( x AUk p ) = 1 P ( p y A U k p | x AUk p )
In order to pick the most informative instance x AUi p , the learner aims to choose a sample amongst X AU p for which the classification uncertainty S is the highest (12).
x AUi p = arg max x AUk p X AU p S ( x AUk p )
As such, AL employs statistical analysis to ensure that the most informative data points are selected for labelling from a pool of samples, thus minimizing the annotation efforts, and providing a cost-effective solution for training machine learning models.

4. Results

The proposed approach for collaborative model training and customization, is divided into the two machine learning stages explained in Section 3 above, namely the FL stage described in Section 3.2 to preserve worker data privacy, and the AL stage described in Section 3.4 for global model personalization based on each of the participant’s needs. We consider that each party’s local database, containing network traffic data is characterized by different attributes. Thus, to ensure its suitability, the global model is personalized and adapted to each participant’s communication characteristics.
The database used for distributed model training and personalization consists of network traffic data in the form of network flows. The protocol used in the experiments in DNP3, a protocol widely used in industrial settings; DNP3 assumes a central master node directing and requesting data from multiple slave nodes, which in turn handle and respond to the master’s requests. For experimental purposes, normal DNP3 communication was simulated, while attacks were conducted against the simulated infrastructure to gather malicious packets. Specifically, the attacks were either DNP3-specific, targeting the protocol’s vulnerabilities, or generic. DNP3-specific attacks included scanning for DNP3 ports with nmap DNP3-centered scripts, like DNP3 enumerate and DNP3 info, malicious cold and warm restart requests crafted to restart the slaves, packets created with the purpose of damaging slaves’ data by re-initializing their local database, attacks directing the slaves to cease DNP3 applications with the stop application attack, and ordering slaves to disable their ability to send unsolicited responses, thus making them unable to notify the master in case of abnormalities. The replay attack was performed as a generic malicious attempt, aiming to replay or delay the transmission of a normal packet.
Network packets containing malicious and normal traffic of DNP3, were captured and processed into DNP3-specific network flows, consisting of 100 features, centered around the protocol’s attributes such as MostCommonREQ FUNC CODE, referring to the most common DNP3 function code used in the DNP3 master’s requests, DeviceRestartFragment, which counts the DNP3 slave’s responses indicating a restart, different DNP3 layers payload size, etc.; in addition, general network traffic features are present in each flow, such as packet inter-arrival times, flow bytes/sec, etc. Each flow was utilized as the input to the model, while the corresponding label, describing the nature of the flow, is considered as the desired output of the model. As this is an attack detection and classification problem, the labels were classified in a total of 9 classes, describing the attack performed, or a normal flow state. The goal of the machine learning process is to develop models trained to recognize a variety of attacks, without having to share data with the server, while adapting the final model to the participants’ requirements.
Initially, the FL approach described in Section 3.2 was applied, to train models in r = 3 consecutive federated rounds. Specifically, p = [ 1 , 2 , 3 ] , or 3 workers were deployed for distributed training, each one holding locally FL datasets D F 1 , D F 2 , D F 3 containing instances from all 9 classes, however, for each of the workers, the FL dataset was biased towards a specific class by 50%. The training loss and accuracy of the FL procedure for each worker can be observed in Figure 3, where the X-axis represents the federated rounds, while the Y-axis represents the corresponding value of the accuracy or loss.
After the FL training concludes, each worker obtains an identical global model, created by the server, who fuses local model updates using Equation (5). At this point, the workers measure how well the global model is able to perform, by utilizing their local validation set. Each worker’s validation set, shows a 30% bias towards the same class as the dataset used during the FL procedure. In order to measure how well the model performs, the accuracy, precision and F1 scores where used, as described in Equations (13)–(15) respectfully, where T P is the number of true positives, T N is the number of true negatives, F P is the number of false positives and F N is the number of false negatives classified by the model. The aforementioned results can be observed in Table 1.
a c c u r a c y = T P + T N T P + T N + F P + F N
p r e c i s i o n = T P T P + F P
F 1 = T P T P + 1 2 ( F P + F N )
The next training step for each worker refers to the application of AL to further train the global model with local inputs, thus customizing it to each of the workers’ traffic. The AL step was divided into 4 sub-experiments, in order to measure the final local models’ performance under multiple local dataset balance scenarios. To this end, the AL inputs for each worker, were divided into the following categories, and models resulting from each category where evaluated:
(1)
20% Bias, towards the same class as FL
(2)
50% Bias, towards the same class as FL
(3)
70% Bias, towards the same class as FL
(4)
No Bias (Equal number of class instances)
As previously mentioned, dataset annotation is an expensive and time-consuming process. To this end, we assume a budget of maximum 40 queries answered during the AL sampling process, per local dataset, to keep the labelling effords to a minimum, while still offering model adaptation. Thus, for each category mentioned above, models were evaluated after AL training with 10, 20, 30 and 40 queries.

