G-PFL-ID: Graph-Driven Personalized Federated Learning for Unsupervised Intrusion Detection in Non-IID IoT Systems
Abstract
1. Introduction
- We implement and evaluate two federated one-class graph encoders that are compliant to federated training and comparable under identical conditions. These are a graph-level GCN trained with a DeepSVDD objective, and a hybrid GAE–DeepSVDD that jointly optimises reconstruction and embedding compactness.
- We introduce two lightweight regularizers for federated unsupervised learning. A proximal aggregation term reduces weight divergence when client sample sizes vary. An embedding variance penalty mitigates representation collapse on small-data clients and preserves discriminative capacity.
- We design a compact personalization head that each client fine-tunes on benign data. The head, together with selective encoder fine-tuning, restores local sensitivity while keeping communication overhead low.
- We provide an extensive empirical study on IoT-23 using Dirichlet partitions with and , and further validate G-PFL-ID on the N-BaIoT dataset (treating each of the 9 IoT devices as a separate client, ) to demonstrate generalizability under real-world device heterogeneity. We report both global and personalized metrics (AUROC, AUPR, detection rates at fixed false-positive rates) and present ablation studies that isolate the contribution of each proposed component.
2. Related Works
2.1. Federated Learning for Intrusion Detection
2.2. Unsupervised Anomaly Detection
2.3. Personalized Federated Learning (PFL)
3. Methodology
3.1. Preliminaries
3.1.1. Problem Formulation
3.1.2. Notations and Definitions
3.2. G-PFL-ID Overview
- Global Model Initialization:The process begins with the central server initializing a shared global intrusion detection model . This model employs graph-based architectures which includes the option to use GCN encoders or GAE encoders with decoders for reconstruction tasks [28,30,68]. The initialized model is broadcast to all participating clients at the beginning of each federation round t.
- Local Training with Multi-Objective Optimization: Each client k computes local updates using the shared global model on its per-host aggregated graph dataset . The local optimization incorporates three key components:
- –
- Task-Specific Objective: Clients employ one of three graph-based architectures: GAE (Graph Autoencoder), GAE-DeepSVDD, or GCN-DeepSVDD, depending on the detection paradigm (reconstruction-based or hypersphere-based anomaly detection).
- –
- FedProx Regularization: The proximal term [48] stabilizes training under non-IID data distributions by constraining local updates to remain close to the global model.
- –
- Embedding Variance Penalty: A variance regularization term promotes compact feature representations, enhancing anomaly detection performance in one-class settings.
- Secure Server Aggregation with Intrusion Detection: The global server employs an intrusion detection mechanism to identify and filter out potentially malicious client updates . Clean updates are aggregated using federated averaging [33]:where represents the set of verified benign clients, and represents the global model parameters at round t and respectively, and which is represents the model update from client k at round t.
- Client-Specific Personalization: In the final stage, each client adapts the global model through personalized heads trained exclusively on local data . This personalization phase optimizes ensuring optimal adaptation to local traffic patterns while maintaining stability [81,84].where represents the optimal personalized head for client k, finds parameters that minimize the objective, is the expectation over client k’s data distribution, represents the loss function (e.g., reconstruction error for GAE), is the feature representation from frozen global backbone, ∘ is the function composition (backbone + personal head), is the personalization regularization strength, and represents the L2 regularization from initial head.
3.3. Global Federated Training
3.3.1. GCN-DeepSVDD Implementation
3.3.2. GAE-DeepSVDD Implementation
- and are the graph reconstruction loss and DeepSVDD compactness loss for client k,
- , and are the reconstruction and DeepSVDD loss weight, where (), and ().
- is the weight decay coefficient for regularization
- is the frobenius norm of encoder parameters (sum of squared weights), and is the squared norm (Euclidean distance)
- is binary cross-entropy between actual, and reconstructed, adjacency matrix element. if the edge exists, and 0, otherwise. is sigma,
- is the edge between nodes i and j which is an element of the edges, in client k’s graph.
- , , and are the original node features, reconstructed node features, and latent embedding for node i in client k, where .
3.3.3. Federated Optimization with Multi-Objective Regularization (FedReg)
- Embedding Compactness, : The variance regularization, , prevents feature collapse in unsupervised learning by encouraging diverse but structured representations [67,91]. This addresses the trivial solution problem where all embeddings converge to the hypersphere center c, which is crucial for effective anomaly detection in high-dimensional spaces [92].
- FedProx, : Provides convergence guarantees for non-convex objectives under heterogeneous data distributions, with the proximal term bounding client drift by constraining local updates to remain close to the global model [48]. The hyperparameter controls the regularization strength.
- Adaptive Center Update, c: Ensures stable DeepSVDD optimization by gradually refining the hypersphere center, c while avoiding abrupt changes (model collapse) that could destabilize training [27].
| Algorithm 1 G-PFL-ID Federated Training with FedReg Regularization |
|
3.4. Personalization Strategy
| Algorithm 2 Client Personalization with Frozen Backbone |
|
4. Evaluation
4.1. Experimental Setup
4.1.1. Dataset and Preprocessing
- Source features: Mean values of numeric features when host h acts as source:
- Destination features: Mean values of numeric features when host h acts as destination:
4.1.2. Non-IID Partitioning and Client Splits
| Algorithm 3 Dirichlet-based Non-IID Partitioning with Minimum Sample Guarantees |
|
- Quantity skew. Data volume varies substantially across devices. In our benign subset the largest device (Device 4: Philips baby monitor) contributes 175,240 samples while the smallest device (Device 2: Ecobee thermostat) contributes 13,113 samples, a max/min ratio of approximately 13.4:1. This degree of skew reflects real-world deployments where device types and usage patterns differ.
- Gini coefficient. The Gini coefficient for the nine-device benign split is , indicating a moderate level of inequality in sample counts (with a small number of devices contributing a large fraction of the data). We compute G aswhere denotes the benign-sample count of device i and .
- Coefficient of variation (CV). The mean number of benign samples per device is = 61,770 and the standard deviation is 46,385, yielding . This high relative variability further establishes the imbalance that federated algorithms must tolerate during aggregation and personalization.
