Next Article in Journal
Application of Auxiliary Classifier Wasserstein Generative Adversarial Networks in Wireless Signal Classification of Illegal Unmanned Aerial Vehicles
Next Article in Special Issue
MedChain: Efficient Healthcare Data Sharing via Blockchain
Previous Article in Journal
Digital Shearography for NDT: Phase Measurement Technique and Recent Developments
Previous Article in Special Issue
Blockchain: A Tale of Two Applications
Article Menu
Issue 12 (December) cover image

Export Article

Open AccessArticle

Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study

1
imec-DistriNet-KU Leuven, Celestijnenlaan 200A, B-3001 Heverlee, Belgium
2
MTA SZTAKI, Kende u. 13-17, H-1111 Budapest, Hungary
*
Author to whom correspondence should be addressed.
Appl. Sci. 2018, 8(12), 2663; https://doi.org/10.3390/app8122663
Received: 4 November 2018 / Revised: 14 December 2018 / Accepted: 14 December 2018 / Published: 18 December 2018
(This article belongs to the Special Issue Advances in Blockchain Technology and Applications)
  |  
PDF [2163 KB, uploaded 20 December 2018]
  |  

Abstract

The adoption of machine learning and deep learning is on the rise in the cybersecurity domain where these AI methods help strengthen traditional system monitoring and threat detection solutions. However, adversaries too are becoming more effective in concealing malicious behavior amongst large amounts of benign behavior data. To address the increasing time-to-detection of these stealthy attacks, interconnected and federated learning systems can improve the detection of malicious behavior by joining forces and pooling together monitoring data. The major challenge that we address in this work is that in a federated learning setup, an adversary has many more opportunities to poison one of the local machine learning models with malicious training samples, thereby influencing the outcome of the federated learning and evading detection. We present a solution where contributing parties in federated learning can be held accountable and have their model updates audited. We describe a permissioned blockchain-based federated learning method where incremental updates to an anomaly detection machine learning model are chained together on the distributed ledger. By integrating federated learning with blockchain technology, our solution supports the auditing of machine learning models without the necessity to centralize the training data. Experiments with a realistic intrusion detection use case and an autoencoder for anomaly detection illustrate that the increased complexity caused by blockchain technology has a limited performance impact on the federated learning, varying between 5 and 15%, while providing full transparency over the distributed training process of the neural network. Furthermore, our blockchain-based federated learning solution can be generalized and applied to more sophisticated neural network architectures and other use cases. View Full-Text
Keywords: blockchain; federated deep learning; anomaly detection; audit; performance blockchain; federated deep learning; anomaly detection; audit; performance
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Preuveneers, D.; Rimmer, V.; Tsingenopoulos, I.; Spooren, J.; Joosen, W.; Ilie-Zudor, E. Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study. Appl. Sci. 2018, 8, 2663.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Appl. Sci. EISSN 2076-3417 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top