4.1. Category 1: 20% AL Bias

This category assumes a 20% bias of the local AL dataset, towards the same class as the worker’s FL dataset. In order to provide a fair comparison, the evaluation process was conducted with the same data as FL, and the same evaluation methods. In Table 2, the accuracy, precision and F1 score of the AL process for each workers’ local model is shown, while Figure 4 visualizes the accuracy score, per number of queries, with the workers’ corresponding FL score considered as the starting point.
As observed in the underlined results in Table 2 and Figure 4 above, the metrics show an increase when compared to the corresponding FL metrics in Table 1 in the vast majority of cases. It is worth noting that, even in cases where the metrics show a minor decrease, such as W1 AL model’s accuracy with 10 queries, the model is able to classify correctly all of the network flows which belong to W1’s biased class, namely DISABLE UNSOLICITED, whereas the global federated model showed inability to do so. The confusion matrices resulting by W1’s FL and AL evaluation for 10 queries can be observed in Figure 5. In addition, through Figure 4 it is becomes clear that for W1 and W3, 10–20 queries suffice for increasing the accuracy of their local model, while for W2, training can be stopped after 10–20 queries in case of a strict budget, as there is still improvement in accuracy. Specifically, for W3 the improvement is massive compared to W1 and W1, as its accuracy increased by 7.07% in only 10 AL queries.

4.2. Category 2: 50% AL Bias

This category assumes a 50% bias of the local AL dataset, towards the same class as the worker’s FL dataset; similarly to Category 1’s results, the evaluation process was conducted with the same data as FL, and the same evaluation methods are applied. The results are depicted in a similar manner, with the higher metric value highlighted in Table 3 and the accuracy shown in Figure 6 below.
It is observed that W3 shows a drop in Precision and F1 scores, although the overall accuracy is improved by training with AL, compared with standalone FL. However, W3 is able to classify correctly all validation samples which belong to the biased class, namely WARM RESTART, with only 10 queries, when the FL global model is unable to perform as well. This can be seen in Figure 7, which depicts the confusion matrices of W3’s evaluation of the FL and AL model with 10 queries. Furthermore, for 50% biased local database, models seem to peak in accuracy with 30 queries for W1 and W2, with the increase being 5.39% for the former and 8.42% for the latter, while W3 shows significant accuracy increase of 6.06% after 20 queries.

4.3. Category 3: 70% AL Bias

Similarly to the previous categories, Category 4 supposes a 70% bias of the local AL dataset, towards the same class as the worker’s FL dataset. The evaluation process was conducted with the same data as FL, and the same evaluation methods. The results of AL training with 70% biased datasets, are depicted in Table 4 and Figure 8 below.
From Table 4, it is observed that Worker 1’s customized model with 20 queries shows lower metric values when evaluated against the FL global model. However, the AL model is able to predict correctly all of the class instances which belong to the biased class category, namely DISABLE UNSOLICITED. This can be validated through the confusion matrices shown in Figure 9, proving that the personalized model is able to perform better when taking as an input an instance which better describes the worker’s dataset. Moreover, local models perform significantly better in terms of accuracy with only 10 queries for W1 and especially W2, with the former showing improved accuracy of 3.37% and the latter of 5.05% as seen in Figure 8.

4.4. Category 4: Balanced AL

The final experiment assumes a fully balanced AL dataset, and follows the same evaluation process are the categories above. The results can be observed in Table 5 below.
In the case of datasets with overall balanced number of class instances, it is observed in Figure 10 that a sufficient increase in the overall accuracy in the range of 3.03% to 4.38% is achieved with 20 queries, for all workers.