4.2. Discussion and Results
4.2.1. Experimental Setting 1: Global Anomaly Detection Performance
4.2.2. Experimental Setting 2: Component Contribution Analysis
4.2.3. Experimental Setting 3: Ablation Study
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
| G-PFL-ID | Graph-Driven Personalized Federated Learning for Intrusion Detection |
| non-IID | Non-Independent and Identically Distributed |
| GAE/GCN | Global Graph Autoencoder or Graph Convolutional Network |
| DoS/DDoS | Denial of Service/Distributed DoS |
| IOT | Internet of Things |
| IDS/AD | Intrusion Detection System/Anomaly Detection |
| ML/FL | Machine Learning/Federated Learning |
| AUROC | Area Under the Receiver Operating Characteristic Curve |
| AUPR | Area Under the Precision–Recall Curve |
| FPR/TPR | False Positive Rates/True Positive Rates |
References
- Oladele, D.A.; Didam Markus, E.; Abu-Mahfouz, A.M. Adaptability of Assistive Mobility Devices and the Role of the Internet of Medical Things: Comprehensive Review. JMIR Rehabil. Assist. Technol. 2021, 8, e29610. [Google Scholar] [CrossRef] [PubMed]
- Shehu Yalli, J.; Hilmi Hasan, M.; Abubakar Badawi, A. Internet of Things (IoT): Origins, Embedded Technologies, Smart Applications, and Its Growth in the Last Decade. IEEE Access 2024, 12, 91357–91382. [Google Scholar] [CrossRef]
- Ahmed, S.F.; Alam, M.S.B.; Hoque, M.; Lameesa, A.; Afrin, S.; Farah, T.; Kabir, M.; Shafiullah, G.M.; Muyeen, S.M. Industrial Internet of Things enabled technologies, challenges, and future directions. Comput. Electr. Eng. 2023, 110, 108847. [Google Scholar] [CrossRef]
- Oladele, D.A.; Didam Markus, E.; Abu-Mahfouz, A.M. BEV-CAM3D: A Unified Bird’s-Eye View Architecture for Autonomous Driving with Monocular Cameras and 3D Point Clouds. AI 2025, 6, 82. [Google Scholar] [CrossRef]
- Oladele, D.A.; Didam Markus, E.; Abu-Mahfouz, A.M. FASTSeg3D: A Fast, Efficient, and Adaptive Ground Filtering Algorithm for 3D Point Clouds in Mobile Sensing Applications. AI 2025, 6, 97. [Google Scholar] [CrossRef]
- Pech, M.; Vrchota, J.; Bednář, J. Predictive Maintenance and Intelligent Sensors in Smart Factory: Review. Sensors 2021, 21, 1470. [Google Scholar] [CrossRef]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the Mirai botnet. In Proceedings of the 26th USENIX Conference on Security Symposium, Vancouver, BC, Canada, 16–18 August 2017; USENIX Association: Berkeley, CA, USA, 2017; pp. 1093–1110. [Google Scholar]
- Boyarchuk, O.; Mariani, S.; Ortolani, S.; Vigna, G. Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet. Digit. Threats 2023, 4, 41. [Google Scholar] [CrossRef]
- Tanwar, G.S.; Goar, V. Tools, Techniques & Analysis of Botnet. In Proceedings of the International Conference on Information and Communication Technology for Competitive Strategies; Association for Computing Machinery: New York, NY, USA, 2014; pp. 92–96. [Google Scholar] [CrossRef]
- Rizvi, S.; Orr, R.J.; Cox, A.; Ashokkumar, P.; Rizvi, M.R. Identifying the attack surface for IoT network. Internet Things 2020, 9, 100162. [Google Scholar] [CrossRef]
- Hnamte, V.; Hussain, J. Enhancing security in Software-Defined Networks: An approach to efficient ARP spoofing attacks detection and mitigation. Telemat. Inform. Rep. 2024, 14, 100129. [Google Scholar] [CrossRef]
- Kambourakis, G.; Kolias, C.; Stavrou, A. The Mirai botnet and the IoT Zombie Armies. In Proceedings of the MILCOM 2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA, 23–25 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 267–272. [Google Scholar] [CrossRef]
- Paquet, C. Implementing Cisco IOS Network Security (IINS). In PART II: Protecting the Network Infrastructure; Cisco Press: Indianapolis, IN, USA, 2009; Chapter 3–6; pp. 111–300. [Google Scholar]
- Paquet, C. Implementing Cisco IOS Network Security (IINS). In PART III: Threat Control and Containment; Cisco Press: Indianapolis, IN, USA, 2009; Chapter 7–11; pp. 305–520. [Google Scholar]
- Lekkala, S.; Gurijala, P. Designing Secure Network Architectures. In Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures; Apress: Berkeley, CA, USA, 2024; Chapter 8; pp. 75–86. [Google Scholar] [CrossRef]
- Lekkala, S.; Gurijala, P. Securing Networks with SDN and SD-WAN. In Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures; Apress: Berkeley, CA, USA, 2024; Chapter 12; pp. 121–131. [Google Scholar] [CrossRef]
- Lekkala, S.; Gurijala, P. Proactive Intrusion Detection and Network Surveillance. In Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures; Apress: Berkeley, CA, USA, 2024; Chapter 10; pp. 99–108. [Google Scholar] [CrossRef]
- Abdulganiyu, O.H.; Tchakoucht, T.A.; Saheed, Y.K. A systematic literature review for network intrusion detection system (IDS). Int. J. Inf. Secur. 2023, 22, 1125–1162. [Google Scholar] [CrossRef]
- Roesch, M. Snort–Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX Conference on System Administration (LISA ’99), Seattle, WA, USA, 7–12 November 1999; USENIX Association: Berkeley, CA, USA, 1999; pp. 229–238. [Google Scholar]
- Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity 2019, 2, 20. [Google Scholar] [CrossRef]
- Chandola, V.; Banerjee, A.; Kumar, V. Anomaly detection: A survey. ACM Comput. Surv. 2009, 41, 15. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 2020, 50, 102419. [Google Scholar] [CrossRef]
- Guerra, J.L.; Catania, C.; Veas, E. Datasets are not enough: Challenges in labeling network traffic. Comput. Secur. 2022, 120, 102810. [Google Scholar] [CrossRef]
- Alotaibi, B. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Sensors 2023, 23, 7470. [Google Scholar] [CrossRef]
- Kikissagbe, B.R.; Adda, M. Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review. Electronics 2024, 13, 3601. [Google Scholar] [CrossRef]
- Sakurada, M.; Yairi, T. Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction. In Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, Gold Coast, QLD, Australia, 2 December 2014; Association for Computing Machinery: New York, NY, USA, 2014; pp. 4–11. [Google Scholar] [CrossRef]
- Ruff, L.; Vandermeulen, R.; Goernitz, N.; Deecke, L.; Siddiqui, S.A.; Binder, A.; Müller, E.; Kloft, M. Deep One-Class Classification. In Proceedings of the 35th International Conference on Machine Learning, Stockholm, Sweden, 10–15 July 2018; Dy, J., Krause, A., Eds.; PMLR: Cambridge, MA, USA, 2018; Volume 80, pp. 4393–4402. Available online: https://proceedings.mlr.press/v80/ruff18a.html (accessed on 5 December 2025).
- Kipf, T.N.; Welling, M. Variational Graph Auto-Encoders. In Proceedings of the Bayesian Deep Learning Workshop, NeurIPS 2016; NeurIPS Foundation: Barcelona, Spain, 2016; pp. 1–3. Available online: https://bayesiandeeplearning.org/2016/ (accessed on 5 December 2025).
- Jiang, B.; Zhang, Z.; Lin, D.; Tang, J.; Luo, B. Semi-Supervised Learning With Graph Learning-Convolutional Networks. In Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA, 15–20 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 11305–11312. [Google Scholar] [CrossRef]
- Kipf, T.N.; Welling, M. Semi-Supervised Classification with Graph Convolutional Networks. arXiv 2016, arXiv:1609.02907. [Google Scholar] [CrossRef]
- Rahman, S.A.; Tout, H.; Talhi, C.; Mourad, A. Internet of Things Intrusion Detection: Centralized, On-Device, or Federated Learning? IEEE Netw. 2020, 34, 310–317. [Google Scholar] [CrossRef]
- Sultana, N.; Chilamkurti, N.; Peng, W.; Alhadad, R. Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw. Appl. 2019, 12, 493–501. [Google Scholar] [CrossRef]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Agüera y Arcas, B. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), Fort Lauderdale, FL, USA, 20–22 April 2017; Singh, A., Zhu, J., Eds.; PMLR: Cambridge, MA, USA, 2017; Volume 54, pp. 1273–1282. Available online: https://proceedings.mlr.press/v54/mcmahan17a.html (accessed on 5 December 2025).