4.5. Discussion

The above subsections have proven that further customizing the model trained in federation by the 3 workers with AL methods, results in increased accuracy compared with the federated model, for all of the AL dataset bias cases. As such, our methodology is a cost-effective solution for not only improving the overall metrics of the model resulted through the federated procedure, but also for tailoring the model to the participant’s network traffic characteristics. Table 6 below, indicates the average accuracy, precision and F1 percentage difference after training with AL, taking into consideration all the above dataset cases, for each worker.
Notably, although a massive percentage increase did not arise from the experimental results, the customized models are able to classify correctly all instances which belong under the biased category, in all cases, even after 10 queries only. When creating effective IDS to be utilized in critical settings, priority should be given in accurately classifying samples belonging to the worker’s communication characteristics, especially when training models in collaboration, as each worker’s traffic may vary significantly from the rest.
With the above into consideration, we conclude that the fusion of the federated and active learning techniques is a cost-effective, budget-friendly method of cooperative model training, for the creation of robust IDS, able to succeed in the rapid recognition of threats in order to provide the protection needed in critical industrial systems.

5. Conclusions

Federated learning is a collaborative training approach which certainly enhances data privacy, however, global models can still improve in terms of performance. To address the high expense of annotating large datasets, active learning is proposed as a personalization method. Specifically, in this paper we have shown that the pairing of federated learning with active learning is able to achieve overall better final model performance with fewer data samples required for personalized training. It is observed that in most cases, 10 to 20 AL queries suffice for creating better, customized local models in a variety of local database settings. Notably, in the case of W3 for 20% AL training dataset bias, the model was able to achieve an increase of 7.07% in accuracy with only 10 AL queries. Furthermore, the average accuracy percentage increase for all dataset bias cases, falls in the range of 1.51% to 6.06%, for all workers, and for all query instances. In addition, even in the cases where metrics show a decrease or in the cases where the increase in accuracy is not significant, the final customized model is able to classify correctly all samples which belong to a class that the local AL dataset is biased towards; in contrast, standalone federated learning is unable to perform as well in this aspect. This indicates that our methodology ensures the security and privacy of the collaborative training process, while also supporting the adaptability of the final local model to the worker’s network traffic, with a minimum labelling budget.

Author Contributions

Conceptualization, V.K., P.S. and V.A.; methodology, V.K., P.S. and V.A.; software, V.K. and V.A.; validation, T.L., G.F. and V.A.; formal analysis, V.K., T.L. and V.A.; investigation, V.K., G.F., T.L. and V.A.; resources, P.S., E.G. and G.F.; data curation, V.K., E.G. and V.A.; writing—original draft preparation, V.K. and V.A.; writing—review and editing, T.L., P.S., G.F. and E.G.; visualization, V.K. and V.A.; supervision, T.L., P.S. and V.A.; project administration, P.S., G.F. and E.G.; funding acquisition, P.S. and E.G. All authors read and agreed to the published version of the manuscript.