- Kairouz, P.; McMahan, H.B.; Avent, B.; Bellet, A.; Bennis, M.; Nitin Bhagoji, A.; Bonawitz, K.; Charles, Z.; Cormode, G.; Cummings, R.; et al. Advances and Open Problems in Federated Learning. arXiv 2019, arXiv:1912.04977. [Google Scholar] [CrossRef]
- Tang, Z.; Hu, H.; Xu, C. A federated learning method for network intrusion detection. Concurr. Comput. Pract. Exp. 2022, 34, e6812. [Google Scholar] [CrossRef]
- Friha, O.; Ferrag, M.A.; Shu, L.; Maglaras, L.; Choo, K.R.; Nafaa, M. FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J. Parallel Distrib. Comput. 2022, 165, 17–31. [Google Scholar] [CrossRef]
- Mazid, A.; Kirmani, S.; Manaullah; Yadav, M. FL-IDPP: A Federated Learning Based Intrusion Detection Approach with Privacy Preservation. Trans. Emerg. Telecommun. Technol. 2025, 36, e70039. [Google Scholar] [CrossRef]
- McMahan, H.B.; Moore, E.; Ramage, D.; Hampson, S.; Agüera y Arcas, B. Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv 2023, arXiv:1602.05629. [Google Scholar] [CrossRef]
- Zhao, Y.; Li, M.; Lai, L.; Suda, N.; Civin, D.; Chandra, V. Federated Learning with Non-IID Data. arXiv 2018. [Google Scholar] [CrossRef]
- Campos, E.M.; Saura, P.F.; González-Vidal, A.; Hernández-Ramos, J.L.; Bernabé, J.B.; Baldini, G.; Skarmeta, A. Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges. Comput. Netw. 2022, 203, 108661. [Google Scholar] [CrossRef]
- Agrawal, S.; Sarkar, S.; Aouedi, O.; Yenduri, G.; Piamrat, K.; Alazab, M.; Bhattacharya, S.; Maddikunta, P.K.R.; Gadekallu, T.R. Federated Learning for intrusion detection system: Concepts, challenges and future directions. Comput. Commun. 2022, 195, 346–361. [Google Scholar] [CrossRef]
- Khraisat, A.; Alazab, A.; Singh, S.; Jan, T.; Gomez, A., Jr. Survey on Federated Learning for Intrusion Detection System: Concept, Architectures, Aggregation Strategies, Challenges, and Future Directions. ACM Comput. Surv. 2024, 57, 7. [Google Scholar] [CrossRef]
- Hernandez-Ramos, J.L.; Karopoulos, G.; Chatzoglou, E.; Kouliaridis, V.; Marmol, E.; Gonzalez-Vidal, A.; Kambourakis, G. Intrusion Detection Based on Federated Learning: A Systematic Review. ACM Comput. Surv. 2025, 57, 309. [Google Scholar] [CrossRef]
- Lu, Z.; Pan, H.; Dai, Y.; Si, X.; Zhang, Y. Federated Learning with Non-IID Data: A Survey. IEEE Internet Things J. 2024, 11, 19188–19209. [Google Scholar] [CrossRef]
- Ma, X.; Zhu, J.; Lin, Z.; Chen, S.; Qin, Y. A State-of-the-Art Survey on Solving Non-IID Data in Federated Learning. Future Gener. Comput. Syst. 2022, 135, 244–258. [Google Scholar] [CrossRef]
- Xie, H.; Ma, J.; Xiong, L.; Yang, C. Federated Graph Classification over Non-IID Graphs. Adv. Neural Inf. Process. Syst. 2021, 34, 18839–18852. [Google Scholar]
- Yao, Y.; Jin, W.; Ravi, S.; Joe-Wong, C. FedGCN: Convergence-Communication Tradeoffs in Federated Training of Graph Convolutional Networks. Adv. Neural Inf. Process. Syst. 2023, 36, 79748–79760. [Google Scholar]
- Li, T.; Sahu, A.K.; Zaheer, M.; Sanjabi, M.; Talwalkar, A.; Smith, V. Federated Optimization in Heterogeneous Networks. Proc. Mach. Learn. Syst. 2020, 2, 429–450. [Google Scholar]
- Bhavsar, M.H.; Bekele, Y.B.; Roy, K.; Kelly, J.C.; Limbrick, D. FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT. IEEE Access 2024, 12, 52215–52226. [Google Scholar] [CrossRef]
- Nguyen, Q.H.; Hore, S.; Shah, A.; Le, T.; Bastian, N.D. FedNIDS: A Federated Learning Framework for Packet-Based Network Intrusion Detection System. Digit. Threats 2025, 6, 4. [Google Scholar] [CrossRef]
- Althunayyan, M.; Javed, A.; Rana, O. A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning. Veh. Commun. 2024, 49, 100837. [Google Scholar] [CrossRef]
- Huang, K.; Xian, R.; Xian, M.; Wang, H.; Ni, L. A comprehensive intrusion detection method for the Internet of Vehicles based on federated learning architecture. Comput. Secur. 2024, 147, 104067. [Google Scholar] [CrossRef]
- Shao, J.; Zeng, G.; Lu, K.; Geng, G.; Weng, J. Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search. Comput. Secur. 2024, 143, 103910. [Google Scholar] [CrossRef]
- Praharaj, L.; Gupta, D.; Gupta, M. Efficient federated transfer learning-based network anomaly detection for cooperative smart farming infrastructure. Smart Agric. Technol. 2025, 10, 100727. [Google Scholar] [CrossRef]
- Popli, M.S.; Singh, R.P.; Popli, N.K.; Mamun, M. A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones. IEEE Access 2025, 13, 12634–12646. [Google Scholar] [CrossRef]
- Jin, Z.; Zhou, J.; Li, B.; Wu, X.; Duan, C. FL-IIDS: A novel federated learning-based incremental intrusion detection system. Future Gener. Comput. Syst. 2024, 151, 57–70. [Google Scholar] [CrossRef]
- Singh, G.; Sood, K.; Rajalakshmi, P.; Nguyen, D.D.N.; Xiang, Y. Evaluating Federated Learning-Based Intrusion Detection Scheme for Next Generation Networks. IEEE Trans. Netw. Serv. Manag. 2024, 21, 4816–4829. [Google Scholar] [CrossRef]
- Bank, D.; Koenigstein, N.; Giryes, R. Autoencoders. arXiv 2021. [Google Scholar] [CrossRef]
- Kingma, D.P.; Welling, M. An Introduction to Variational Autoencoders. Found. Trends Mach. Learn. 2019, 12, 307–392. [Google Scholar] [CrossRef]
- Yepmo, V.; Smits, G.; Lesot, M.J.; Pivert, O. Leveraging an Isolation Forest to Anomaly Detection and Data Clustering. Data Knowl. Eng. 2024, 151, 102302. [Google Scholar] [CrossRef]
- Dong, B.; Chen, D.; Wu, Y.; Tang, S.; Zhuang, Y. FADngs: Federated Learning for Anomaly Detection. IEEE Trans. Neural Networks Learn. Syst. 2025, 36, 2578–2592. [Google Scholar] [CrossRef]
- Nguyen, V.T.; Beuran, R. FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection. Comput. Secur. 2025, 151, 104337. [Google Scholar] [CrossRef]
- Zhang, A.; Zhao, P.; Lu, W.; Zhou, Y.; Zhang, W.; Zhang, G. Mitigating Poisoning Attacks in Federated Learning Through Deep One-Class Classification. IEEE Trans. Cogn. Commun. Netw. 2025, 12, 545–558. [Google Scholar] [CrossRef]