Funding

The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 957406.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Verma, A.; Ranga, V. Machine learning based intrusion detection systems for IoT applications. Wirel. Pers. Commun. 2019, 111, 2287–2310. [Google Scholar] [CrossRef]
  2. Kiran, S.; Kumar, U.V.; Kumar, T.M. A review of machine learning algorithms on IoT applications. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Tamilnadu, India, 10–12 September 2020; pp. 330–334. [Google Scholar] [CrossRef]
  3. Qian, B.; Su, J.; Wen, Z.; Jha, D.N.; Li, Y.; Guan, Y.; Puthal, D.; James, P.; Yang, R.; Zomaya, A.Y.; et al. Orchestrating the development lifecycle of machine learning-based IoT applications: A taxonomy and survey. ACM Comput. Surv. 2020, 53. [Google Scholar] [CrossRef]
  4. Ma, L.; Sun, B. Machine learning and AI in marketing – Connecting computing power to human insights. Int. J. Res. Mark. 2020, 37, 481–504. [Google Scholar] [CrossRef]
  5. Bauer, W.A.; Dubljević, V. AI assistants and the paradox of internal automaticity. Neuroethics 2019, 13, 303–310. [Google Scholar] [CrossRef]
  6. Amberkar, A.; Awasarmol, P.; Deshmukh, G.; Dave, P. Speech recognition using recurrent neural networks. In Proceedings of the 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), Coimbatore, India, 1–3 March 2018; pp. 1–4. [Google Scholar] [CrossRef]
  7. Sodhro, A.H.; Pirbhulal, S.; de Albuquerque, V.H.C. Artificial intelligence-driven mechanism for edge computing-based industrial applications. IEEE Trans. Ind. Inform. 2019, 15, 4235–4243. [Google Scholar] [CrossRef]
  8. Cui, L.; Qu, Y.; Gao, L.; Xie, G.; Yu, S. Detecting false data attacks using machine learning techniques in smart grid: A survey. J. Netw. Comput. Appl. 2020, 170, 102808. [Google Scholar] [CrossRef]
  9. Kumar, I.; Mohd, N.; Bhatt, C.; Sharma, S.K. Development of IDS using supervised machine learning. In Soft Computing: Theories and Applications; Pant, M., Kumar Sharma, T., Arya, R., Sahana, B., Zolfagharinia, H., Eds.; Springer: Singapore, 2020; pp. 565–577. [Google Scholar]
  10. Kilincer, I.F.; Ertam, F.; Sengur, A. Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Comput. Netw. 2021, 188, 107840. [Google Scholar] [CrossRef]
  11. Gupta, A.R.B.; Agrawal, J. A Comprehensive survey on various machine learning methods used for intrusion detection system. In Proceedings of the 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India, 10–12 April 2020; pp. 282–289. [Google Scholar] [CrossRef]
  12. Radoglou-Grammatikis, P.; Sarigiannidis, P.; Efstathopoulos, G.; Karypidis, P.A.; Sarigiannidis, A. DIDEROT: An intrusion detection and prevention system for DNP3-based SCADA systems. In Proceedings of the 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, 25–28 August 2020; Association for Computing Machinery: New York, NY, USA, 2020. [Google Scholar] [CrossRef]
  13. Chen, Y.C.; Mooney, V.; Grijalva, S. Electricity grid cyber-physical security risk assessment using simulation of attack stages and physical impact. In Proceedings of the 2020 IEEE Kansas Power and Energy Conference (KPEC), Manhattan, KS, USA, 13–14 July 2020; pp. 1–6. [Google Scholar] [CrossRef]
  14. Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Priv. 2011, 9, 49–51. [Google Scholar] [CrossRef]
  15. Chen, T.M.; Abu-Nimeh, S. Lessons from Stuxnet. Computer 2011, 44, 91–93. [Google Scholar] [CrossRef]
  16. Elbir, A.M.; Coleri, S. A family of hybrid federated and centralized learning architectures in machine learning. arXiv 2021, arXiv:2105.03288. [Google Scholar]
  17. Vu, L.; Nguyen, Q.U.; Nguyen, D.N.; Hoang, D.T.; Dutkiewicz, E. Deep transfer learning for IoT attack detection. IEEE Access 2020, 8, 107335–107344. [Google Scholar] [CrossRef]
  18. Drainakis, G.; Katsaros, K.V.; Pantazopoulos, P.; Sourlas, V.; Amditis, A. Federated vs. In centralized machine learning under privacy-elastic users: A comparative analysis. In Proceedings of the 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 24–27 November 2020; pp. 1–8. [Google Scholar] [CrossRef]
  19. Mothukuri, V.; Khare, P.; Parizi, R.M.; Pouriyeh, S.; Dehghantanha, A.; Srivastava, G. Federated learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 2021, 1. [Google Scholar] [CrossRef]
  20. Rahman, S.A.; Tout, H.; Talhi, C.; Mourad, A. Internet of Things intrusion detection: Centralized, on-Device, or federated learning? IEEE Netw. 2020, 34, 310–317. [Google Scholar] [CrossRef]
  21. Li, T.; Sahu, A.K.; Talwalkar, A.; Smith, V. Federated learning: Challenges, methods, and future directions. IEEE Signal Process. Mag. 2020, 37, 50–60. [Google Scholar] [CrossRef]
  22. Konyushkova, K.; Sznitman, R.; Fua, P. Learning active learning from data. arXiv 2017, arXiv:1703.03365. [Google Scholar]
  23. Geifman, Y.; El-Yaniv, R. Deep active learning with a neural architecture search. arXiv 2019, arXiv:1811.07579. [Google Scholar]
  24. Truong, N.; Sun, K.; Wang, S.; Guitton, F.; Guo, Y. Privacy preservation in federated learning: An insightful survey from the GDPR perspective. arXiv 2021, arXiv:2011.05411. [Google Scholar]
  25. Dhakal, S.; Prakash, S.; Yona, Y.; Talwar, S.; Himayat, N. Coded federated learning. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  26. Li, B.; Wu, Y.; Song, J.; Li, T.; Zhao, L. DeepFed: Federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans. Ind. Inform. 2020, 17, 5615–5624. [Google Scholar]
  27. Nguyen, T.D.; Marchal, S.; Miettinen, M.; Fereidooni, H.; Asokan, N.; Sadeghi, A.R. DÏoT: A federated self-learning anomaly detection system for IoT. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 756–767. [Google Scholar] [CrossRef] [Green Version]
  28. Schneble, W.; Thamilarasu, G. Attack detection using federated learning in medical cyber-physical systems. In Proceedings of the 28th International Conference on Computer Communications and Networks (ICCCN), Valencia, Spain, 29 July–1 August 2019. [Google Scholar]
  29. Görnitz, N.; Kloft, M.; Rieck, K.; Brefeld, U. Active learning for network intrusion detection. In Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, Chicago, IL, USA, 9 November 2009; pp. 47–54. [Google Scholar] [CrossRef] [Green Version]
  30. Abe, N.; Zadrozny, B.; Langford, J. Outlier detection by active learning. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, 20–23 August 2006; Association for Computing Machinery: New York, NY, USA, 2006; pp. 504–509. [Google Scholar] [CrossRef]
  31. Pimentel, T.; Monteiro, M.; Veloso, A.; Ziviani, N. Deep active learning for anomaly detection. arXiv 2020, arXiv:1805.09411. [Google Scholar]
  32. Phaladisailoed, T.; Numnonda, T. Machine learning models comparison for bitcoin price prediction. In Proceedings of the 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Bali, Indonesia, 24–26 July 2018; pp. 506–511. [Google Scholar] [CrossRef]
  33. Gafni, T.; Shlezinger, N.; Cohen, K.; Eldar, Y.C.; Poor, H.V. Federated learning: A signal processing perspective. arXiv 2021, arXiv:2103.17150. [Google Scholar]
Figure 1. The proposed methodology combining FL for global model formation and AL for model personalization.
Figure 1. The proposed methodology combining FL for global model formation and AL for model personalization.
Sensors 21 06743 g001
Figure 2. The proposed DNN architecture, receiving V features as an input and producing K outputs.
Figure 2. The proposed DNN architecture, receiving V features as an input and producing K outputs.
Sensors 21 06743 g002
Figure 3. FL Training. X-axis: Federated Rounds, Y-axis: value of accuracy(blue and loss (red). (a) Worker 1 (W1) FL Training Metrics; (b) Worker 2 (W2) FL Training Metrics; (c) Worker 3 (W3) FL Training Metrics.
Figure 3. FL Training. X-axis: Federated Rounds, Y-axis: value of accuracy(blue and loss (red). (a) Worker 1 (W1) FL Training Metrics; (b) Worker 2 (W2) FL Training Metrics; (c) Worker 3 (W3) FL Training Metrics.
Sensors 21 06743 g003aSensors 21 06743 g003b
Figure 4. Accuracy of W1, W2 and W3’s models personalized with 20% AL dataset bias (Y-axis) per Query (X-axis), evaluated using their corresponding evaluation datasets. The FL accuracy for each worker is represented by the horizontal line of the worker’s respective color.
Figure 4. Accuracy of W1, W2 and W3’s models personalized with 20% AL dataset bias (Y-axis) per Query (X-axis), evaluated using their corresponding evaluation datasets. The FL accuracy for each worker is represented by the horizontal line of the worker’s respective color.