- Lu, Y.; Yang, T.; Zhao, C.; Chen, W.; Zeng, R. A swarm anomaly detection model for IoT UAVs based on a multi-modal denoising autoencoder and federated learning. Comput. Ind. Eng. 2024, 196, 110454. [Google Scholar] [CrossRef]
- Shrestha, R.; Mohammadi, M.; Sinaei, S.; Salcines, A.; Pampliega, D.; Clemente, R.; Sanz, A.L.; Nowroozi, E.; Lindgren, A. Anomaly detection based on LSTM and autoencoders using federated learning in smart electric grid. J. Parallel Distrib. Comput. 2024, 193, 104951. [Google Scholar] [CrossRef]
- He, Y.; Ding, X.; Tang, Y.; Guan, J.; Zhou, S. Unsupervised Multivariate Time Series Anomaly Detection by Feature Decoupling in Federated Learning Scenarios. IEEE Trans. Artif. Intell. 2025, 6, 2013–2026. [Google Scholar] [CrossRef]
- Liao, X.; Liu, W.; Chen, C.; Zhou, P.; Yu, F.; Zhu, H.; Yao, B.; Wang, T.; Zheng, X.; Tan, Y. Rethinking the Representation in Federated Unsupervised Learning with Non-IID Data. In Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, 16–22 June 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 22841–22850. [Google Scholar] [CrossRef]
- Wu, Z.; Pan, S.; Chen, F.; Long, G.; Zhang, C.; Yu, P.S. A Comprehensive Survey on Graph Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 4–24. [Google Scholar] [CrossRef] [PubMed]
- Yuan, H.; Yu, H.; Gui, S.; Ji, S. Explainability in Graph Neural Networks: A Taxonomic Survey. IEEE Trans. Pattern Anal. Mach. Intell. 2023, 45, 5782–5799. [Google Scholar] [CrossRef]
- Wang, J.; Liang, J.; Yao, K.; Liang, J.; Wang, D. Graph convolutional autoencoders with co-learning of graph structure and node attributes. Pattern Recognit. 2022, 121, 108215. [Google Scholar] [CrossRef]
- Roy, A.; Shu, J.; Li, J.; Yang, C.; Elshocht, O.; Smeets, J.; Li, P. GAD-NR: Graph Anomaly Detection via Neighborhood Reconstruction. In Proceedings of the 17th ACM International Conference on Web Search and Data Mining, WSDM ’24, Merida, Mexico, 4–8 March 2024; Association for Computing Machinery: New York, NY, USA, 2024; pp. 576–585. [Google Scholar] [CrossRef]
- Wu, N.; Zhao, Y.; Dong, H.; Xi, K.; Yu, W.; Wang, W. Federated Graph Anomaly Detection Through Contrastive Learning with Global Negative Pairs. Proc. AAAI Conf. Artif. Intell. 2025, 39, 21554–21562. [Google Scholar] [CrossRef]
- Kong, X.; Zhang, W.; Wang, H.; Hou, M.; Chen, X.; Yan, X.; Das, S.K. Federated Graph Anomaly Detection via Contrastive Self-Supervised Learning. IEEE Trans. Neural Netw. Learn. Syst. 2025, 36, 7931–7944. [Google Scholar] [CrossRef]
- Cai, J.; Zhang, Y.; Fan, J.; Ng, S.K. LG-FGAD: An Effective Federated Graph Anomaly Detection Framework. In Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, IJCAI-24, Jeju, Republic of Korea, 3–9 August 2024; Larson, K., Ed.; Main Track; International Joint Conferences on Artificial Intelligence Organization: Bremen, Germany, 2024; Volume 8, pp. 3760–3769. [Google Scholar] [CrossRef]
- Xia, F.; Sun, K.; Yu, S.; Aziz, A.; Wan, L.; Pan, S.; Liu, H. Graph Learning: A Survey. IEEE Trans. Artif. Intell. 2021, 2, 109–127. [Google Scholar] [CrossRef]
- Tax, D.M.J.; Duin, R.P.W. Support Vector Data Description. Mach. Learn. 2004, 54, 45–66. [Google Scholar] [CrossRef]
- Zhou, Y.; Liang, X.; Zhang, W.; Zhang, L.; Song, X. VAE-based Deep SVDD for anomaly detection. Neurocomputing 2021, 453, 131–140. [Google Scholar] [CrossRef]
- Yi, J.; Yoon, S. Patch SVDD: Patch-Level SVDD for Anomaly Detection and Segmentation. In Proceedings of the Computer Vision—ACCV 2020, Kyoto, Japan, 30 November–4 December 2020; Springer International Publishing: Berlin/Heidelberg, Germany, 2021; pp. 375–390. [Google Scholar]
- Zhu, H.; Xu, J.; Liu, S.; Jin, Y. Federated learning on non-IID data: A survey. Neurocomputing 2021, 465, 371–390. [Google Scholar] [CrossRef]
- Arivazhagan, M.G.; Aggarwal, V.; Singh, A.K.; Choudhary, S. Federated Learning with Personalization Layers. arXiv 2019. [Google Scholar] [CrossRef]
- Collins, L.; Hassani, H.; Mokhtari, A.; Shakkottai, S. Exploiting Shared Representations for Personalized Federated Learning. In Proceedings of the 38th International Conference on Machine Learning, Virtual, 18–24 July 2021; Meila, M., Zhang, T., Eds.; PMLR: Cambridge, MA, USA, 2021; Volume 139, pp. 2089–2099. Available online: https://proceedings.mlr.press/v139/collins21a.html (accessed on 5 December 2025).
- Thein, T.T.; Shiraishi, Y.; Morii, M. Personalized federated learning-based intrusion detection system: Poisoning attack and defense. Future Gener. Comput. Syst. 2024, 153, 182–192. [Google Scholar] [CrossRef]
- Li, T.; Hu, S.; Beirami, A.; Smith, V. Ditto: Fair and Robust Federated Learning Through Personalization. In Proceedings of the 38th International Conference on Machine Learning, Virtual, 18–24 July 2021; Meila, M., Zhang, T., Eds.; PMLR: Cambridge, MA, USA, 2021; Volume 139, pp. 6357–6368. Available online: https://proceedings.mlr.press/v139/li21h.html (accessed on 5 December 2025).
- Fallah, A.; Mokhtari, A.; Ozdaglar, A. Personalized Federated Learning with Theoretical Guarantees: A Model-Agnostic Meta-Learning Approach. In Proceedings of the Advances in Neural Information Processing Systems, Virtual, 6–12 December 2020; Larochelle, H., Ranzato, M., Hadsell, R., Balcan, M., Lin, H., Eds.; Curran Associates, Inc.: Red Hook, NY, USA, 2020; Volume 33, pp. 3557–3568. [Google Scholar]
- Yang, L.; Huang, J.; Lin, W.; Cao, J. Personalized Federated Learning on Non-IID Data via Group-based Meta-learning. ACM Trans. Knowl. Discov. Data 2023, 17, 49. [Google Scholar] [CrossRef]
- Jiang, Y.; Konečný, J.; Rush, K.; Kannan, S. Improving Federated Learning Personalization via Model Agnostic Meta Learning. arXiv 2023. [Google Scholar] [CrossRef]
- de Cámara, X.S.; Flores, J.L.; Arellano, C.; Urbieta, A.; Zurutuza, U. Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks. Comput. Secur. 2023, 131, 103299. [Google Scholar] [CrossRef]
- Zhou, J.; Xie, H.; Yang, C. Graph Personalized Federated Learning via Client Network Learning. Trans. Mach. Learn. Res. 2025. Available online: https://openreview.net/forum?id=pyTTR4pxkU (accessed on 5 December 2025).
- Zhu, D.; Ma, Y.; Liu, Y. Anomaly Detection with Deep Graph Autoencoders on Attributed Networks. In Proceedings of the 2020 IEEE Symposium on Computers and Communications (ISCC), Rennes, France, 7–10 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Liu, R.; Xing, P.; Deng, Z.; Li, A.; Guan, C.; Yu, H. Federated Graph Neural Networks: Overview, Techniques, and Challenges. IEEE Trans. Neural Networks Learn. Syst. 2025, 36, 4279–4295. [Google Scholar] [CrossRef] [PubMed]
- Ruff, L.; Vandermeulen, R.A.; Görnitz, N.; Binder, A.; Müller, E.; Müller, K.R.; Kloft, M. Deep Semi-Supervised Anomaly Detection. arXiv 2020, arXiv:1906.02694. [Google Scholar] [CrossRef]
- Nagarajan, V.; Andreassen, A.; Neyshabur, B. Understanding the failure modes of out-of-distribution generalization. arXiv 2021, arXiv:2010.15775. [Google Scholar] [CrossRef]
- Tan, A.Z.; Yu, H.; Cui, L.; Yang, Q. Towards Personalized Federated Learning. IEEE Trans. Neural Networks Learn. Syst. 2023, 34, 9587–9603. [Google Scholar] [CrossRef] [PubMed]
- Beutel, D.J.; Topal, T.; Mathur, A.; Qiu, X.; Fernandez-Marques, J.; Gao, Y.; Sani, L.; Kwing, H.L.; Parcollet, T.; Gusmão, P.P.d.; et al. Flower: A Friendly Federated Learning Research Framework. arXiv 2020, arXiv:2007.14390. [Google Scholar]
- Paszke, A.; Gross, S.; Massa, F.; Lerer, A.; Bradbury, J.; Chanan, G.; Killeen, T.; Lin, Z.; Gimelshein, N.; Antiga, L.; et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library. Adv. Neural Inf. Process. Syst. 2019, 32. [Google Scholar] [CrossRef]
- Fey, M.; Lenssen, J.E. Fast Graph Representation Learning with PyTorch Geometric. arXiv 2019. [Google Scholar] [CrossRef]
- Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [Google Scholar] [CrossRef]
- Hsu, T.M.H.; Qi, H.; Brown, M. Measuring the Effects of Non-Identical Data Distribution for Federated Visual Classification. arXiv 2019. [Google Scholar] [CrossRef]
- Yurochkin, M.; Agarwal, M.; Ghosh, S.; Greenewald, K.; Hoang, T.N.; Khazaeni, Y. Bayesian Nonparametric Federated Learning of Neural Networks. arXiv 2019. [Google Scholar] [CrossRef]
- Fuglede, B.; Topsoe, F. Jensen-Shannon divergence and Hilbert space embedding. In Proceedings of the International Symposium on Information Theory, 2004, ISIT 2004, Chicago, IL, USA, 27 June–2 July 2004; IEEE: Piscataway, NJ, USA, 2004; p. 31. [Google Scholar] [CrossRef]



| Ref | Year | FL Algorithm | Local Model (Client) | Server Model/Aggregation | Learning Type | Non-IID Reported | Personalized |
|---|---|---|---|---|---|---|---|
| Jin et al. [56] | 2024 | FedAvg with relay | CNN/CNN-GRU variants | Relay client fuses reconstructed samples | S | No | No |
| Mazid et al. [37] | 2025 | FedAvg + voting | Bi-RNN/RNN | Voting ensemble at server | S | No | No |
| Singh et al. [57] | 2024 | FedAvg variant (class-balanced) | DNN (local) | Aggregation with class-balancing adjustments | S | No | No |
| Nguyen et al. [50] | 2025 | FedAvg | Packet-level DNN | Aggregated DNN | S | No | FT |
| Xie et al. [46] | 2021 | Clustered FL | Local GNNs | Cluster-specific aggregations (gradient-based clustering) | S | Yes/JSD | C |
| Yao et al. [47] | 2023 | FedGCN (pre-exchange) | GCN variants (local) | Server aggregates precomputed neighbour summaries | SS | DD | No |
| Cai et al. [74] | 2024 | Custom federated GAD | GNN encoder + local discriminator | Dual knowledge distillation (local ↔ global) | U | Yes/KL-D | KDist |
| Zhang et al. [63] | 2025 | Deep one-class in FL (defence) | DeepSVDD embeddings on local updates | Server filters suspicious updates using one-class scores | U | Yes/DPA | No |
| Sáez-de-Cámara et al. [87] | 2023 | Clustered FL + fingerprinting | Local unsupervised anomaly detectors | Server clusters devices by model fingerprints; cluster-wise training | U | Yes/Infer | C |
| Li et al. [83] | 2021 | Regularised FedAvg (bi-level optimisation) | Generic DNN models | Aggregates global model; each client solves personalised subproblem with proximal regulariser | S | Yes/DP | RegP |
| Fallah et al. [84] | 2020 | Meta-learning based FL | Task-agnostic networks (MAML-style) | Global model provides initialisation optimised for fast client adaptation | S | Yes/TVD & 1-WD | MetL |
| Thein et al. [82] | 2024 | pFL-IDS (personalized) | Local supervised classifier | Aggregated backbone + local head | S | Yes/DP | FT |
| Ours | 2025 | FedProx variant + var-penalty | GCN/GAE backbone; small local one-class head | Aggregated backbone; local head personalisation & fine-tuning | U | Yes/(DD + KL-D) | FT & RegP |
| Symbol | Meaning |
|---|---|
| K | Number of federated clients |
| Local dataset at client k (flows, per-host aggregates) | |
| Local graph at client k with nodes , edges , features | |
| d | the input feature dimension (typically 128 for IoT-23 features) |
| Number of nodes at client k () | |
| N | Total nodes across all clients, |
| Shared graph encoder (GCN/GAE encoder) with encoder parameter shared globally via federation | |
| Optional decoder for GAE reconstruction with decoder parameter shared globally via federation | |
| Client k’s lightweight personalization head | |
| Embeddings at client k, | |
| m | Embedding dimension (typically 16 in our experiments) |
| Embedding for node i at client k (row of ) | |
| c/ | Global or client DeepSVDD center; is client k’s hypersphere center |