Sensors 21 06743 g004
Figure 5. W1 Confusion Matrices. (a) W1’s evaluation of global FL model after r = 3 using its evaluation dataset; (b) W1’s evaluation of customized model by AL, after Q = 10 queries, using its evaluation dataset.
Figure 5. W1 Confusion Matrices. (a) W1’s evaluation of global FL model after r = 3 using its evaluation dataset; (b) W1’s evaluation of customized model by AL, after Q = 10 queries, using its evaluation dataset.
Sensors 21 06743 g005
Figure 6. Accuracy of W1, W2 and W3’s models personalized with 50% AL dataset bias (Y-axis) per Query (X-axis), evaluated using their corresponding evaluation datasets. The FL accuracy for each worker is represented by the horizontal line of the worker’s respective color.
Figure 6. Accuracy of W1, W2 and W3’s models personalized with 50% AL dataset bias (Y-axis) per Query (X-axis), evaluated using their corresponding evaluation datasets. The FL accuracy for each worker is represented by the horizontal line of the worker’s respective color.
Sensors 21 06743 g006
Figure 7. W3 Confusion Matrices. (a) W3’s evaluation of global FL model after r = 3 using its evaluation dataset; (b) W3’s evaluation of customized model by AL, after Q = 10 queries, using its evaluation dataset.
Figure 7. W3 Confusion Matrices. (a) W3’s evaluation of global FL model after r = 3 using its evaluation dataset; (b) W3’s evaluation of customized model by AL, after Q = 10 queries, using its evaluation dataset.
Sensors 21 06743 g007
Figure 8. Accuracy of W1, W2 and W3’s models personalized with 70% AL dataset bias (Y-axis) per Query (X-axis), evaluated using their corresponding evaluation datasets. The FL accuracy for each worker is represented by the horizontal line of the worker’s respective color.
Figure 8. Accuracy of W1, W2 and W3’s models personalized with 70% AL dataset bias (Y-axis) per Query (X-axis), evaluated using their corresponding evaluation datasets. The FL accuracy for each worker is represented by the horizontal line of the worker’s respective color.
Sensors 21 06743 g008
Figure 9. W1 Confusion Matrices. (a) W1’s evaluation of global FL model after r = 3 using its evaluation dataset; (b) W1’s evaluation of customized model by AL, after Q = 20 queries, using its evaluation dataset.
Figure 9. W1 Confusion Matrices. (a) W1’s evaluation of global FL model after r = 3 using its evaluation dataset; (b) W1’s evaluation of customized model by AL, after Q = 20 queries, using its evaluation dataset.
Sensors 21 06743 g009
Figure 10. Accuracy of W1, W2 and W3’s models personalized with balanced AL dataset (Y-axis) per Query (X-axis), evaluated using their corresponding evaluation datasets. The FL accuracy for each worker is represented by the horizontal line of the worker’s respective color.
Figure 10. Accuracy of W1, W2 and W3’s models personalized with balanced AL dataset (Y-axis) per Query (X-axis), evaluated using their corresponding evaluation datasets. The FL accuracy for each worker is represented by the horizontal line of the worker’s respective color.
Sensors 21 06743 g010
Table 1. Evaluation of the global FL model produced after r = 3 , using Worker 1’s (W1), Worker 2’s (W2) and Worker 3’s (W3) evaluation datasets.
Table 1. Evaluation of the global FL model produced after r = 3 , using Worker 1’s (W1), Worker 2’s (W2) and Worker 3’s (W3) evaluation datasets.
AccuracyPrecisionF1
W10.80130.81900.8004
W20.75080.77810.7431
W30.70370.75290.7034
Table 2. Evaluation of W1, W2 and W3’s personalized models generated with 20% AL dataset bias after Q = 10 , 20 , 30 , 40 queries, using their corresponding evaluation datasets. Underlined results mean increased metrics in comparison with the corresponding FL evaluation.
Table 2. Evaluation of W1, W2 and W3’s personalized models generated with 20% AL dataset bias after Q = 10 , 20 , 30 , 40 queries, using their corresponding evaluation datasets. Underlined results mean increased metrics in comparison with the corresponding FL evaluation.
Accuracy Precision F1
W1W2W3W1W2W3W1W2W3
Q = 100.79790.76090.77440.83480.81710.71880.78150.74140.7191