| FedProx proximal coefficient used in local updates | |
| Weight decay regularization coefficient | |
| Dirichlet concentration parameter for non-IID partitioning |
| Layer | Operation | Output Shape |
|---|---|---|
| Input | Node features | |
| GCN block 1 | GCNConv() → BatchNorm → ReLU | |
| Dropout | ||
| GCN block 2 | GCNConv() → BatchNorm → ReLU | |
| GCN block 3 | GCNConv() → Linear | |
| Embedding | Node representations | |
| DeepSVDD | Euclidean distance to center |
| Layer/Component | Operation | Output Shape |
|---|---|---|
| Input | Node features , adjacency A | , |
| Encoder block 1 | GCNConv() → BatchNorm → ReLU | |
| Encoder block 2 | GCNConv() → BatchNorm → ReLU | |
| Encoder block 3 | GCNConv() → Linear | |
| Latent representation | ||
| Decoder block 1 | GCNConv() → BatchNorm → ReLU | |
| Decoder block 2 | GCNConv() → BatchNorm → ReLU | |
| Reconstruction | ||
| DeepSVDD | Euclidean distance to center |
| Model Type | Frozen Components | Adapted Components |
|---|---|---|
| GCN-DeepSVDD | Early encoder layers (convs.0, projector.0-3) | Head layers, final encoder (convs.1, projector.4) |
| GAE-DeepSVDD | Early encoder layers | Decoder layers, final encoder layer |
| Hyperparameter | Description | Typical Value |
|---|---|---|
| Embedding compactness weight | ||
| FedProx regularization strength | ||
| K | Number of federated clients | |
| Center update rate (DeepSVDD) | ||
| SVDD Weight | 1.0 | |
| Dirichlet parameter for non-IID partitioning | ||
| m | embedding Dim | 16 |
| - | Batch Size | 64 |
| DeepSVDD hypersphere boundary parameter | ||
| Learning rate (Adam optimizer) | ||
| Weight decay | ||
| E | Local epochs | 30 |
| Personalization epochs | 5 | |
| T | Number of server rounds (Global rounds) | 20 |
| Random seeds | 42 |
| Feature Name | Description | Category |
|---|---|---|
| hour_of_day, day_of_week, is_weekend | Temporal time features to capture periodic patterns | Temporal |
| log_duration, time_since_first | Connection timing statistics | Temporal |
| orig_bytes, resp_bytes, orig_pkts, resp_pkts, orig_ip_bytes, resp_ip_bytes | Volumetric counts to identify traffic volume patterns from originator and responder | Volumetric |
| bytes_ratio(), packets_ratio(), bytes_per_packet_orig(), bytes_per_packet_resp() | Ratios, , , , | Volumetric |
| conn_state_* | One-hot connection states (established/reset/half-open/no-response/normal/other/rejected) | Connection State |
| proto_* | Protocol interactions (tcp/udp/icmp/other) | Protocol |
| syn, ack, fin, rst | TCP flags set | Protocol |
| init, data, timeout | Packet types and events | Protocol |
| syn_reply, ack_reply | Protocol response patterns | Protocol |
| handshake, fin_ack | Connection establishment/termination | Protocol |
| data_* | Data flow characteristics (direction/timeout) | Protocol |
| service_* | Service one-hots (http/dns/dhcp/ssl/unknown) | Service |
| Device ID | Device Type | Manufacturer | City | Country | Benign Samples |
|---|---|---|---|---|---|
| 1 | Danmini Doorbell | Unknown/OEM | N/A | N/A | 49,548 |
| 2 | Ecobee Thermostat | ecobee Inc. | Toronto | Canada | 13,113 |
| 3 | Ennio Doorbell | Unknown/OEM | N/A | N/A | 39,100 |
| 4 | Philips Baby Monitor | Koninklijke Philips N.V. | Amsterdam | Netherlands | 175,240 |
| 5 | Provision PT-737E Camera | Provision-ISR | Kfar Saba | Israel | 62,154 |
| 6 | Provision PT-838 Camera | Provision-ISR | Kfar Saba | Israel | 98,514 |
| 7 | Samsung Webcam | Samsung Electronics | Suwon | South Korea | 52,150 |
| 8 | SimpleHome XCS7-1002 Camera | Unknown/OEM | N/A | N/A | 46,585 |
| 9 | SimpleHome XCS7-1003 Camera | Unknown/OEM | N/A | N/A | 19,528 |
| Mean | – | – | – | – | |
| Std. dev. | – | – | – | – | |
| CV | – | – | – | – | |
| Gini | – | – | – | – | |
| Max/Min ratio | – | – | – | – |
| Method | AUC-ROC | AUPR | TPR@1%FPR | TPR@5%FPR | TPR@10%FPR | Infer. Time (ms) |
|---|---|---|---|---|---|---|
| Isolation Forest | 91.25 ± 1.59 | 94.47 ± 0.45 | 0.62 ± 0.44 | 24.43 ± 1.39 | 53.47 ± 5.76 | 2.586 ± 0.39 |
| One-Class SVM | 78.56 ± 1.03 | 91.16 ± 0.79 | 2.47 ± 1.66 | 16.81 ± 6.25 | 38.92 ± 4.93 | 4.571 ± 0.68 |
| LG-FGAD [74] | 96.10 ± 1.10 | 97.10 ± 0.70 | 42.50 ± 5.23 | 66.30 ± 3.64 | 92.80 ± 2.11 | 2.187 ± 0.20 |
| FedAvg + MLP | 93.92 ± 1.26 | 96.13 ± 0.11 | 10.02 ± 4.84 | 50.02 ± 1.52 | 91.19 ± 0.25 | 3.899 ± 0.32 |
| FedProx + MLP | 94.35 ± 2.01 | 98.27 ± 0.47 | 15.33 ± 2.03 | 53.94 ± 1.30 | 93.19 ± 0.56 | 3.133 ± 0.03 |
| N-BaIoT dataset () | ||||||
| GCN–DeepSVDD | 96.48 ± 0.89 | 96.89 ± 0.67 | 45.67 ± 4.12 | 68.90 ± 2.45 | 93.67 ± 1.23 | 1.234 ± 0.12 |
| GAE–DeepSVDD | 97.74 ± 0.45 | 98.28 ± 0.23 | 65.89 ± 3.78 | 86.34 ± 1.89 | 97.92 ± 0.25 | 1.567 ± 0.15 |
| IoT-23 Dataset () | ||||||
| GCN-DeepSVDD | 97.25 ± 1.18 | 98.82 ± 0.76 | 23.27 ± 4.13 | 61.59 ± 3.05 | 94.62 ± 0.89 | 1.553 ± 0.17 |
| GAE-DeepSVDD | 99.46 ± 0.27 | 99.94 ± 0.02 | 80.16 ± 5.87 | 93.83 ± 0.47 | 100.00 ± 0.00 | 1.989 ± 0.23 |
| Client ID | GCN-DeepSVDD | GAE-DeepSVDD | ||||
|---|---|---|---|---|---|---|
| Base-Model Only | w/FedReg | w/Personalization | Base-Model Only | w/FedReg | w/Personalization | |
| High non-IIDness () | ||||||
| Client 0 | 85.66 ± 3.25 | 92.00 ± 0.96 | 95.97 ± 1.05 | 90.89 ± 3.52 | 95.78 ± 0.87 | 96.58 ± 0.58 |
| Client 1 | 87.57 ± 2.90 | 91.91 ± 1.03 | 96.68 ± 0.47 | 89.80 ± 2.81 | 95.09 ± 0.94 | 96.49 ± 0.46 |
| Client 2 | 84.59 ± 6.15 | 89.93 ± 4.84 | 94.30 ± 1.20 | 88.32 ± 4.84 | 93.41 ± 1.62 | 94.51 ± 0.98 |
| Client 3 | 89.72 ± 1.33 | 93.06 ± 0.49 | 97.43 ± 0.59 | 91.45 ± 2.14 | 96.54 ± 0.71 | 97.64 ± 0.42 |
| Client 4 | 91.37 ± 1.19 | 94.71 ± 0.37 | 99.08 ± 0.33 | 93.10 ± 0.79 | 98.19 ± 0.62 | 99.29 ± 0.09 |
| Client 5 | 89.81 ± 4.90 | 94.15 ± 0.17 | 98.52 ± 0.34 | 92.54 ± 1.12 | 97.63 ± 0.50 | 98.73 ± 0.25 |
| Client 6 | 92.77 ± 0.13 | 95.11 ± 0.28 | 99.48 ± 0.03 | 93.50 ± 0.09 | 98.59 ± 0.10 | 99.69 ± 0.07 |
| Client 7 | 86.07 ± 3.20 | 90.41 ± 1.92 | 95.78 ± 0.91 | 88.80 ± 5.76 | 93.89 ± 1.30 | 94.99 ± 1.19 |
| Client 8 | 84.51 ± 5.87 | 89.85 ± 2.48 | 93.22 ± 2.03 | 88.24 ± 5.14 | 93.33 ± 1.66 | 94.43 ± 0.79 |
| Client 9 | 90.85 ± 0.09 | 95.19 ± 0.08 | 99.56 ± 0.07 | 93.58 ± 0.03 | 98.67 ± 0.09 | 99.77 ± 0.05 |
| Average | 88.29 ± 2.90 | 92.63 ± 1.26 | 97.00 ± 0.70 | 91.02 ± 2.62 | 96.11 ± 0.84 | 97.21 ± 0.49 |
| Medium non-IIDness () | ||||||
| Client 0 | 91.98 ± 1.30 | 94.53 ± 0.64 | 96.28 ± 0.62 | 93.89 ± 2.92 | 95.88 ± 0.62 | 99.06 ± 0.79 |
| Client 1 | 94.90 ± 0.42 | 97.09 ± 0.49 | 97.45 ± 0.73 | 96.94 ± 0.10 | 97.57 ± 0.08 | 99.66 ± 0.17 |
| Client 2 | 96.24 ± 0.50 | 95.06 ± 0.54 | 96.02 ± 0.56 | 94.48 ± 0.51 | 97.14 ± 0.09 | 99.49 ± 0.11 |
| Client 3 | 97.96 ± 0.29 | 97.81 ± 0.57 | 98.26 ± 0.38 | 96.38 ± 0.09 | 99.09 ± 0.11 | 100.00 ± 0.00 |
| Client 4 | 89.74 ± 2.84 | 90.71 ± 1.15 | 94.82 ± 0.46 | 90.91 ± 0.12 | 95.19 ± 0.86 | 98.93 ± 1.06 |
| Client 5 | 91.38 ± 0.35 | 93.93 ± 0.64 | 95.78 ± 0.39 | 91.12 ± 0.21 | 95.41 ± 0.70 | 99.14 ± 0.33 |
| Client 6 | 98.02 ± 0.18 | 98.25 ± 0.08 | 98.96 ± 0.07 | 97.06 ± 0.01 | 99.53 ± 0.12 | 100.00 ± 0.00 |
| Client 7 | 94.00 ± 1.04 | 97.49 ± 0.25 | 97.49 ± 0.40 | 94.94 ± 2.10 | 97.87 ± 0.68 | 99.86 ± 0.09 |
| Client 8 | 94.88 ± 0.83 | 96.78 ± 0.31 | 98.05 ± 0.32 | 94.92 ± 0.10 | 97.16 ± 0.10 | 99.46 ± 0.34 |
| Client 9 | 99.04 ± 0.07 | 99.16 ± 0.00 | 99.38 ± 0.07 | 98.58 ± 0.06 | 99.94 ± 0.13 | 100.00 ± 0.00 |
| Average | 94.88 ± 0.78 | 96.08 ± 0.47 | 97.25 ± 0.40 | 94.92 ± 0.62 | 97.48 ± 0.35 | 99.56 ± 0.29 |
| Low non-IIDness () | ||||||
| Client 0 | 96.46 ± 1.05 | 97.22 ± 0.12 | 99.95 ± 0.01 | 97.08 ± 0.18 | 100.00 ± 0.00 | 100.00 ± 0.00 |
| Client 1 | 96.79 ± 1.20 | 97.95 ± 0.10 | 98.19 ± 0.09 | 97.73 ± 0.15 | 97.74 ± 0.91 | 99.98 ± 0.01 |
| Client 2 | 95.77 ± 3.45 | 99.10 ± 0.25 | 99.49 ± 0.15 | 96.95 ± 0.35 | 98.53 ± 0.41 | 100.00 ± 0.00 |
| Client 3 | 96.56 ± 0.30 | 98.03 ± 0.15 | 98.36 ± 0.46 | 97.27 ± 0.22 | 98.60 ± 0.29 | 99.97 ± 0.01 |
| Client 4 | 97.14 ± 0.95 | 96.49 ± 2.08 | 100.00 ± 0.00 | 98.43 ± 0.12 | 100.00 ± 0.00 | 100.00 ± 0.00 |
| Client 5 | 96.56 ± 0.30 | 99.00 ± 0.15 | 99.06 ± 0.06 | 97.27 ± 0.22 | 99.39 ± 0.03 | 100.00 ± 0.00 |
| Client 6 | 97.14 ± 1.10 | 97.49 ± 1.68 | 99.96 ± 0.03 | 98.44 ± 0.22 | 100.00 ± 0.00 | 100.00 ± 0.00 |
| Client 7 | 95.20 ± 1.43 | 97.71 ± 1.35 | 98.73 ± 0.12 | 94.55 ± 1.48 | 99.31 ± 0.09 | 100.00 ± 0.00 |
| Client 8 | 96.40 ± 0.35 | 98.19 ± 0.18 | 98.35 ± 0.07 | 96.95 ± 0.28 | 99.52 ± 0.11 | 100.00 ± 0.00 |
| Client 9 | 97.17 ± 0.14 | 98.00 ± 0.07 | 98.32 ± 0.63 | 98.49 ± 0.11 | 97.61 ± 1.02 | 99.93 ± 0.05 |
| Average | 96.52 ± 1.03 | 97.92 ± 0.61 | 99.04 ± 0.16 | 97.32 ± 0.33 | 99.07 ± 0.29 | 99.99 ± 0.01 |
| N-BaIoT for the 9 devices () | ||||||
| Client 1 | 92.23 ± 1.48 | 94.41 ± 0.94 | 96.28 ± 0.74 | 93.15 ± 1.98 | 95.78 ± 0.84 | 97.58 ± 0.54 |
| Client 2 | 86.12 ± 2.50 | 89.79 ± 1.75 | 92.40 ± 2.25 | 87.80 ± 2.91 | 90.33 ± 1.75 | 93.10 ± 1.10 |
| Client 3 | 92.11 ± 1.66 | 94.30 ± 1.16 | 96.55 ± 0.83 | 92.20 ± 1.66 | 94.97 ± 1.22 | 97.60 ± 0.33 |
| Client 4 | 97.89 ± 0.50 | 98.61 ± 0.31 | 99.35 ± 0.19 | 97.95 ± 0.83 | 98.90 ± 0.15 | 99.95 ± 0.05 |
| Client 5 | 94.64 ± 1.30 | 95.59 ± 0.91 | 96.70 ± 0.65 | 94.75 ± 1.30 | 96.95 ± 0.91 | 98.80 ± 0.35 |
| Client 6 | 96.27 ± 0.95 | 97.12 ± 0.67 | 98.33 ± 0.48 | 96.77 ± 0.95 | 98.35 ± 0.67 | 99.75 ± 0.08 |
| Client 7 | 94.16 ± 1.44 | 96.92 ± 1.01 | 98.10 ± 0.72 | 94.60 ± 1.44 | 96.35 ± 1.01 | 97.90 ± 0.42 |
| Client 8 | 93.88 ± 1.52 | 95.55 ± 0.98 | 96.80 ± 0.76 | 93.95 ± 1.52 | 95.05 ± 0.93 | 98.90 ± 0.36 |
| Client 9 | 89.90 ± 2.19 | 91.10 ± 1.53 | 93.85 ± 1.40 | 90.15 ± 2.19 | 93.30 ± 1.53 | 96.05 ± 0.85 |
| Average | 93.02 ± 1.55 | 94.82 ± 1.03 | 96.48 ± 0.89 | 93.48 ± 1.64 | 95.55 ± 1.00 | 97.74 ± 0.45 |
| Client ID | GCN-DeepSVDD | GAE-DeepSVDD | ||||
|---|---|---|---|---|---|---|
| 10 Clients () | ||||||
| Client 0 | 95.97 ± 1.05 | 96.28 ± 0.62 | 99.95 ± 0.01 | 96.58 ± 0.58 | 99.06 ± 0.79 | 100.00 ± 0.00 |
| Client 1 | 96.68 ± 0.47 | 97.45 ± 0.73 | 98.19 ± 0.09 | 96.49 ± 0.46 | 99.66 ± 0.17 | 99.98 ± 0.01 |
| Client 2 | 94.30 ± 1.20 | 96.02 ± 0.56 | 99.49 ± 0.15 | 94.51 ± 0.98 | 99.49 ± 0.11 | 100.00 ± 0.00 |
| Client 3 | 97.43 ± 0.59 | 98.26 ± 0.38 | 98.36 ± 0.46 | 97.64 ± 0.42 | 100.00 ± 0.00 | 99.97 ± 0.01 |
| Client 4 | 99.08 ± 0.33 | 94.82 ± 0.46 | 100.00 ± 0.00 | 99.29 ± 0.09 | 98.93 ± 1.06 | 100.00 ± 0.00 |
| Client 5 | 98.52 ± 0.34 | 95.78 ± 0.39 | 99.06 ± 0.06 | 98.73 ± 0.25 | 99.14 ± 0.33 | 100.00 ± 0.00 |
| Client 6 | 99.48 ± 0.03 | 98.96 ± 0.07 | 99.96 ± 0.03 | 99.69 ± 0.07 | 100.00 ± 0.00 | 100.00 ± 0.00 |
| Client 7 | 95.78 ± 0.91 | 97.49 ± 0.40 | 98.73 ± 0.12 | 94.99 ± 1.19 | 99.86 ± 0.09 | 100.00 ± 0.00 |
| Client 8 | 93.22 ± 2.03 | 98.05 ± 0.32 | 98.35 ± 0.07 | 94.43 ± 0.79 | 99.46 ± 0.34 | 100.00 ± 0.00 |
| Client 9 | 99.56 ± 0.07 | 99.38 ± 0.07 | 98.32 ± 0.63 | 99.77 ± 0.05 | 100.00 ± 0.00 | 99.93 ± 0.05 |
| Average | 97.00 ± 0.70 | 97.25 ± 0.40 | 99.04 ± 0.16 | 97.21 ± 0.49 | 99.56 ± 0.29 | 99.99 ± 0.01 |
| 15 Clients () | ||||||
| Client 0 | 95.15 ± 0.62 | 96.89 ± 0.98 | 99.19 ± 0.38 | 96.13 ± 1.25 | 98.76 ± 0.45 | 100.00 ± 0.00 |
| Client 1 | 94.82 ± 1.05 | 95.74 ± 1.24 | 99.04 ± 0.76 | 94.87 ± 1.68 | 97.92 ± 0.89 | 99.79 ± 0.09 |
| Client 2 | 98.47 ± 0.34 | 97.28 ± 0.76 | 99.21 ± 0.24 | 96.42 ± 0.92 | 99.13 ± 0.32 | 100.00 ± 0.00 |
| Client 3 | 91.19 ± 1.98 | 94.82 ± 2.85 | 96.89 ± 0.85 | 93.56 ± 2.14 | 97.14 ± 1.12 | 99.34 ± 0.12 |
| Client 4 | 96.95 ± 0.62 | 98.63 ± 0.61 | 100.00 ± 0.00 | 97.88 ± 0.74 | 99.41 ± 0.25 | 100.00 ± 0.00 |
| Client 5 | 91.72 ± 3.22 | 94.15 ± 2.03 | 96.45 ± 0.81 | 92.94 ± 2.41 | 96.57 ± 1.34 | 98.97 ± 0.34 |
| Client 6 | 97.68 ± 1.09 | 98.52 ± 0.91 | 99.18 ± 0.41 | 95.67 ± 1.09 | 98.49 ± 0.52 | 99.89 ± 0.02 |
| Client 7 | 97.02 ± 0.42 | 98.09 ± 0.81 | 99.93 ± 0.03 | 97.21 ± 0.97 | 98.98 ± 0.38 | 100.00 ± 0.00 |
| Client 8 | 91.24 ± 1.41 | 95.37 ± 0.47 | 97.07 ± 0.47 | 94.52 ± 1.87 | 97.68 ± 0.97 | 99.68 ± 0.27 |
| Client 9 | 97.98 ± 0.34 | 98.02 ± 0.51 | 100.00 ± 0.00 | 98.35 ± 0.61 | 99.72 ± 0.18 | 100.00 ± 0.00 |
| Client 10 | 90.56 ± 2.78 | 94.96 ± 2.52 | 97.90 ± 0.47 | 93.87 ± 2.03 | 97.35 ± 1.05 | 99.85 ± 0.05 |
| Client 11 | 96.63 ± 0.54 | 97.45 ± 0.68 | 99.95 ± 0.02 | 97.67 ± 0.82 | 99.26 ± 0.29 | 100.00 ± 0.00 |
| Client 12 | 91.96 ± 2.12 | 96.24 ± 0.35 | 99.37 ± 0.36 | 95.28 ± 1.55 | 98.21 ± 0.72 | 99.81 ± 0.00 |
| Client 13 | 98.21 ± 0.13 | 99.16 ± 0.56 | 100.00 ± 0.00 | 99.12 ± 0.68 | 99.58 ± 0.21 | 100.00 ± 0.00 |
| Client 14 | 92.88 ± 2.63 | 95.03 ± 1.79 | 98.00 ± 0.79 | 93.79 ± 2.23 | 97.02 ± 1.18 | 99.41 ± 0.18 |
| Average | 94.83 ± 1.29 | 96.69 ± 1.14 | 98.81 ± 0.37 | 95.82 ± 1.40 | 98.35 ± 0.66 | 99.78 ± 0.07 |
| 20 Clients () | ||||||
| Client 0 | 97.47 ± 0.45 | 98.24 ± 0.57 | 99.20 ± 0.37 | 96.95 ± 0.88 | 99.62 ± 0.12 | 100.00 ± 0.00 |
| Client 1 | 94.18 ± 3.38 | 95.78 ± 2.21 | 98.78 ± 0.11 | 97.43 ± 0.67 | 99.34 ± 0.18 | 99.98 ± 0.00 |
| Client 2 | 96.84 ± 0.58 | 98.05 ± 0.18 | 99.00 ± 0.52 | 97.26 ± 1.42 | 98.47 ± 0.68 | 99.49 ± 0.16 |
| Client 3 | 93.37 ± 4.82 | 95.91 ± 2.58 | 97.11 ± 0.58 | 95.58 ± 3.12 | 97.73 ± 1.24 | 99.13 ± 0.42 |
| Client 4 | 98.76 ± 0.62 | 99.82 ± 0.09 | 100.00 ± 0.00 | 98.84 ± 0.15 | 99.12 ± 0.28 | 100.00 ± 0.00 |
| Client 5 | 95.56 ± 0.32 | 96.13 ± 1.89 | 97.88 ± 0.29 | 96.72 ± 3.02 | 98.02 ± 1.08 | 99.92 ± 0.00 |
| Client 6 | 97.25 ± 1.25 | 98.67 ± 0.39 | 99.17 ± 0.09 | 98.63 ± 0.73 | 99.09 ± 0.02 | 100.00 ± 0.00 |
| Client 7 | 97.39 ± 1.08 | 98.48 ± 0.72 | 99.08 ± 0.12 | 97.81 ± 1.28 | 98.86 ± 0.35 | 99.98 ± 0.00 |
| Client 8 | 92.94 ± 2.82 | 94.52 ± 0.85 | 98.15 ± 0.15 | 93.27 ± 2.24 | 96.98 ± 1.18 | 98.98 ± 0.16 |
| Client 9 | 98.27 ± 0.48 | 99.15 ± 0.18 | 100.00 ± 0.00 | 98.59 ± 0.98 | 99.45 ± 0.38 | 100.00 ± 0.00 |
| Client 10 | 96.79 ± 0.62 | 98.26 ± 0.42 | 99.72 ± 0.14 | 97.08 ± 0.92 | 98.89 ± 0.48 | 99.89 ± 0.06 |
| Client 11 | 93.58 ± 0.66 | 96.71 ± 0.86 | 99.01 ± 0.16 | 95.97 ± 1.12 | 99.03 ± 0.44 | 100.00 ± 0.00 |
| Client 12 | 97.36 ± 1.68 | 98.89 ± 0.52 | 99.90 ± 0.01 | 96.74 ± 2.11 | 99.25 ± 0.05 | 100.00 ± 0.00 |
| Client 13 | 98.15 ± 0.52 | 99.03 ± 0.02 | 100.00 ± 0.00 | 96.42 ± 1.02 | 99.31 ± 0.40 | 100.00 ± 0.00 |
| Client 14 | 95.52 ± 3.25 | 97.94 ± 1.18 | 99.86 ± 0.06 | 97.81 ± 0.58 | 99.17 ± 0.12 | 100.00 ± 0.00 |
| Client 15 | 97.07 ± 0.05 | 99.19 ± 0.28 | 99.96 ± 0.02 | 96.98 ± 1.55 | 99.28 ± 0.05 | 100.00 ± 0.00 |
| Client 16 | 95.57 ± 2.38 | 98.42 ± 0.51 | 99.22 ± 0.01 | 94.93 ± 1.85 | 97.84 ± 0.89 | 99.68 ± 0.10 |
| Client 17 | 92.68 ± 1.72 | 96.59 ± 0.96 | 98.89 ± 0.16 | 96.05 ± 1.21 | 98.94 ± 0.52 | 99.91 ± 0.03 |
| Client 18 | 98.21 ± 0.08 | 99.75 ± 0.22 | 100.00 ± 0.00 | 97.52 ± 1.38 | 99.86 ± 0.14 | 100.00 ± 0.00 |
| Client 19 | 96.94 ± 0.58 | 97.87 ± 0.84 | 98.67 ± 0.04 | 96.28 ± 1.06 | 99.18 ± 0.42 | 100.00 ± 0.00 |
| Average | 96.20 ± 1.37 | 97.87 ± 0.77 | 99.18 ± 0.14 | 96.84 ± 1.36 | 98.87 ± 0.45 | 99.85 ± 0.05 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Oladele, D.A.; Ige, A.; Agbo-Ajala, O.; Ekundayo, O.; Thottempudi, S.G.; Sibiya, M.; Mnkandla, E. G-PFL-ID: Graph-Driven Personalized Federated Learning for Unsupervised Intrusion Detection in Non-IID IoT Systems. IoT 2026, 7, 13. https://doi.org/10.3390/iot7010013
Oladele DA, Ige A, Agbo-Ajala O, Ekundayo O, Thottempudi SG, Sibiya M, Mnkandla E. G-PFL-ID: Graph-Driven Personalized Federated Learning for Unsupervised Intrusion Detection in Non-IID IoT Systems. IoT. 2026; 7(1):13. https://doi.org/10.3390/iot7010013
Chicago/Turabian StyleOladele, Daniel Ayo, Ayokunle Ige, Olatunbosun Agbo-Ajala, Olufisayo Ekundayo, Sree Ganesh Thottempudi, Malusi Sibiya, and Ernest Mnkandla. 2026. "G-PFL-ID: Graph-Driven Personalized Federated Learning for Unsupervised Intrusion Detection in Non-IID IoT Systems" IoT 7, no. 1: 13. https://doi.org/10.3390/iot7010013
APA StyleOladele, D. A., Ige, A., Agbo-Ajala, O., Ekundayo, O., Thottempudi, S. G., Sibiya, M., & Mnkandla, E. (2026). G-PFL-ID: Graph-Driven Personalized Federated Learning for Unsupervised Intrusion Detection in Non-IID IoT Systems. IoT, 7(1), 13. https://doi.org/10.3390/iot7010013