Q = 200.83830.76760.72720.85670.74250.76580.82600.74400.6914
Q = 300.82820.78450.76090.85810.81000.70700.82180.77740.7053
Q = 400.82490.79790.77440.84610.81730.71840.81270.79210.7195
Table 3. Evaluation of W1, W2 and W3’s personalized models generated with 50% AL dataset bias after Q = 10 , 20 , 30 , 40 queries, using their corresponding evaluation datasets. Underlined results mean increased metrics in comparison with the corresponding FL evaluation.
Table 3. Evaluation of W1, W2 and W3’s personalized models generated with 50% AL dataset bias after Q = 10 , 20 , 30 , 40 queries, using their corresponding evaluation datasets. Underlined results mean increased metrics in comparison with the corresponding FL evaluation.
Accuracy Precision F1
W1W2W3W1W2W3W1W2W3
Q = 100.82150.74410.72050.79400.81920.60660.80110.70620.6315
Q = 200.81810.79460.76430.82860.84190.70670.81120.77770.7103
Q = 300.85520.83500.76090.85900.84710.73000.85140.82950.6946
Q = 400.80800.77770.77440.83220.80510.73610.80510.76940.7163
Table 4. Evaluation of W1, W2 and W3’s personalized models generated with 70% AL dataset bias after Q = 10 , 20 , 30 , 40 queries, using their corresponding evaluation datasets. Underlined results mean increased metrics in comparison with the corresponding FL evaluation.
Table 4. Evaluation of W1, W2 and W3’s personalized models generated with 70% AL dataset bias after Q = 10 , 20 , 30 , 40 queries, using their corresponding evaluation datasets. Underlined results mean increased metrics in comparison with the corresponding FL evaluation.
Accuracy Precision F1
W1W2W3W1W2W3W1W2W3
Q = 100.83500.80130.72050.81900.82700.62570.81130.78700.6402
Q = 200.77770.80130.77100.80250.82260.71590.76100.78860.7153
Q = 300.82820.78450.77440.83330.80620.71880.82270.77560.7191
Q = 400.82490.78780.77440.83000.83640.71500.81980.77050.7210
Table 5. Evaluation of W1, W2 and W3’s personalized models generated with no AL dataset bias after Q = 10 , 20 , 30 , 40 queries, using their corresponding evaluation datasets. Underlined results mean increased metrics in comparison with the corresponding FL evaluation.
Table 5. Evaluation of W1, W2 and W3’s personalized models generated with no AL dataset bias after Q = 10 , 20 , 30 , 40 queries, using their corresponding evaluation datasets. Underlined results mean increased metrics in comparison with the corresponding FL evaluation.
Accuracy Precision F1
W1W2W3W1W2W3W1W2W3
Q = 100.81480.79120.69690.78000.81330.77050.78490.78370.6866
Q = 200.83160.79460.73400.84690.81770.82480.82240.78720.7241
Q = 300.80800.77440.71380.82140.80570.79250.80480.76480.6946
Q = 400.83160.74740.73400.84740.81840.769440.82450.71610.7313
Table 6. Average difference in percentage of the customized models’ accuracy, precision and F1, considering all dataset balance cases of Section 4.1, Section 4.2, Section 4.3 and Section 4.4.
Table 6. Average difference in percentage of the customized models’ accuracy, precision and F1, considering all dataset balance cases of Section 4.1, Section 4.2, Section 4.3 and Section 4.4.
Accuracy Precision F1
W1W2W3W1W2W3W1W2W3
Q = 101.60%2.35%2.43%−1.20%4.11%−7.25%−0.57%1.15%−3.41%
Q = 201.51%3.87%4.54%1.47%2.81%0.04%0.48%3.13%0.69%
Q = 302.85%4.38%4.87%2.40%3.92%−1.58%2.48%4.37%0.00%
Q = 402.11%2.69%6.06%1.99%4.12%−1.82%1.51%1.89%1.86%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kelli, V.; Argyriou, V.; Lagkas, T.; Fragulis, G.; Grigoriou, E.; Sarigiannidis, P. IDS for Industrial Applications: A Federated Learning Approach with Active Personalization. Sensors 2021, 21, 6743. https://doi.org/10.3390/s21206743

AMA Style

Kelli V, Argyriou V, Lagkas T, Fragulis G, Grigoriou E, Sarigiannidis P. IDS for Industrial Applications: A Federated Learning Approach with Active Personalization. Sensors. 2021; 21(20):6743. https://doi.org/10.3390/s21206743

Chicago/Turabian Style

Kelli, Vasiliki, Vasileios Argyriou, Thomas Lagkas, George Fragulis, Elisavet Grigoriou, and Panagiotis Sarigiannidis. 2021. "IDS for Industrial Applications: A Federated Learning Approach with Active Personalization" Sensors 21, no. 20: 6743. https://doi.org/10.3390/s21206743

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop